Back to Jobs

Senior Cybersecurity Incident Response Analyst – Remote (Healthcare Sector)

Remote, USA Full-time Posted 2025-11-09
Company Description At MDA Edge, we help clients reinvent innovation, optimize operations, and reshape perceptions, ensuring they remain at the forefront of today’s fast-evolving world. We connect the right talent to the right opportunities through a comprehensive ecosystem that unites human intelligence and technology, guided by our core values of Quality, Commitment, Partnership, and Ingenuity. Specializing in workforce solutions, our services include Contingent Staffing, Bulk/Project Staffing, and Direct Hire services across diverse industries such as IT, Healthcare, Life Sciences, and more. We deliver unmatched results with a global network of highly skilled professionals, operating in countries including the USA, Canada, Germany, Japan, and beyond. Join us for a dynamic workplace offering rapid career growth, excellent benefits, and a healthy work-life balance. Location: Remote (U.S.-based) Compensation: Base ($85k to $158k ) + 8% annual bonus (performance-based) Visa Sponsorship: Not available Schedule: Some on-call support required Position Purpose: • Resolve security incidents and recommend improvements to strengthen enterprise security. • Execute incident response plans and contribute to scalable preventative security measures. • Identify attack patterns and enhance the organization's defensive posture. • Collaborate with business units on remediation plans and present insights to senior leadership. • Review production systems and network configurations to ensure compliance with security standards. • Prepare and manage prevention and resolution processes for security breaches. • Implement audit schedules, review access authorizations, and perform access control testing. • Develop automated scripts and contingency plans triggered during detected cyberattacks. • Coordinate with Information Security Architects, Engineers, and infrastructure stakeholders. • Manage prioritized alert notifications, escalation trees, and triage of security alerts. • Integrate third-party threat monitoring and reporting systems with internal communications tools. • Conduct post-incident analyses using logs and traffic data to identify intrusions or policy violations. • Ensure adherence to all information security policies and standards. Education and Experience: • Bachelor's degree in computer science, engineering, mathematics, statistics, or a related field. • 4–6 years of professional cybersecurity experience. • Equivalent experience considered based on proven skill and accomplishments. Technical Skills: • 4–6 years of cloud cybersecurity experience focused on incident triage and response. • Hands-on experience with AWS and Azure environments. • Strong understanding of threat actor tools, tactics, and processes (TTPs). • Knowledge of Indicators of Compromise (IOC). • Experience with Wiz and Wiz Defend preferred. • Expertise in endpoint protection and enterprise detection tools (e.g., CrowdStrike, MS Defender). • Solid understanding of network infrastructure (routers, switches, firewalls). Certifications (preferred): • SANS GIAC Security Essentials (GSEC), GIAC Certified Intrusion Analyst (GCIA), or GIAC Certified Incident Handler (GCIH). Preferred Experience: • Healthcare industry exposure (helpful but not required). Soft Skills: • Analytical mindset with strong problem-solving abilities. • Ability to manage projects and work independently. • Strong accuracy, judgment, and decision-making under pressure. • Clear communication and presentation capabilities. Apply tot his job Apply To this Job

Similar Jobs