On-Demand Freelance Incident Response Analyst (Remote)

mk consulting • Israel
Remote
Apply
AI Summary

mk consulting seeks an elite, on-demand Incident Response Analyst for a 100% remote, freelance role. You will be the primary technical responder for critical incidents, handling triage, containment, and eradication across diverse client environments. This position requires proven, hands-on experience in cybersecurity incident response.

Key Highlights
100% remote, freelance, on-demand role
Primary technical responder for critical incidents
Responsibilities include digital forensics, malware analysis, network intrusion, and cloud compromise assessments
Assists in strategic security recommendations, documentation, and playbook development
Technical Skills Required
Digital forensics Memory analysis Endpoint analysis Evidence acquisition Malware analysis Reverse engineering Threat hunting Network traffic analysis Cloud security incident investigation Python scripting
Benefits & Perks
100% remote
Freelance/On-demand work

Job Description


Company Description

Join our network as an elite, on-demand Incident Response Analyst. This is a 100% remote, freelance role requiring immediate availability when a critical incident strikes. You will be the primary technical responder, responsible for initial triage, containment, and eradication across diverse client environments. We require proven, hands-on experience, not just theory.


Role Description

This is a freelancing, on-demand remote role for an Incident Response (IR) Analyst. Responsibilities include conducting and supporting cybersecurity incident response processes such as threat detection, containment, and eradication. The IR Analyst will be tasked with performing digital forensics, malware analysis, network intrusion investigations, and cloud compromise assessments. Additionally, the analyst will assist in preparing strategic security recommendations, documenting findings, and developing incident response playbooks as part of a collaborative team.


Qualifications

  • Expertise in digital forensics, memory and endpoint analysis, and evidence acquisition
  • Proficiency in malware analysis, reverse engineering, and threat hunting techniques
  • Experience in network traffic analysis and investigating cloud-based security incidents
  • Familiarity with Python scripting for automation and development of investigation tools
  • Strong communication skills for documentation, reporting, and client interaction
  • Ability to work independently in remote environments while coordinating with diverse teams
  • Preferred: Certifications such as GIAC Certified Incident Handler (GCIH), Certified Forensic Analyst (GCFA), or equivalent
  • Preferred: Hands-on experience in security architecture or playbook development

Subscribe our newsletter

New Things Will Always Update Regularly