We are seeking a Cybersecurity Incident Response Analyst to support daily security operations and incident response activities. This role is focused on hands-on monitoring, investigation, and response to security alerts using established procedures and tools. The position is designed for a junior to early mid-level professional who can quickly ramp up and contribute within the first 1–2 weeks.
Key Highlights
Key Responsibilities
Technical Skills Required
Job Description
Job Title: Cybersecurity Incident Response Analyst
Job Type
Contract
Duration
Initial 6 months, with strong likelihood of extension in 6-month increments
Work Model
100% Remote
Role Overview
We are seeking a Cybersecurity Incident Response Analyst to support daily security operations and incident response activities. This role is focused on hands-on monitoring, investigation, and response to security alerts using established procedures and tools. The position is designed for a junior to early mid-level professional who can quickly ramp up and contribute within the first 1–2 weeks.
Work Schedule
- Total: 40 hours per week
- Shift: Thursday to Monday
Coverage Details:
- Thursday, Friday, Monday: Overlapping coverage with internal team
- Saturday & Sunday: Solo coverage required
Interested in remote work opportunities in Cyber Security? Discover Cyber Security Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
Weekend coverage is a key requirement for this role.
Notice Period Requirement
- Maximum notice period: 30 days or less only
Experience Level
- 2–3 years of Incident Response or SOC Analyst experience
- Junior to early mid-level profile
- Not expected to function as a sole IR lead
- Strong, practical operators preferred over senior “rock star” profiles
Must-Have Technical Experience
Priority will be given to hands-on operational experience.
Core Platform Experience:
- CrowdStrike (mandatory)Daily operational use required
- Candidates without CrowdStrike experience will not be prioritized
Additional Required Experience:
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- Prior experience in Incident Response or SOC Analyst roles
- Experience responding to security alerts and managing active incidents
- Familiarity with Microsoft 365 / O365 security portals
- Ability to follow structured playbooks and escalation procedures
Certifications & Education
- No degree required
- No certifications required or preferred
- Practical, hands-on experience is the key evaluation factor
Key Responsibilities
- Execute documented daily security operations playbooks
- Monitor and respond to real-time alerts in CrowdStrike
- Investigate and manage security incidents based on defined procedures
- Follow escalation paths and collaborate with internal teams when required
- Maintain accurate incident documentation
- Ramp up quickly and become productive within 1–2 weeks
Language Requirement
- English proficiency: B2 or higher
Similar Jobs
Explore other opportunities that match your interests
Paradigm Tech
Security Engineer III
Fanatics