Cyber Incident Analyst

Kforce Inc.
Boston, United States of America
yesterday

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Boston, United States of America

Tech stack

Microsoft Windows
Amazon Web Services (AWS)
Azure
Cloud Computing Security
Computer Security
Linux
Intrusion Detection and Prevention
Log Analysis
Security Information and Event Management
Google Cloud Platform
Malware
Cybercrime
Prisma Cloud Platform

Job description

Kforce has a client in need of a Cyber Incident Analyst in Boston, MA. Responsibilities:

  • Monitor, triage, and respond to security alerts across network, endpoint, cloud, identity, and email systems
  • Lead complex cyber incident investigations from detection through resolution
  • Manage multiple investigations and coordinate cross-functional response teams
  • Perform root cause analysis including malware, forensic, and log analysis
  • Develop, tune, and maintain threat detection rules and incident playbooks
  • Analyze and apply threat intelligence to improve detection and response
  • Communicate incident status, findings, and remediation recommendations to stakeholders
  • Produce incident metrics, reporting, and security posture insights
  • Participate in risk assessments and emerging threat evaluations
  • Provide rotational on-call support for critical incidents

Requirements

  • Bachelor's degree in a related field or equivalent experience
  • 10+ years in information security with significant SOC, NOC, or CIRT experience
  • 8+ years of hands-on incident response and threat hunting experience
  • Advanced knowledge of SIEM, EDR, cloud security, intrusion detection, and malware remediation
  • Strong experience with forensic analysis tools and malicious code investigations
  • Expertise with Windows and Linux operating systems
  • Knowledge of NIST and regulated environments including HIPAA, GDPR, PCI, or FedRAMP
  • Strong analytical, investigative, and root cause analysis skills
  • Excellent written and verbal communication skills with executive reporting experience
  • Proven ability to operate under pressure during high-severity incidents
  • Experience with common security tools and platforms such as CrowdStrike, Prisma Cloud, Tenable, AWS, Azure, and GCP
  • Relevant SANS certifications preferred

Benefits & conditions

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

About the company

By clicking "Apply Today" you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.

Apply for this position