Senior Cybersecurity Incident Responder

cyber focus ai United State
Remote
Apply
AI Summary

Cyber Focus AI is seeking a Senior Cybersecurity Incident Responder to investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments. The ideal candidate will have 3-5 years of cybersecurity experience and deep knowledge of hybrid Microsoft environments.

Key Highlights
Investigate and respond to escalated security incidents
Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
Conduct security assessments of Azure/Microsoft 365 configurations and implement hardening recommendations
Technical Skills Required
PowerShell Python Microsoft Defender suite Azure Sentinel Azure Microsoft 365 on-premises AD SIEM platforms security monitoring tools
Benefits & Perks
Salary up to $100,000
Fully remote work environment
Opportunity for career advancement and growth
Engaging work culture
Participation in SOC on-call rotation

Job Description


Cyber Focus AII's mission is to help cybersecurity professionals discover cutting-edge opportunities in their field. We are not a staffing firm or agency. Cyber Focus AI does not hire for these roles—we use advanced technology to locate and verify them from actual employers.

Employer Industry: Cybersecurity and IT Managed Services

Why Consider This Job Opportunity

  • Salary up to $100,000
  • Fully remote work environment, offering flexibility
  • Opportunity for career advancement and growth within a fast-growing organization
  • Engaging work culture that encourages self-motivation and independent problem-solving
  • Participation in SOC on-call rotation, enhancing skill development and experience
  • Chance to work with advanced security technologies and contribute to national security efforts

What To Expect (Job Responsibilities)

  • Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments
  • Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
  • Conduct security assessments of Azure/Microsoft 365 configurations and implement hardening recommendations
  • Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns
  • Develop and maintain incident response playbooks for various attack scenarios

What Is Required (Qualifications)

  • 3-5 years in cybersecurity with 2+ years SOC experience
  • Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD)
  • Experience with SIEM platforms and security monitoring tools
  • Scripting proficiency (PowerShell, Python)
  • Microsoft Certified: Security Operations Analyst (SC-200) and one additional security certification

How To Stand Out (Preferred Qualifications)

  • Microsoft Certified: Azure Security Engineer (AZ-500)
  • Microsoft Certified: Identity and Access Administrator (SC-300)
  • CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification
  • CISSP, SSCP, CCSP

#Cybersecurity #RemoteWork #CareerOpportunity #IncidentResponse #MicrosoftSecurity

We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately.

We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer.

#CyberFocusAI

Subscribe our newsletter

New Things Will Always Update Regularly