Security Analyst / Incident Handler
Jobs via DiceResume Keywords to Include
Make sure these keywords appear in your resume to improve ATS scoring
Sign up free to auto-tailor your resume with all these keywords and get a higher ATS score
Job Description
Dice is the leading career destination for tech experts at every stage of their careers. Our client, IntellectFaces, Inc., is seeking the following. Apply via Dice today!
Key Responsibilities
- Monitor security alerts and events using SIEM tools and other security platforms.
- Investigate, analyze, and respond to security incidents and alerts.
- Perform incident triage, containment, eradication, and recovery activities.
- Conduct log analysis to identify suspicious activities and security breaches.
- Document incidents, investigation findings, and remediation steps.
- Collaborate with IT and security teams to resolve vulnerabilities and security gaps.
- Support threat detection, threat hunting, and vulnerability management activities.
- Maintain and improve incident response procedures and playbooks.
- Participate in post-incident reviews and provide recommendations to prevent recurrence.
- Assist in implementing security monitoring tools and controls.
Required Skills
- Strong understanding of cybersecurity principles and incident response processes.
- Experience with SIEM platforms (Splunk, QRadar, Sentinel, etc.).
- Knowledge of network security, firewalls, IDS/IPS, and endpoint security.
- Familiarity with Windows, Linux, and network logs analysis.
- Understanding of threat intelligence, malware analysis, and attack vectors.
- Experience with security frameworks such as NIST, ISO 27001, or CIS.
- Strong analytical and problem-solving skills.
- Good documentation and communication skills.
Qualifications
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or related field.
- 2–5 years of experience in security operations, SOC, or incident response.
- Relevant certifications are a plus:
- CompTIA Security+
- CEH (Certified Ethical Hacker)
- GIAC / GCIH
- CISSP (preferred for senior roles)
Preferred Skills
- Experience with EDR/XDR tools (CrowdStrike, Carbon Black, Defender).
- Knowledge of cloud security (AWS, Azure, Google Cloud Platform).
- Familiarity with automation and scripting (Python, PowerShell, Bash).
- Experience working in a SOC environment.
Want AI-powered job matching?
Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.
Get Started Free