Allstate

Level 3 Incident Response Analyst

Allstate

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $100,000 - $160,000 per year

Job Level

About the role

  • Lead end-to-end incident response activities from triage through closure
  • Manage high-severity threats from start to finish, ensuring all actions are thoroughly completed
  • Partner with engineering teams to improve detection rules and integrate tooling that enhances security capabilities
  • Facilitate incident response retrospectives and surface operational gaps and improvement opportunities
  • Mentor SOC analysts and serve as a subject-matter expert for complex security challenges
  • Help refine and maintain SOC workflows to ensure clarity, efficiency, and ongoing maturation
  • Analyze large volumes of security telemetry to identify patterns, build custom queries, and uncover hidden threats
  • Develop application-specific detection rules and response procedures with system and application owners
  • Coordinate evidence collection and produce documentation for both technical and non-technical audiences
  • Contribute to the development of operational and executive reporting
  • Create and prioritize backlogs that drive desired business outcomes by incorporating insights and improvement actions identified during incident response retrospectives
  • Maintain active communication with teammates and cross-functional partners to strengthen overall response capability

Requirements

  • 7+ years of hands-on Cybersecurity experience
  • 5+ years in Incident Response and/or Digital Forensics
  • Strong background in Incident Response, Incident Handling, and Security Operations
  • Extensive knowledge of Windows and Linux operating systems and associated applications (IIS, SQL, Apache, etc)
  • Strong knowledge of cloud computing services including Azure, GCP, & AWS
  • Proficiency with EDR/XDR platforms (CrowdStrike, SentinelOne, Microsoft XDR)
  • Experience using SIEM platforms (Splunk, Microsoft Sentinel, Elastic, Chronicle)
  • Next Generation firewalls (Cisco ASA, Palo Alto experience)
  • Practical knowledge of MITRE ATT&CK and common threat-actor TTPs
  • PCAP and network-traffic analysis skills using Wireshark or Zeek
  • Scripting familiarity (Python, PowerShell, Bash)
Benefits
  • Equal Opportunity employer – Veterans/Disabled and other protected categories
  • Candidates must possess authorization to work in the United States
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
Incident ResponseDigital ForensicsSecurity OperationsWindows Operating SystemLinux Operating SystemCloud ComputingEDR/XDR PlatformsSIEM PlatformsNetwork Traffic AnalysisScripting
Soft Skills
LeadershipMentoringCommunicationCollaborationAnalytical ThinkingProblem SolvingOperational ImprovementDocumentation