Dun & Bradstreet

Senior Incident Response Analyst

Dun & Bradstreet

full-time

Posted on:

Location Type: Hybrid

Location: Florham ParkNew JerseyUnited States

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Lead high‑fidelity alert investigations, performing deep technical analysis to rapidly identify, contain, and remediate threats.
  • Own complex incident investigations, driving technically precise conclusions and elevating the organization’s detection and response maturity.
  • Champion process development, identifying gaps, designing scalable workflows, and implementing improvements that strengthen the Incident Response program.
  • Create and refine technical playbooks, documentation, and response guides, ensuring clarity, consistency, and operational excellence.
  • Mentor and uplift junior analysts, providing guidance, coaching, and training to build a high-performing team.
  • Serve as the escalation point for critical and ambiguous cases, applying advanced threat analysis and sound judgment under pressure.
  • Collaborate with engineering, IT, Legal, HR, and business partners to resolve incidents holistically and drive enterprise-wide security improvements.
  • Apply strong analytical and technical expertise to continuously enhance SOC processes, workflows, and response capabilities.
  • Contribute to the evolution of our detection landscape, partnering with detection engineering to improve log ingestion, alert logic, and signal quality.
  • Assess and mitigate AI‑related security risks, including model misuse, prompt injection, data leakage, and emerging automation attack vectors.
  • Participate in an on‑call rotation, serving as a trusted responder for high‑severity incidents.

Requirements

  • Bachelor's degree required with 5+ years of relevant experience
  • At least 1 SANS/GIAC Certification (GCIH, GREM, GCFA preferred)
  • Strong Hands-on experience with: SIEM Platforms (Splunk, Microsoft sentinel, etc), EDR Tools (CrowdStrike, Carbon Black), Cloud environments (Azure, AWS, GCP, AliCloud), Network log analysis (Netflows and PCAP files)
  • Deep understanding of: Mitre ATT&CK framework, Malware behavior and exploitation techniques, Windows, Linux, and macOS internals
  • Script analysis (Javascript, VBscript, powershell, python)
  • Malicious binary analysis (Windows, MacOS, Linux)
  • Clear communication rooted in technical competence
  • Confidence discussing findings with peers and senior management.
Benefits
  • Generous paid time off in your first year, increasing with tenure.
  • Up to 16 weeks 100% paid parental leave after one year of employment.
  • Paid sick time to care for yourself or family members.
  • Education assistance and extensive training resources.
  • Do Good Program: Paid volunteer days & donation matching.
  • Competitive 401k with company matching.
  • Health & wellness benefits, including discounted Wellhub membership rates.
  • Medical, dental & vision insurance for you, spouse/partner & dependents.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
incident investigationthreat analysisprocess developmenttechnical playbookslog ingestionalert logicscript analysismalicious binary analysisnetwork log analysisAI-related security risks
Soft Skills
mentoringcoachingcommunicationanalytical expertisejudgment under pressurecollaborationguidanceteam buildingoperational excellenceproblem-solving
Certifications
SANS/GIAC CertificationGCIHGREMGCFA