
Senior Incident Response Analyst
Dun & Bradstreet
full-time
Posted on:
Location Type: Hybrid
Location: Florham Park • New Jersey • United States
Visit company websiteExplore more
Job Level
About the role
- Lead high‑fidelity alert investigations, performing deep technical analysis to rapidly identify, contain, and remediate threats.
- Own complex incident investigations, driving technically precise conclusions and elevating the organization’s detection and response maturity.
- Champion process development, identifying gaps, designing scalable workflows, and implementing improvements that strengthen the Incident Response program.
- Create and refine technical playbooks, documentation, and response guides, ensuring clarity, consistency, and operational excellence.
- Mentor and uplift junior analysts, providing guidance, coaching, and training to build a high-performing team.
- Serve as the escalation point for critical and ambiguous cases, applying advanced threat analysis and sound judgment under pressure.
- Collaborate with engineering, IT, Legal, HR, and business partners to resolve incidents holistically and drive enterprise-wide security improvements.
- Apply strong analytical and technical expertise to continuously enhance SOC processes, workflows, and response capabilities.
- Contribute to the evolution of our detection landscape, partnering with detection engineering to improve log ingestion, alert logic, and signal quality.
- Assess and mitigate AI‑related security risks, including model misuse, prompt injection, data leakage, and emerging automation attack vectors.
- Participate in an on‑call rotation, serving as a trusted responder for high‑severity incidents.
Requirements
- Bachelor's degree required with 5+ years of relevant experience
- At least 1 SANS/GIAC Certification (GCIH, GREM, GCFA preferred)
- Strong Hands-on experience with: SIEM Platforms (Splunk, Microsoft sentinel, etc), EDR Tools (CrowdStrike, Carbon Black), Cloud environments (Azure, AWS, GCP, AliCloud), Network log analysis (Netflows and PCAP files)
- Deep understanding of: Mitre ATT&CK framework, Malware behavior and exploitation techniques, Windows, Linux, and macOS internals
- Script analysis (Javascript, VBscript, powershell, python)
- Malicious binary analysis (Windows, MacOS, Linux)
- Clear communication rooted in technical competence
- Confidence discussing findings with peers and senior management.
Benefits
- Generous paid time off in your first year, increasing with tenure.
- Up to 16 weeks 100% paid parental leave after one year of employment.
- Paid sick time to care for yourself or family members.
- Education assistance and extensive training resources.
- Do Good Program: Paid volunteer days & donation matching.
- Competitive 401k with company matching.
- Health & wellness benefits, including discounted Wellhub membership rates.
- Medical, dental & vision insurance for you, spouse/partner & dependents.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
incident investigationthreat analysisprocess developmenttechnical playbookslog ingestionalert logicscript analysismalicious binary analysisnetwork log analysisAI-related security risks
Soft Skills
mentoringcoachingcommunicationanalytical expertisejudgment under pressurecollaborationguidanceteam buildingoperational excellenceproblem-solving
Certifications
SANS/GIAC CertificationGCIHGREMGCFA