Level 2 Incident Response Analyst
Location
California
Posted
4 days ago
Salary
$100K - $160K / year
Seniority
Senior
Job Description
Job Requirements
- 4+ years of hands-on experience in a SOC environment with depth in incident triage/response.
- Demonstrated ability in analyzing, triaging, & remediating complex security incidents.
- Solid knowledge & hands-on experience in log analysis, network traffic analysis, malware investigation, & digital forensics.
- Background with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
- Good knowledge of EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
- Relevant certifications preferred: CompTIA CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), Certified Information Systems Security Professional (CISSP).
Benefits
- Health insurance
- Retirement plans
- Paid time off
- Flexible work arrangements
- Professional development opportunities
Related Guides
Related Categories
Related Job Pages
More Incident Response Analyst Jobs
The Fire Investigator is responsible for studying fire and explosion scenes to determine the cause and origin, conveying findings clearly through written reports, and defending opinions in court if necessary. Duties include timely field visits for investigations, providing unbiased analysis, conducting daily field studies, and maintaining consistent communication with customers regarding project updates.
Incident Response Analyst – SkillBridge
CrowdStrikeCrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?
Incident Response Analyst supporting cybersecurity efforts at CrowdStrike
The Team Leader will drive team performance to consistently meet metrics and goals by coaching, motivating, and engaging teammates to ensure productivity and superior customer experience delivery. Responsibilities include managing day-to-day operations, handling HR-related issues, conducting performance appraisals, and acting as a communication conduit between agents and management.
ETS Analyst V - Major Incident Management
Navy Federal Credit UnionNavy Federal provides much more than a job. We provide a meaningful career experience, including a culture that is energized, engaged and committed; and fierce appreciation for our teams, who are rewarded with highly competitive pay and generous benefits and perks. FORTUNE 100 Best Companies to Work For® 2025 Yello and WayUp Top 100 Internship Programs Computerworld® Best Places to Work in IT Newsweek Most Loved Workplaces 2025 PEOPLE® Companies That Care Newsweek Most Trustworthy Companies in America Military Times 2025 Best for Vets Employers Best Companies for Latinos to Work for 2025 Forbes® 2025 America’s Best Large Employers Forbes® 2025 America's Best Employers for New Grads Forbes® 2025 America's Best Employers for Tech Workers 2025 RippleMatch Campus Forward Award Winner for Overall Excellence Military.com Top Military Spouse Employers 2025 2025 Handshake Early Talent Award
The Major Incident Management team drives coordination and recovery efforts for major outages impacting Enterprise Technology Services, operating 24x7 to restore services efficiently. Responsibilities include actively monitoring systems, documenting recovery timelines, managing support team activities, and notifying business units of impacts and ongoing recovery.



