NIH - Incident Response Specialist

Incident Response AnalystSecurity AnalystFull TimeRemoteMid LevelTeam 11-50

Location

United States

Posted

2 days ago

Salary

Not specified

Seniority

Mid Level

Incident ResponseSIEMLog AnalysisNIST Cybersecurity FrameworkThreat DetectionFirewall ManagementIntrusion DetectionEndpoint Protection

Job Description

cFocus Software seeks a Incident Response Analyst to join our program supporting the National Institutes of Health (NIH). This position is remote. This position requires a Public Trust clearance.
Qualifications:
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related technical discipline.
  • Minimum 2–5 years of experience supporting cybersecurity operations or incident response activities.
  • Experience supporting incident response investigations and remediation activities.
  • Familiarity with SIEM tools, log analysis, and threat detection technologies.
  • Understanding of NIST cybersecurity frameworks and federal security requirements.
  • Ability to analyze security alerts and investigate potential cybersecurity incidents.
  • Strong analytical, documentation, and communication skills.
Duties:
  • Monitor security alerts and respond to cybersecurity incidents affecting NCATS systems.
  • Conduct incident triage, analysis, containment, eradication, and recovery activities.
  • Coordinate incident response activities with NCATS IT teams, security leadership, and NIH cybersecurity teams.
  • Maintain incident documentation and prepare incident response reports.
  • Support development and improvement of incident response procedures and playbooks.
  • Investigate and analyze security incidents to determine root cause, scope, and impact.
  • Perform technical analysis of system logs, network activity, and endpoint data during investigations.
  • Coordinate containment and remediation actions for identified incidents.
  • Maintain incident tickets and track investigation progress.
  • Develop post‑incident analysis reports and recommend improvements to strengthen defenses.
  • Support operational cybersecurity monitoring and response activities.
  • Assist with security monitoring tools such as SIEM, intrusion detection systems, and endpoint protection systems.
  • Participate in threat hunting and vulnerability mitigation activities.
  • Provide technical support for incident response exercises and security testing activities.
  • Support secure firewall management and network security monitoring activities.
  • Assist with implementation of firewall rules following least‑privilege and default‑deny principles.
  • Participate in firewall rule reviews and validation of network traffic logs.
  • Support monitoring of network segmentation controls and security zones.
  • Validate logging configurations to ensure compliance with federal logging requirements.


 

Related Job Pages

More Incident Response Analyst Jobs

Incident Response Analyst3 days ago
Full TimeRemoteTeam 10,001+Since 1931H1B Sponsor

Level 2 Incident Response Analyst investigating cybersecurity incidents at Allstate

Cyber SecuritySplunk
California
$100K - $160K / year
Incident Response Analyst6 days ago
Full TimeRemoteTeam 51-200

The Fire Investigator is responsible for studying fire and explosion scenes to determine the cause and origin, conveying findings clearly through written reports, and defending opinions in court if necessary. Duties include timely field visits for investigations, providing unbiased analysis, conducting daily field studies, and maintaining consistent communication with customers regarding project updates.

United States
CrowdStrike logo

Incident Response Analyst – SkillBridge

CrowdStrike

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?

Incident Response Analyst7 days ago
InternshipRemoteTeam 5,001-10,000Since 2011H1B Sponsor

Incident Response Analyst supporting cybersecurity efforts at CrowdStrike

LinuxTCP/IP
United States
TaskUs logo

ERT Team Leader-3

TaskUs

Digital Customer Experience. Trust & Safety. AI Services.

Incident Response Analyst7 days ago
Full TimeRemoteTeam 10,001+Since 2008H1B Sponsor

The Team Leader will drive team performance to consistently meet metrics and goals by coaching, motivating, and engaging teammates to ensure productivity and superior customer experience delivery. Responsibilities include managing day-to-day operations, handling HR-related issues, conducting performance appraisals, and acting as a communication conduit between agents and management.

United States