CyberArk Logo

CyberArk

Incident Response Senior Consultant

Posted 6 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in Newton, MA
200K-275K Annually
Senior level
Remote
Hiring Remotely in Newton, MA
200K-275K Annually
Senior level
As an Incident Response Senior Consultant, you'll lead incident investigations, perform forensics analysis, develop response initiatives, and collaborate with customer teams to manage security incidents.
The summary above was generated by AI

Company Description

About CyberArk:
CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit our CyberArk blogs or follow us on X, LinkedIn or Facebook.

Job Description

CyberArk is seeking a highly skilled Incident Response Senior Consultant to join our team. In this role you will be a hands-on technical leader and navigate complex technical incidents, forensics analysis, threat hunting, and malware analysis. You will assist customers in rapidly and effectively resolving security incidents at scale, providing comprehensive incident response, including investigation, containment, and crisis management.

Responsibilities:

  • Investigate and analyze incidents with EDR systems to respond to ongoing security incidents in real-time.
  • Develop Incident Response initiatives that improve our ability to respond and remediate security incidents effectively.
  • Tracing malware activity and patterns and understanding how to remove malware non-destructively.
  • Recognize attacker Tools, Tactics, and Procedures (TTP) and Indicators of Compromise (IOC) and apply to future incident response events.
  • Analyze binary files to determine the legitimacy and extract IOCs when possible
  • Conducting forensic examinations on physical devices and performing analyses on live and collected memory.
  • Create and refine detection and incident response playbooks.
  • Collaborate with internal and customer teams to investigate and contain incidents.
  • Produce high-quality written reports, presentations, and recommendations, to key stakeholders including customer leadership, and legal counsel.
  • Establishing a collaborative environment for sharing data on machine timelines and suspicious events.
  • Create operational metrics, key performance indicators (KPIs), and service level objectives to measure team competence.

#LI-KR1

Qualifications

  • 4+ years’ experience working with incident investigations and containment procedures
  • 4+ years’ experience with network, disk, memory, and cloud forensics
  • Minimum 1 year of experience leading Incident Response investigations and performing the following: network/log forensics, malware analysis, disk forensics, and memory forensics.
  • Excellent time and project management skills with strong written and verbal communication abilities, capable of creating clear documentation and conveying complex technical concepts concisely.
  • Skilled in building and maintaining effective relationships with customers, managing expectations, and ensuring seamless collaboration to achieve shared objectives
  • Experienced deploying software within customer environments using tools such as Intune, SCCM, GPO, AWS System Manager, Azure Automation, Ansible, Puppet, JAMF, and scripts.
  • Experienced with the following:
    • EDRs such as CrowdStrike Falcon, SentinelOne, MDE
    • Leading projects and debriefing customers
    • Creating and modification of scripts
    • Enterprise security architecture and security controls.
    • Cloud incidents and forensic responses.
    • Malware triage analysis and disk or memory forensics for Windows, macOS, or Linux
    • Software deployment tools such as Intune, Jamf, Ansible, Puppet, SCCM, CPO, and AWS System Manager.
  • Preferred experience:
    • Collection tools such as Splunk, Kibana, or ELK Stack
    • Familiarity with collection tools like Splunk, Kibana, or the ELK Stack.
  • Preferred certifications: GCIH, GX-FA, GNFA, GREM, GCIA, CREST CPIA, CREST CFIA, CFCE, CEH, etc.

Additional Information

CyberArk is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status. 

We are unable to sponsor or take over sponsorship of employment Visa at this time.

The salary range for this position is $200,000 – $275,000/year, plus commissions or discretionary bonus, which will be based on the employee’s performance. Base pay may also vary considerably depending on job-related knowledge, skills, and experience. The compensation package includes a wide range of medical, dental, vision, financial, and other benefits. 
 

Top Skills

Ansible
Aws System Manager
Azure Automation
Crowdstrike Falcon
Edr
Elk Stack
Gpo
Intune
JAMF
Kibana
Mde
Puppet
Sccm
Sentinelone
Splunk

CyberArk Newton, Massachusetts, USA Office

60 Wells Avenue, Newton, MA, United States, 02459

Similar Jobs

12 Days Ago
Remote
Hybrid
USA
105K-160K Annually
Senior level
105K-160K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves leading incident response engagements, performing forensic investigations, malware analysis, and producing reports while managing customer communications.
Top Skills: GoPerlPowershellPythonSplunk
12 Days Ago
Remote
Hybrid
USA
105K-160K Annually
Senior level
105K-160K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Responsible for leading incident response projects and improving security for clients' Azure and M365 environments, while managing forensic analyses and adversary simulations.
Top Skills: AzureCi/CdCloud Incident ResponseDevOpsForensic Analysis ToolsM365
2 Hours Ago
Easy Apply
Remote
USA
Easy Apply
160K-195K
Senior level
160K-195K
Senior level
Fintech • Information Technology • Payments • Software • Financial Services
The Senior Support Engineer will provide production support for Kubernetes trading services, automate processes using Python, and enhance monitoring systems.
Top Skills: ArgocdAWSFalcon LogscaleFixGCPGrafanaJenkinsKubernetesPrometheusPythonSQL

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account