
Tier 2 Incident Response Analyst
Tyto Athene, Washington, District of Columbia, United States
Tier 2 Incident Response Analyst (IR)
Tyto Athene is searching for a Tier 2 Incident Response Analyst (IR) to support a law enforcement customer in Washington, DC. Our IR analysts form the backbone of our cybersecurity services. You will play a critical role in securing our customers by monitoring our tools, triaging alerts, and investigating potential cyber threats. As a SOC team member, you will also serve as the initial point of contact for cybersecurity incidents, ensuring prompt and effective responses. We provide a supportive environment for you to learn from senior SOC team members, cross‑train for other positions, and attend external training. Join us and delve into the complexities of monitoring enterprise networks, learning basic incident response techniques, and how to investigate phishing threats against our clients.
Responsibilities
Utilize security tools to analyze, investigate, and triage security alerts
Monitor customers' environments, including cloud and SaaS solutions, for evidence of adversarial activity
Perform in‑depth analysis and investigation of high‑priority cybersecurity incidents
Utilize advanced tools, such as host‑based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact
Collaborate with cyber threat hunting and cyber threat intelligence teams
Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures
Accurately document triage findings and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System (IMS)
Learn new open and closed‑source investigative techniques
Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
Help shape the evolution of processes and procedures of the SOC
Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Required Qualifications
Minimum of four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
Bachelor’s Degree or higher in Cybersecurity or related (preferred)
Experience with SIEM tools; Sumo Logic/Splunk preferred
Knowledge of common attacker tools, techniques and procedures (TTP)
Experience with major cloud service provider offerings
Knowledge of malware
Knowledge of enterprise architecture including zero trust principles
Knowledge of Windows and Unix operating systems
Knowledge of common phishing techniques and how to investigate them
Ability to convey information succinctly through speaking, email, and presentations
Comfortable in customer‑facing environments
Ability to maintain a positive customer service mentality
Desired Qualifications
Previous SOC or incident response experience
Working knowledge of regex and scripting languages
Relevant certifications such as those from GIAC or CompTIA
Initiative to ask for assistance and offer fresh ideas to improve the SOC’s performance
Clearance
Applicable US Government Clearance required
Location
This hybrid role is expected to be on the client site at least 2 days per week.
Compensation
Compensation is unique to each candidate and relative to the skills and experience they bring to the position. The salary range is typically between $110,000–$120,000, though actual compensation may vary.
Benefits
Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave.
Equal Opportunity Employer
Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any characteristic protected by applicable law.
#J-18808-Ljbffr
Tyto Athene is searching for a Tier 2 Incident Response Analyst (IR) to support a law enforcement customer in Washington, DC. Our IR analysts form the backbone of our cybersecurity services. You will play a critical role in securing our customers by monitoring our tools, triaging alerts, and investigating potential cyber threats. As a SOC team member, you will also serve as the initial point of contact for cybersecurity incidents, ensuring prompt and effective responses. We provide a supportive environment for you to learn from senior SOC team members, cross‑train for other positions, and attend external training. Join us and delve into the complexities of monitoring enterprise networks, learning basic incident response techniques, and how to investigate phishing threats against our clients.
Responsibilities
Utilize security tools to analyze, investigate, and triage security alerts
Monitor customers' environments, including cloud and SaaS solutions, for evidence of adversarial activity
Perform in‑depth analysis and investigation of high‑priority cybersecurity incidents
Utilize advanced tools, such as host‑based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact
Collaborate with cyber threat hunting and cyber threat intelligence teams
Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures
Accurately document triage findings and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System (IMS)
Learn new open and closed‑source investigative techniques
Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
Help shape the evolution of processes and procedures of the SOC
Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Required Qualifications
Minimum of four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
Bachelor’s Degree or higher in Cybersecurity or related (preferred)
Experience with SIEM tools; Sumo Logic/Splunk preferred
Knowledge of common attacker tools, techniques and procedures (TTP)
Experience with major cloud service provider offerings
Knowledge of malware
Knowledge of enterprise architecture including zero trust principles
Knowledge of Windows and Unix operating systems
Knowledge of common phishing techniques and how to investigate them
Ability to convey information succinctly through speaking, email, and presentations
Comfortable in customer‑facing environments
Ability to maintain a positive customer service mentality
Desired Qualifications
Previous SOC or incident response experience
Working knowledge of regex and scripting languages
Relevant certifications such as those from GIAC or CompTIA
Initiative to ask for assistance and offer fresh ideas to improve the SOC’s performance
Clearance
Applicable US Government Clearance required
Location
This hybrid role is expected to be on the client site at least 2 days per week.
Compensation
Compensation is unique to each candidate and relative to the skills and experience they bring to the position. The salary range is typically between $110,000–$120,000, though actual compensation may vary.
Benefits
Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave.
Equal Opportunity Employer
Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any characteristic protected by applicable law.
#J-18808-Ljbffr