Job Board
LogoLogo

Get Jobs Tailored to Your Resume

Filtr uses AI to scan 1000+ jobs and finds postings that perfectly matches your resume

TEKsystems Logo

Incident Response Analyst

TEKsystems

$60 - $90
Sep 13, 2025
Remote, US
Apply Now

The digital forensic/incident response analyst is a key member of an organization's cybersecurity team who identifies, investigates, and responds to security incidents. Their primary role is to ensure that incidents are handled efficiently and effectively, minimizing damage and allowing operations to resume as quickly as possible.

Requirements

  • Demonstrate and provide in-depth knowledge with Threat Actor tactics, techniques, and procedures (TTPs), log analysis, network traffic analysis, and analyzing system artifacts (file system, memory, running processes, network connections) for indicators of infection/compromise
  • Provide forensic tool expertise with proficiency in using software such as Magnet Forensics, Joe Sandbox, IDA Pro, and/or Wireshark
  • Support Malware Analysis to understand its behavior and impact as well as identifying indicators of compromise (IOCs)
  • Performing rapid response and triage of security incidents, data breaches, malware infection, & other system compromises as escalated by the Cyber Defense Operations Center (CDOC)
  • Perform containment & eradication by assessing the situation, containing threats, & eradicating it from affected systems
  • Adhere to strict procedures for evidence collection, ensuring the integrity of digital evidence throughout the investigation (Chain of Custody)
  • Familiarity with security controls/tooling used by TransUnion in an IR capacity, such as: Splunk and Elasticsearch, Splunk SOAR (For case management), Endpoint: Microsoft Defender for Endpoint, CrowdStrike, Wazuh, & Tanium, Network: Netskope SWG and CASB, Palo Alto IPS, CloudFlare WAF, Extrahop, & NetWitness, IAM: Azure AD

Responsibilities

  • Demonstrate and provide in-depth knowledge with Threat Actor tactics, techniques, and procedures (TTPs), log analysis, network traffic analysis, and analyzing system artifacts (file system, memory, running processes, network connections) for indicators of infection/compromise
  • Provide forensic tool expertise with proficiency in using software such as Magnet Forensics, Joe Sandbox, IDA Pro, and/or Wireshark
  • Support Malware Analysis to understand its behavior and impact as well as identifying indicators of compromise (IOCs)
  • Document investigative findings in a manner aligned with TU Processes & DFIR best practices
  • Support Incident Reporting for management, legal, and regulatory purposes
  • Organize, perform, and support Cybersecurity tabletop exercises
  • Lead & assist with IR process workflow improvements

Other

  • Document investigative findings in a manner aligned with TU Processes & DFIR best practices
  • Support Incident Reporting for management, legal, and regulatory purposes
  • Facilitate communication and collaborate with internal teams, management, and external stakeholders to provide timely updates on incident progress
  • bilingual
  • This is a fully remote position.