Senior Cyber Security Analyst (Incident Response) Department: Security Operations Employment Type: Full Time Location: Remote Reporting To: Cris Hamilton Description Position Overview We are seeking a Senior Security Incident Response Analyst to join our growing Cybersecurity team. The ideal candidate will have extensive hands-on experience in detecting, responding to, and remediating sophisticated cyber threats using industry-leading tools, particularly EDR platforms. This role requires a deep technical background in both offensive and defensive security, forensic analysis, and threat hunting. The successful candidate will serve as a senior technical escalation point for complex incidents and help drive continuous improvement of our incident response capabilities. **Must be located in Costa Rica** Key Responsibilities Lead and conduct advanced investigations into security incidents using EDR, Network traffic analysis, and Forensic tools. Perform root cause analysis and develop mitigation strategies for complex cyber threats, including APTs, malware outbreaks, insider threats, ransomware, encryption, data exfil activities and others. Act as a technical escalation point during major security incidents, providing in-depth knowledge of tools, techniques, and procedures (TTPs) used by threat actors. Conduct deep dive investigations and threat hunting activities to detect and respond to anomalies and early indicators of compromise (IOCs), using EDRs products. (Mostly MS Defender). Perform memory, disk, and log forensics using tools such as Volatility, Autopsy, and Windows/Linux forensic utilities. Develop and refine incident response runbooks, playbooks, and standard operating procedures (SOPs). Contribute with IR Partners by leveraging offensive and threat hunting security knowledge. Assist with post-incident reviews and lessons learned to improve detection and response strategies. Mentor junior IR analysts. Stay current with the threat landscape, emerging attack techniques, and relevant security technologies. Skills Knowledge and Expertise Experience: Minimum 5+ years in a dedicated Incident Response or Security Operations role, with hands-on investigative experience using advanced EDR solutions (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, etc.). Technical Security Skills: Defensive: Malware analysis, memory forensics, log analysis, endpoint and network triage. Offensive: Understanding of exploitation techniques, red teaming, vulnerability assessment, and attack simulations. Certifications: One or more of the following is required or highly preferred:
...Data QA Analyst Snowflake / Data Vault / Salesforce CRM Location: Remote Type: Contract Long-Term Project Engagement: W2 About the Role We are seeking an experienced Data Quality Analyst (QA) to support a high-visibility enterprise data warehouse...
...Title : Application Admin Location : Remote Duration : 4 years Job Description : Expertise and/or relevant experience in the following areas are mandatory: ~3+ years' experience implementing Records and Information Management systems (RIM)...
...This role also works closely with the Quality and Supply Chain teams and assists in ensure all R&D activities are represented in Food Safety Programs that are defined, executed and meet regulatory guidelines. Essential Duties and Responsibilities Responsible for execution...
...various forms.Job DutiesDevelop and maintain data reports measuring daily business... ...accurately exchange information.Seniority level InternshipEmployment type Full-timeJob function... ...by 2x.Get notified about new Data Analyst jobs in Wichita, KS .#J-18808-Ljbffr Wichita...
...Head of Research Services page is loaded Head of Research Services Apply remote type Hybrid locations Law Center time type Full time posted on Posted Yesterday time... ...international, foreign, and comparative law; non-legal topics; and empirical research. Research Services...