×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior Incident Response Analyst

Job in Bend, Deschutes County, Oregon, 97707, USA
Listing for: St. Charles Health System
Full Time position
Listed on 2025-12-30
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 104686 - 157040 USD Yearly USD 104686.00 157040.00 YEAR
Job Description & How to Apply Below

Overview

Pay range: $50.33 - $75.50 per hour ($104,686 - $157,040 annually), based on experience.

About St. Charles Health System:
St. Charles Health System is a leading healthcare provider in Central Oregon, offering a comprehensive range of services to meet the needs of our community. We are committed to providing high-quality, compassionate care to all patients, regardless of their ability to pay. Our values of compassion, excellence, integrity, teamwork, and stewardship guide our work and shape our culture.

What We Offer
  • Competitive Salary
  • Comprehensive benefits including Medical, Dental, Vision for you and your immediate family
  • 403b with up to 6% match on Retirement Contributions
  • Generous Earned Time Off
  • Growth Opportunities within Healthcare

ST. CHARLES HEALTH SYSTEM

JOB DESCRIPTION

TITLE: Senior Incident Response Analyst

REPORTS TO POSITION: Manager, Security Operations

DEPARTMENT: Information Technology

DATE LAST REVIEWED: August 2025

OUR VISION: Creating Americas healthiest community, together

OUR MISSION: In the spirit of love and compassion, better health, better care, better value

OUR VALUES: Accountability, Caring and Teamwork

DEPARTMENT SUMMARY: The Information Technology department helps improve the work of our caregivers by providing efficient and reliable platforms, comprehensive training, and stellar customer service. We do this by taking pride in the integrity of our workflows, data security, and training delivery. We partner with our customers to leverage various technologies to achieve the best patient outcomes possible by implementing new hardware and software solutions, upgrading existing environments, protecting the data we store, and integrating different solutions to achieve a seamless experience.

Position Overview

The Senior Incident Response Analyst serves as a subject matter expert and leader within the Security Operations Center (SOC), owning the most complex and high-impact cybersecurity investigations and response efforts across the organization. This position requires deep technical expertise, strong decision-making capabilities, and the ability to drive cross-functional coordination during high-pressure security events.

In addition to leading incident response efforts, the Senior Analyst is responsible for shaping incident response strategy, advancing detection and response capabilities, mentoring junior analysts, and advising leadership on emerging threats and risks. This role significantly contributes to the maturation of the organizations cybersecurity program and acts as a trusted advisor for both technical teams and business stakeholders.

This position does not directly manage caregivers but provides guidance, oversight, and quality assurance on the work of others.

This position does not directly manage any other caregivers.

Essential Functions and Duties
  • Act as a senior escalation point for the SOC, leading the most complex investigations and providing expert-level analysis across security tools (SIEM, EDR, IDS/IPS, forensic platforms, cloud environments).
  • Direct and coordinate incident response activities end-to-end, including containment, eradication, recovery, and executive-level reporting.
  • Perform deep forensic analysis and malware investigation to determine root cause, scope, and impact of incidents.
  • Own and evolve incident response playbooks, ensuring they align with industry best practices, regulatory requirements, and organizational needs.
  • Partner with IT, infrastructure, compliance, and business stakeholders to mitigate vulnerabilities and implement long-term risk reduction strategies.
  • Proactively conduct advanced threat hunting to identify signs of compromise and improve detection methodologies.
  • Lead post-incident reviews, delivering actionable recommendations and driving continuous improvement across tools, processes, and training.
  • Serve as a mentor and technical advisor to junior and mid-level analysts, fostering professional growth and knowledge transfer.
  • Maintain deep knowledge of current threat actors, tactics, techniques, and procedures (TTPs) to inform detection engineering and response efforts.
  • Collaborate with leadership to influence strategic cybersecurity…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary