×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Incident Response and Forensics Consultant V

Job in Greenwood Village, Arapahoe County, Colorado, USA
Listing for: Kaiser Permanente
Full Time position
Listed on 2026-02-24
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

The Consultant-level Incident Handler leverages advanced incident response, investigative, and digital forensics expertise to detect, analyze, and respond to cybersecurity breaches and security events. This role is responsible for collecting and preserving digital evidence using forensic best practices, identifying attack vectors and malicious activity, implementing containment measures, and performing root cause analysis to determine scope, risk, and impact. The position supports criminal and internal investigations by maintaining proper chain of custody and producing thorough documentation, findings reports, and remediation recommendations.

Through proactive mitigation and security improvement efforts, the role helps preserve system uptime and minimize operational impact to business and clinical services.

Job Summary

This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.

Essential Responsibilities
  • Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate;

    monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others.
  • Practices self‑leadership and promotes learning in others by building relationships with cross‑functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas;

    and adapting to and learning from change, difficulties, and feedback.
  • Leads team in the proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non‑technical audiences.
  • Plans and facilitates regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Supports closed‑loop processes on security efforts by providing feedback to the TDA leads and/or leadership.
  • Participates in information fusion procedures across operations and engineering, including activities such as Use Case planning/development, Use Case quality assurance validation, and response procedure documentation.
  • Serves as a liaison between stage teams and upper management by identifying issues, improvement areas, or security/architectural gaps and suggesting appropriate improvements.
  • Drives the development of the CRDC intellectual capital by leading process or procedure improvements, consulting on brown‑bag training sessions, and leading the development of new training documents.
  • Partners with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Facilitates follow‑up remediation design and review efforts.
  • Leads the investigation and triage of security events across multiple domains.
  • Leads complex data analyses in support of security event management processes, including root cause analysis.
  • Coordinates the response and resolution of high‑impact or critical cyber security incidents.
  • Leads the deployment of threat detection capabilities and/or incident response plans which may include after‑hours support and coordination among responsible teams.
  • Drives the execution of incident detection and/or handling processes which may include containment, protection, and remediation activities.
Minimum Qualifications
  • Minimum two (2) years in an informal…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary