×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Incident Response Tier III Analyst

Job in Martinsburg, Berkeley County, West Virginia, 25402, USA
Listing for: PingWind Inc.
Full Time position
Listed on 2026-01-14
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Description

Ping Wind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL, Martinsburg, WV, or Austin, TX.

Location

On-site in Hines, IL, Martinsburg, WV, or Austin, TX

Required Clearance

Ability to obtain Tier 4 / High Risk Background Investigation

Certifications
  • GIAC Certified Incident Handler (GCIH)
  • EC-Council’s Certified Incident Handler (ECIH)
  • Incident Handling & Response Professional (IHRP)
  • Certified Computer Security Incident Handler (CSIH)
  • Certified Incident Handling Engineer (CIHE)
  • EC-Council’s Certified Ethical Hacker
Required Education
  • Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)
Required Experience
  • 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)
Responsibilities
  • In-depth forensics and root cause analysis for alerts and incidents
  • Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations or appropriate next steps
  • Perform post-incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned
  • Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents
  • Updating playbooks based on findings of incident trends and outcomes of auditing tasks
  • Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time
  • Create dashboards/reports based on these trends or searches to provide clarity of information being defined
  • Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings
  • Support mentoring and training of junior analysts on alerts, playbooks, and tools
  • Stay informed of latest cybersecurity threats and best practices
  • Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM and EDR
  • Make accurate determination of what alerts are false positives or require further investigation and prioritization
  • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences
  • Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks
  • Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders
  • Identify and action opportunities for tuning alerts to make the incident response team more efficient
  • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy
  • Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions
  • Support the mentoring and training of more junior IR staff
  • Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
Requirements
  • Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM
  • A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment
  • Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools
  • Experience with enterprise ticketing systems like Service Now
  • Excellent analytical and problem-solving skills
  • Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight
  • Ability to learn and function in multiple capacities and learn quickly
  • Strong verbal and written communication skills
Preferred…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary