×
Register Here to Apply for Jobs or Post Jobs. X

Incident Response Senior Consultant

Job in Newton, Middlesex County, Massachusetts, 02165, USA
Listing for: CyberArk
Full Time position
Listed on 2025-12-01
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support
Job Description & How to Apply Below

Join to apply for the Incident Response Senior Consultant role at Cyber Ark

Join to apply for the Incident Response Senior Consultant role at Cyber Ark

Get AI-powered advice on this job and more exclusive features.

Company Description

About Cyber Ark:

Cyber Ark (NASDAQ: CY ), is the global leader in Identity Security. Centered on privileged access management, Cyber Ark provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed work forces, hybrid cloud workloads and throughout the Dev Ops lifecycle. The world’s leading organizations trust Cyber Ark to help secure their most critical assets.

To learn more about Cyber Ark, visit our Cyber Ark blogs or follow us on X, Linked In or Facebook.



Job Description

Cyber Ark is seeking a highly skilled Digital Forensics and Incident Response (DFIR) Consultant to join our team. In this role you will be a technical leader and navigate complex technical incidents, forensics analysis, threat hunting, and malware analysis. You will assist customers in rapidly and effectively resolving security incidents at scale, providing comprehensive incident response, including investigation, containment, and crisis management.

Responsibilities:

  • Investigate and analyze incidents with EDR systems to respond to ongoing security incidents in real-time.
  • Develop Incident Response initiatives that improve our ability to respond and remediate security incidents effectively.
  • Tracing malware activity and patterns and understanding how to remove malware non-destructively.
  • Recognize attacker Tools, Tactics, and Procedures (TTP) and Indicators of Compromise (IOC) and apply to future incident response events.
  • Analyze binary files to determine the legitimacy and extract IOCs when possible.
  • Conducting forensic examinations on physical devices and performing analyses on live and collected memory.
  • Create and refine detection and incident response playbooks.
  • Collaborate with internal and customer teams to investigate and contain incidents.
  • Produce high-quality written reports, presentations, and recommendations, to key stakeholders including customer leadership, and legal counsel.
  • Establishing a collaborative environment for sharing data on machine timelines and suspicious events.
  • Create operational metrics, key performance indicators (KPIs), and service level objectives to measure team competence.
Qualifications

  • 4+ years’ experience working with incident investigations and containment procedures.
  • 4+ years’ experience with network, disk, memory, and cloud forensics
  • Minimum 1 year of experience leading Incident Response investigations and performing the following: network/log forensics, malware analysis, disk forensics, and memory forensics.
  • Excellent time and project management skills with strong written and verbal communication abilities, capable of creating clear documentation and conveying complex technical concepts concisely.
  • Skilled in building and maintaining effective relationships with customers, managing expectations, and ensuring seamless collaboration to achieve shared objectives.
  • Experienced deploying software within customer environments using tools such as Intune, SCCM, GPO, AWS System Manager, Azure Automation, Ansible, Puppet, JAMF, and scripts.
  • Experienced with the following:
    • EDRs such as Crowd Strike Falcon, Sentinel One, MDE
    • Leading projects and debriefing customers
    • Creating and modification of scripts
    • Enterprise security architecture and security controls.
    • Cloud incidents and forensic responses.
    • Malware triage analysis and disk or memory forensics for Windows, macOS, or Linux
    • Software deployment tools such as Intune, Jamf, Ansible, Puppet, SCCM, CPO, and AWS System Manager.
  • Preferred experience:
    • Collection tools such as Splunk, Kibana, or ELK Stack
    • Familiarity with collection tools like Splunk, Kibana, or the ELK Stack.
  • Preferred certifications: GCIH, GX-FA, GNFA, GREM, GCIA, CREST CPIA, CREST CFIA, CFCE, CEH, etc.
Additional Information

Cyber Ark is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity,…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary