Security Consultant - Incident Response
Fairlawn, Summit County, Ohio, 44334, USA
Listed on 2025-12-21
-
IT/Tech
Cybersecurity, Information Security
Security Consultant - Incident Response
Trusted Sec is seeking an experienced Incident Response Consultant to join our world‑class Incident Response team. This role is for seasoned practitioners who can step into active incidents with confidence, operate independently, and deliver high‑quality technical and client‑facing outcomes.
Why Join Us?- Work within a high‑impact Incident Response practice protecting organizations from advanced threats
- Collaborate with highly skilled, mission‑driven security professionals
- Gain opportunities for continuous learning, professional development, and industry recognition
- Contribute to a consulting practice known for technical excellence and thought leadership
Current, legal authorization to work in the United States. We cannot provide sponsorship or consider applicants located outside the United States.
This position is a remote role allowing employees to work from home within the United States. Occasional travel to client sites or industry events is required. If you reside in Ohio near our office headquarters, you may work a hybrid schedule of your choosing.
Duties / ResponsibilitiesA Security Consultant at Trusted Sec is responsible for leading and performing complex technical assessments on client systems and assets, analyzing data, and issuing corresponding security reports. The consultant works independently and directly with clients to help them advance their security programs.
Security Assessment and Analysis- Lead and conduct complex assessments and risk analyses of clients' facilities, systems, and processes to identify vulnerabilities and potential threats
- Utilize various security assessment tools and methodologies to evaluate the effectiveness of existing security measures and recommend improvements
- Collaborate with clients to develop and implement strategic security plans tailored to their unique needs and risks
- Provide expert guidance on security best practices, policies, and procedures to enhance the overall security posture of the organization
- Develop and deliver high‑level training programs to educate clients' staff on security protocols, emergency response, and risk mitigation strategies
- Raise awareness of security threats and vulnerabilities to ensure proactive measures are taken to prevent security breaches
- Stay up to date with the latest security trends, threats, and technologies to provide informed recommendations to clients
- Advise on the selection and deployment of appropriate security tools and technologies to enhance the clients' security infrastructure
- Build and maintain strong client relationships by effectively communicating security findings, recommendations, and solutions in a clear and professional manner
- Act as a trusted advisor, providing ongoing guidance and support to clients to help them navigate evolving security challenges
- Represent the organization at industry conferences, seminars, and events, showcasing expertise and contributing to panels, discussions, and knowledge sharing
- Contribute to brand recognition and awareness by producing relevant content to be published through blogs, webinars, social media posts, or white papers
- Demonstrated hands‑on experience with Incident Response best practices, methodologies, and procedures
- Hands‑on Windows Incident Response and computer forensics experience
- Strong knowledge of log and network traffic analysis
- Experience participating in or leading real‑world security incidents in production environments
- Excellent analytical, problem‑solving, and investigative skills
- Strong written and verbal communication abilities
- Ability to work independently while collaborating effectively with a distributed team
- High level of professionalism when handling sensitive and confidential information
- Linux/UNIX, macOS, cloud, or mobile forensics
- Malware analysis and reverse engineering
- Memory forensics and volatile data analysis
- Threat hunting in enterprise environments
- Threat intelligence analysis and operational use
- Running or…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).