Senior Incident Responder

Apply Now

Company: Tenex.AI Inc

Location: Kansas City, MO 64118

Description:

Job Summary:

TENEX.AI is seeking a highly skilled and experienced core individual contributor and leader to join our dynamic Security Operations Center (SOC) as a Senior Incident Responder. As a key member of our incident response team, you will be responsible for leading and executing the end-to-end investigation and remediation of complex security incidents. The position offers significant opportunities for professional growth within a collaborative and forward-thinking environment.

A strong technical background, exceptional analytical and problem-solving skills are crucial for this role, along with the ability to drive process improvement, create comprehensive documentation, and serve as a critical escalation point for incident handling. You will also play a vital role in the selection and effective utilization of specialized investigative tools.

Responsibilities:
  • Mentorship and Training: Provide guidance, mentorship, and knowledge sharing to junior incident responders, contributing to the overall growth and skill development of the team.
  • Client Communication: Effectively communicate technical details and incident status to both technical and non-technical client stakeholders, maintaining professionalism and building trust.
  • Escalation Point: Serve as a primary escalation point for complex or high-severity security incidents, providing expert guidance and support to junior analysts and other stakeholders.
  • Process Development and Improvement: Identify areas for improvement within existing incident response processes and and contribute to the development, implementation, and maintenance of standardized procedures, playbooks, and workflows.
  • Incident Investigation and Handling: Lead and conduct in-depth investigations of security incidents, including malware infections, intrusions, data breaches, phishing campaigns, and other cyber threats. This includes containment, eradication, and recovery efforts.
  • End-to-End Case Management: Manage incident response cases from initial detection through final resolution, ensuring timely communication with stakeholders, meticulous documentation, and adherence to established SLOs.
  • Documentation and Reporting: Create and maintain comprehensive documentation, including incident timelines, analysis reports, root cause analyses, lessons learned, and client-facing summaries.
  • Tooling and Technology: Evaluate, select, and effectively utilize a variety of specialized security tools and technologies for incident investigation, forensic analysis, and threat intelligence gathering. This may include custom tooling, threat intelligence and network analysis tools, and forensic suites.
  • Continuous Learning: Stay up-to-date with the latest cybersecurity threats, trends, and incident response techniques through continuous learning and professional development.

Qualifications:
  • Minimum of 5+ years of experience in incident response, security operations, or a related cybersecurity role.
  • Proven experience in leading and managing complex security incident investigations from start to finish.
  • Strong understanding of common attack vectors, tactics, and procedures (TTPs) used by threat actors.
  • Strong subject matter expertise in at least one of the following areas, with strong foundation in the others: network protocols, operating systems (Windows, Linux, macOS), and cloud environments (AWS, Azure, GCP).
  • Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
  • Hands-on experience with a variety of security tools and technologies, such as SIEM, EDR, firewalls, intrusion detection/prevention systems (IDS/IPS), and forensic analysis tools.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to articulate technical information clearly and concisely to diverse audiences.
  • Ability to work independently and collaboratively within a team environment.
  • Strong organizational skills and attention to detail.
  • Ability to remain calm and effective under pressure during high-severity incidents.

Preferred Qualifications:
  • Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis.
  • Experience working in a Managed Security Services Provider (MSSP) environment.
  • Familiarity with threat intelligence platforms and their integration into incident response workflows.
  • Experience developing and implementing incident response playbooks and procedures.
  • Experience with digital forensics and evidence handling.
  • Relevant security certifications such as GCIH, GCFA, GREM, CISSP, or equivalent.

Similar Jobs