Senior Incident Responder
Apply NowCompany: Tenex.AI Inc
Location: Kansas City, MO 64118
Description:
Job Summary:
TENEX.AI is seeking a highly skilled and experienced core individual contributor and leader to join our dynamic Security Operations Center (SOC) as a Senior Incident Responder. As a key member of our incident response team, you will be responsible for leading and executing the end-to-end investigation and remediation of complex security incidents. The position offers significant opportunities for professional growth within a collaborative and forward-thinking environment.
A strong technical background, exceptional analytical and problem-solving skills are crucial for this role, along with the ability to drive process improvement, create comprehensive documentation, and serve as a critical escalation point for incident handling. You will also play a vital role in the selection and effective utilization of specialized investigative tools.
Responsibilities:
Qualifications:
Preferred Qualifications:
TENEX.AI is seeking a highly skilled and experienced core individual contributor and leader to join our dynamic Security Operations Center (SOC) as a Senior Incident Responder. As a key member of our incident response team, you will be responsible for leading and executing the end-to-end investigation and remediation of complex security incidents. The position offers significant opportunities for professional growth within a collaborative and forward-thinking environment.
A strong technical background, exceptional analytical and problem-solving skills are crucial for this role, along with the ability to drive process improvement, create comprehensive documentation, and serve as a critical escalation point for incident handling. You will also play a vital role in the selection and effective utilization of specialized investigative tools.
Responsibilities:
- Mentorship and Training: Provide guidance, mentorship, and knowledge sharing to junior incident responders, contributing to the overall growth and skill development of the team.
- Client Communication: Effectively communicate technical details and incident status to both technical and non-technical client stakeholders, maintaining professionalism and building trust.
- Escalation Point: Serve as a primary escalation point for complex or high-severity security incidents, providing expert guidance and support to junior analysts and other stakeholders.
- Process Development and Improvement: Identify areas for improvement within existing incident response processes and and contribute to the development, implementation, and maintenance of standardized procedures, playbooks, and workflows.
- Incident Investigation and Handling: Lead and conduct in-depth investigations of security incidents, including malware infections, intrusions, data breaches, phishing campaigns, and other cyber threats. This includes containment, eradication, and recovery efforts.
- End-to-End Case Management: Manage incident response cases from initial detection through final resolution, ensuring timely communication with stakeholders, meticulous documentation, and adherence to established SLOs.
- Documentation and Reporting: Create and maintain comprehensive documentation, including incident timelines, analysis reports, root cause analyses, lessons learned, and client-facing summaries.
- Tooling and Technology: Evaluate, select, and effectively utilize a variety of specialized security tools and technologies for incident investigation, forensic analysis, and threat intelligence gathering. This may include custom tooling, threat intelligence and network analysis tools, and forensic suites.
- Continuous Learning: Stay up-to-date with the latest cybersecurity threats, trends, and incident response techniques through continuous learning and professional development.
Qualifications:
- Minimum of 5+ years of experience in incident response, security operations, or a related cybersecurity role.
- Proven experience in leading and managing complex security incident investigations from start to finish.
- Strong understanding of common attack vectors, tactics, and procedures (TTPs) used by threat actors.
- Strong subject matter expertise in at least one of the following areas, with strong foundation in the others: network protocols, operating systems (Windows, Linux, macOS), and cloud environments (AWS, Azure, GCP).
- Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
- Hands-on experience with a variety of security tools and technologies, such as SIEM, EDR, firewalls, intrusion detection/prevention systems (IDS/IPS), and forensic analysis tools.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical information clearly and concisely to diverse audiences.
- Ability to work independently and collaboratively within a team environment.
- Strong organizational skills and attention to detail.
- Ability to remain calm and effective under pressure during high-severity incidents.
Preferred Qualifications:
- Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Experience working in a Managed Security Services Provider (MSSP) environment.
- Familiarity with threat intelligence platforms and their integration into incident response workflows.
- Experience developing and implementing incident response playbooks and procedures.
- Experience with digital forensics and evidence handling.
- Relevant security certifications such as GCIH, GCFA, GREM, CISSP, or equivalent.