

Senior Incident Response Analyst
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Incident Response Analyst in New York, NY, for 6 months at a pay rate of "$X/hour." Key skills include cybersecurity expertise, incident response, governance, and compliance. Financial services industry experience is required.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
560
-
ποΈ - Date discovered
July 30, 2025
π - Project duration
More than 6 months
-
ποΈ - Location type
On-site
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
New York, NY
-
π§ - Skills detailed
#Documentation #Leadership #Monitoring #Cybersecurity #Alation #Compliance #Security #Scala
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
Role: Senior Cybersecurity Incident Response Analyst
Location: New York, NY (5 days Onsite)
Duration: 6 Months to Start with
Job Description:
The Cybersecurity Incident Response Senior Analyst plays a pivotal role in safeguarding the Bankβs digital assets by identifying, investigating, and mitigating cybersecurity incidents in accordance with internal and regulatory requirements. The ideal candidate will possess a foundation in governance, strong technical background, sound analytical thinking, and a deep understanding of the threat landscape. This is a hands-on role requiring collaboration across the enterprise. Key Responsibilities
Incident Detection and Response
β’ Support firmβs follow the sun processes ensuring continuous security monitoring of global networks
β’ Monitor alerts from security platforms (incl. SIEM, Phishing, DLP, Threat Intelligence, etc.) and escalations from users, management, and SOC to effectively respond to anomalous and/or malicious activities.
β’ Triage and prioritize events and incidents based on severity, impact, and scope.
β’ Conduct root cause analysis and lead containment, eradication, and recovery efforts.
β’ Analyze host-based and network-based artifacts and logs to reconstruct timelines
β’ Proactively search for indicators of compromise (IOCs) across systems and networks
β’ Collect and preserve evidence from endpoints, servers, and logs in a legally defensible manner.
β’ Continuously monitor threat intelligence and open-source advisories to proactively identify and respond to emerging threats.
β’ Correlate with threat intelligence to contextualize findings and steer investigations
Governance, Risk, and Compliance (GRC) Support
β’ Ensure all incident response practices and activities align with internal security policies, procedures, runbooks, and regulatory mandates.
β’ Support assessments, audit, and regulatory examinations by maintaining and providing incident-related evidence and documentation.
β’ Maintain thorough and complete documentation of all actions taken during incident response activities in accordance with policies and established incident response playbooks.
β’ Maintain policies, procedures, and playbooks related to incident response.
Reporting & Metrics
β’ Generate weekly and monthly reports and dashboards tailored for both technical and executive audiences.
β’ Communicate business impact of CSIRT activities in a clear, risk-aligned manner.
β’ Define, maintain, and report metrics, KPIs, and KRIs to measure program performance, risks, effectiveness, and compliance
Collaboration and Communication
β’ Coordinate analysis and response efforts to security incidents, ensuring minimal impact and quick recovery
β’ Work closely with technology, legal, compliance, and risk teams during major incidents
β’ Act as an SME during post-incident reviews and contribute to incident reports
β’ Maintain open communication with senior leadership and provide ongoing status updates
Process and Technology Optimization
β’ Evaluate, implement, and optimize security processes and technologies to enhance detection and response capabilities.
β’ Collaborate with service providers and vendors on tool enhancements and issue resolution.
β’ Fine-tune detection rules to reduce false positives and improve fidelity.
Continuous Improvement
β’ Conduct post-mortem reviews and contribute to lessons learned
β’ Maintain awareness of the evolving threat landscape and disseminate knowledge internally.
β’ Proactively identify gaps or inefficiencies in CSIRT policies, procedures, processes, and playbooks.
β’ Participate in cross-functional tabletop exercises and red/blue team simulations Core Competencies
β’ Ability to analyze, prioritize, and manage security incidents effectively.
β’ Ability to manage multiple initiatives simultaneously, determine prioritization, and work under minimal supervision.
β’ Awareness of latest Information Security risks.
β’ Comfort working in a highly global, diverse, and hybrid (office and virtual) work environment.
β’ Strong technology, information security, and analysis skills.
β’ Strong communication and documentation skills.
β’ Knowledge of business, regulatory, and compliance requirements in the financial services industry