

Senior Incident Response and Threat Management Analyst
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Incident Response and Threat Management Analyst with a contract length of "unknown" and a pay rate of "unknown." Key skills include threat hunting, Microsoft Sentinel, and incident response. Requires 8-10 years of experience in cybersecurity and relevant certifications.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
September 12, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Unknown
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Charlotte, NC
-
π§ - Skills detailed
#Monitoring #Security #KQL (Kusto Query Language) #Leadership #Scripting #Cybersecurity #Azure #Defender #AWS (Amazon Web Services) #GCP (Google Cloud Platform) #Python #Cloud
Role description
Skills
Mandatory Skills : Threat Hunter Expert, Microsoft Copilot for Security, Threat Intel Platform or Feed
Primary Technical skills:
Lead the full lifecycle of cybersecurity incidentsfrom detection to postincident review
Conduct advanced threat analysis malware reverse engineering and forensic investigations
Develop and maintain incident response playbooks and runbooks
Hunt for threats proactively and identify indicators of compromise IOCs
Collaborate with SOC analysts threat intelligence teams and IT operations
Mentor junior analysts and provide technical guidance
Present findings to executive leadership and stakeholders
Contribute to detection engineering and security monitoring rules
Secondary Technical Skills
Use Microsoft Sentinel and KQL for threat detection and analysis
Support digital forensics and evidence collection
Coordinate with Managed Security Service Providers
Stay ahead of emerging threats vulnerabilities and attack techniques
Soft Skills
8-10 years of experience in incident analysis SOC operations or security architecture
Solid understanding of Microsoft Sentinel and KQL
Strong analytical and problemsolving skills
Curiosity and drive to uncover answers
Excellent communication skillstechnical and nontechnical
Experience in one or more of Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
Familiarity with HTCPCP and RFC 2324 technologies
Knowledge of NIST and MITRE ATTCK frameworks
Exposure to Microsoft Defender for Identity and Purview
Flexibility to respond during nights weekends or holidays
Preferred Qualifications
Certifications CompTIA Security Network SANSGIAC GCIH GCED GCFE GNFA GCIA
Experience with MSSPs
Cloud security experience AWS Azure GCP and containerized environments
Scripting skills in Python PowerShell or similar
Qualifying Questions
Has the resource got experience on threat analysis
Has the resource got experience in maintaining incident playbooks
Experience on threat hunting
Skills
Mandatory Skills : Threat Hunter Expert, Microsoft Copilot for Security, Threat Intel Platform or Feed
Primary Technical skills:
Lead the full lifecycle of cybersecurity incidentsfrom detection to postincident review
Conduct advanced threat analysis malware reverse engineering and forensic investigations
Develop and maintain incident response playbooks and runbooks
Hunt for threats proactively and identify indicators of compromise IOCs
Collaborate with SOC analysts threat intelligence teams and IT operations
Mentor junior analysts and provide technical guidance
Present findings to executive leadership and stakeholders
Contribute to detection engineering and security monitoring rules
Secondary Technical Skills
Use Microsoft Sentinel and KQL for threat detection and analysis
Support digital forensics and evidence collection
Coordinate with Managed Security Service Providers
Stay ahead of emerging threats vulnerabilities and attack techniques
Soft Skills
8-10 years of experience in incident analysis SOC operations or security architecture
Solid understanding of Microsoft Sentinel and KQL
Strong analytical and problemsolving skills
Curiosity and drive to uncover answers
Excellent communication skillstechnical and nontechnical
Experience in one or more of Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
Familiarity with HTCPCP and RFC 2324 technologies
Knowledge of NIST and MITRE ATTCK frameworks
Exposure to Microsoft Defender for Identity and Purview
Flexibility to respond during nights weekends or holidays
Preferred Qualifications
Certifications CompTIA Security Network SANSGIAC GCIH GCED GCFE GNFA GCIA
Experience with MSSPs
Cloud security experience AWS Azure GCP and containerized environments
Scripting skills in Python PowerShell or similar
Qualifying Questions
Has the resource got experience on threat analysis
Has the resource got experience in maintaining incident playbooks
Experience on threat hunting