

Senior Incident Response and Threat Management Analyst
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Incident Response and Threat Management Analyst with 12+ years of experience, based in Charlotte, NC. Contract length is unspecified, with a pay rate of "unknown." Key skills include Microsoft Sentinel, KQL, threat analysis, and digital forensics. Certifications like CompTIA Security, GIAC, and cloud security experience are preferred.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
September 25, 2025
π - Project duration
Unknown
-
ποΈ - Location type
On-site
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Charlotte, NC
-
π§ - Skills detailed
#Azure #AWS (Amazon Web Services) #Security #Cloud #KQL (Kusto Query Language) #Cybersecurity #Leadership #Scripting #Defender #GCP (Google Cloud Platform) #Monitoring #Python
Role description
Senior Incident Response and Threat Management Analyst
Experience 12+ years
Charlotte NC ( 5 days)
Contract
Job description
Primary Technical skills
β’ Lead the full lifecycle of cybersecurity incidents from detection to post incident review
β’ Conduct advanced threat analysis malware reverse engineering and forensic investigations
β’ Develop and maintain incident response playbooks and runbooks
β’ Hunt for threats proactively and identify indicators of compromise IOCs
β’ Collaborate with SOC analysts threat intelligence teams and IT operations
β’ Mentor junior analysts and provide technical guidance
β’ Present findings to executive leadership and stakeholders
β’ Contribute to detection engineering and security monitoring rules
β’ Secondary Technical Skills
β’ Use Microsoft Sentinel and KQL for threat detection and analysis
β’ Support digital forensics and evidence collection
β’ Coordinate with Managed Security Service Providers
β’ Stay ahead of emerging threats vulnerabilities and attack techniques
Soft Skills
8-10 years of experience in incident analysis SOC operations or security architecture
β’ Solid understanding of Microsoft Sentinel and KQL
β’ Strong analytical and problem-solving skills
β’ Curiosity and drive to uncover answers
β’ Excellent communication skills technical and nontechnical
β’ Experience in one or more of Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
β’ Familiarity with HTCPCP and RFC 2324 technologies
β’ Knowledge of NIST and MITRE ATTCK frameworks
β’ Exposure to Microsoft Defender for Identity and Purview
β’ Flexibility to respond during nights weekends or holidays
Preferred Qualifications
Certifications CompTIA Security Network SANSGIAC GCIH GCED GCFE GNFA GCIA
Experience with MSSPs
Cloud security experience AWS Azure GCP and containerized environments
Scripting skills in Python PowerShell or similar
Qualifying Questions
Has the resource got experience on threat analysis
Has the resource got experience in maintaining incident playbooks
Experience on threat hunting
Senior Incident Response and Threat Management Analyst
Experience 12+ years
Charlotte NC ( 5 days)
Contract
Job description
Primary Technical skills
β’ Lead the full lifecycle of cybersecurity incidents from detection to post incident review
β’ Conduct advanced threat analysis malware reverse engineering and forensic investigations
β’ Develop and maintain incident response playbooks and runbooks
β’ Hunt for threats proactively and identify indicators of compromise IOCs
β’ Collaborate with SOC analysts threat intelligence teams and IT operations
β’ Mentor junior analysts and provide technical guidance
β’ Present findings to executive leadership and stakeholders
β’ Contribute to detection engineering and security monitoring rules
β’ Secondary Technical Skills
β’ Use Microsoft Sentinel and KQL for threat detection and analysis
β’ Support digital forensics and evidence collection
β’ Coordinate with Managed Security Service Providers
β’ Stay ahead of emerging threats vulnerabilities and attack techniques
Soft Skills
8-10 years of experience in incident analysis SOC operations or security architecture
β’ Solid understanding of Microsoft Sentinel and KQL
β’ Strong analytical and problem-solving skills
β’ Curiosity and drive to uncover answers
β’ Excellent communication skills technical and nontechnical
β’ Experience in one or more of Threat Intelligence Threat Hunting Detection Engineering Digital Forensics
β’ Familiarity with HTCPCP and RFC 2324 technologies
β’ Knowledge of NIST and MITRE ATTCK frameworks
β’ Exposure to Microsoft Defender for Identity and Purview
β’ Flexibility to respond during nights weekends or holidays
Preferred Qualifications
Certifications CompTIA Security Network SANSGIAC GCIH GCED GCFE GNFA GCIA
Experience with MSSPs
Cloud security experience AWS Azure GCP and containerized environments
Scripting skills in Python PowerShell or similar
Qualifying Questions
Has the resource got experience on threat analysis
Has the resource got experience in maintaining incident playbooks
Experience on threat hunting