Job Description
A Fortune 100 transportation company headquartered in Memphis, TN is looking for a Senior Cyber Security Incident Response Analyst. The Cyber Incident Response Analyst will report to the Manger of Incident Response and will be responsible for handling Teir 3 and Teir 4 level cyber security incidents. This role ensures timely containment, recovery, and communication with key stakeholders while keeping business units informed throughout the incident lifecycle.
This team also assists in threat hunting and proactive measures, as well as the development of automated SOAR actions and other custom tooling.
The role involves responding to information security incidents escalated to the Incident Response team and managing all phases of the response lifecycle for assigned cases. It also includes conducting post‑incident technical investigations to determine root causes and ensuring lessons learned lead to strengthened defenses and effective remediation strategies. The position participates in red and purple team exercises, tabletop simulations, and other preparedness activities. Additionally, it contributes to developing automated response capabilities within existing SIEM and SOAR platforms, including creating custom response scripts through API integrations. Responsibilities also include helping maintain incident response playbooks, escalation protocols, cross‑team coordination processes, the User and Entity Behavior Analytics (UEBA) program, and model alert correlation workflows. The role requires active collaboration with remote teams to ensure consistent response practices, adherence to all relevant laws, regulations, and company policies, and performing other duties as assigned.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.
Required Skills & Experience
Bachelor’s degree in business, computer science, information systems and / or related field or equivalent formal training
4+ years of experience in information technology, cyber security, or incident response roles
Experience wit cyber incident response processes, including detection, analysis, containment, eradication, and recovery
Scripting Experience - PowerShell, Python, Etc.
Tools: 3+ years with CrowdStrike
Tier 4 support: Malware, data access, ransomware, phishing, etc
Nice to Have Skills & Experience
CERT: OSCP
Foundry/Fusion
Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.