Senior Incident Handler

ALC Staffing Associates  •  Chicago, IL

5 - 7 years experience  • 

$84K - $126K
Posted on 04/19/18 by Arthur Crume
ALC Staffing Associates
Chicago, IL
5 - 7 years experience
$84K - $126K
Posted on 04/19/18 Arthur Crume

Senior Incident Handler

*Strong incident response experience SIEM, packet capture, and forensicsexperience.

*Strong knowledge of threatlandscape and SOC experience.

Chicago, IL

Nationwide Relocation Assistance Available

My clients cybersecurity team is growing and they are looking for people who are passionate about information security to join the company.

This team is always looking for ways to keep their environment more secure and are using cutting edge technologies to prevent attacks.

The position is located in Chicago, IL with a flexible schedule including the ability to work from home 1-2 days per week.

This is a growing team and this position will have a significant role in shaping it.

While not a management position, junior analysts will follow your lead operationally.


Act as a senior member of the Global Threat Operations Center, which includes Tier 1 and 2 SOC analysts as well as senior personnel responsible for red teaming, intelligence analysis, and technical threat research.

Lead response and investigation efforts into advanced/targeted attacks.

Engage in hunting and research activities when not leading response efforts to complex attacks against the company.

Plan and execute threat hunting activities leveraging intelligence from multiple internal and external sources.

Conduct proactive technical research into malware, tactics, and infrastructure of threats to the organization.

Design and build custom tools for investigations, hunting, and research.

Assist in the design, evaluation, and implementation of new security technologies.

Mentor and share expertise with junior staff.


*Minimum of 5years?experience in Information Security with a focus on Incident Response.

*Experience identifying, investigating, and responding to complex attacks.

*Experience with investigative technologies such as SIEM, packet capture analysis, host forensics and memory analysis tools.

*Strong understanding of threatlandscape in terms of the tools, tactics, and techniques of threats employing both commodity and custom malware.

*Understanding of networking and security fundamentals and administration of Windows, Unix/Linux, and Macintosh.

Nice-to have:

Experience with SQL and NoSQL databases.

Intermediate Python scriptingexperience.

Reverse engineering skills.

Equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, veteran status, marital status, citizenship status, sexual orientation, gender identity or any other characteristic protected by law.

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.