Job Specifications
I have a full time opportunity for a Senior Threat and Incident Response Engineer.This is a “Senior” role within a CSIRT for an organization of over 70,000 people. You are the highest engineer on the team handling incidents.
This role does come with a very generous base salary, bonus, and employee benefits package.
It is 4 days onsite in the Austin office.
Responsibilities:
Own the front lines! Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run.
Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Capture investigation steps, findings, and actions with clarity and precision for future reference.
Contribute to playbook enhancements, process improvements, and knowledge sharing.
Qualifications:
Senior-level expertise in leading complex investigations and responding to advanced cyber threats
Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments
Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors
Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain
Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC
Experienced in coordinating incident response efforts and communicating findings to stakeholders
Committed to continuous improvement of SOC processes, playbooks, and detection capabilities
Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity
Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start) or High School diploma (completed and verified prior to start) and four (4) years of hands-on experience
Or Five (5) years of experience in a SOC or cybersecurity operations role, with at least (2) two years in a senior or L3 capacity in a private, public, government or military environment
Lori Sklarski
Senior Technical Recruiter, PRI Technology
Lori.sklarski@pritechnology.com
Direct:(973)-354-2797
Office: 973.732.5454 x27
Cell: 973.432.9968
www.pritechnology.com
www.pritechnology.com
About the Company
IT Staffing Solutions - Experience the Difference Working With Professionals That Understand Your Information Technology Needs and the Importance of Managing Your Costs!
PRI Technology, a division of Perennial Resources International, is a full service Information Technology staff augmentation and executive search firm comprised of high performing industry professionals focused on your success. We employ the utilization of cutting edge recruiting technologies which allow for greater optimization of our capabilities in servi...
Know more