Overview
Sr. Cybersecurity Incident Response Analyst Jobs in Irvine, California, USA at Origence
Title: Sr. Cybersecurity Incident Response Analyst
Company: Origence
Location: Irvine, California, USA
Type: Full Time
Category: IT/Tech, Security
About Origence
With 30 years at the forefront of fintech
innovation
, we specialize in SaaS lending solutions that lead the industry. Our core mission is
customer-centric
, focusing on empowering Credit Unions across the United States with the tools to offer accessible, competitive lending services. We’re deeply committed to enhancing the financial ecosystem for a broad network of credit unions, members and auto dealers.
We invest in our greatest assets, our employees, and foster a culture of
innovation
and ownership through freedom and responsibility. We celebrate fiscal accountability, operational rigor and efficiency to create a sustainably healthy and robust business for the long term.
The
Sr. Cybersecurity Incident Response Analyst
is our tip of the defensive spear against cyber-attacks. This includes identifying, containing, analyzing, and mitigating malicious activity and/or attacks in a timely and effective manner. The role involves coordinating incident response efforts, effectively communicating during incidents, and ensuring that proper procedures are followed to minimize damage, restore normal operations, and prevent future incidents. The Cybersecurity Incident Response Analyst also helps develop incident response tactics, plans, conducts post-incident reviews, and implements improvements to enhance the organization’s security posture.
The major
purpose
of the Sr. Cybersecurity Incident Response Analyst is to ensure the organization can effectively detect, respond to, and recover from cybersecurity incidents. The role is vital in reducing the impact of security incidents on the organization’s systems, data, and reputation. The Sr. Cybersecurity Incident Response Analyst also aims to continuously improve incident response capabilities through proactive planning, training, and integration of best practices, ensuring the organization remains resilient against evolving cyber threats.
What You’ll Be Doing:
Actively monitor cybersecurity defense tools and alert notifications by implementing best practices for effective triage and response.
Triage alerts and respond as necessary by working with cross functional teams to ensure effective identification, containment, resolution of incidents, and creating incident reports.
Monitor and track incident trends to improve detection, response times, and proactive measures, continuously evolving the incident response framework to address emerging threats. Develop metrics around alert notifications, triage rates, incident response types, and time to respond.
Take ownership of, review, update, and train to the incident response runbooks by ensuring that they are clear, concise, and accurate.
Collaborate with technical and business stakeholders to develop and perform department level tabletop exercises. Provide a retrospective that communicates strengths and weaknesses to improve upon.
Remain current on attack trends and continuously develop defensive tactics to counter them. Maintain a continuous connection with industry feeds, professionals, and other forms ofcommunication.
The Ideal Candidate:
Education:
Bachelors degree in Computer Science or Information Security.
Or equivalent experience.
Comptia, GIAC, IC2, or other related certifications a plus.
Experience:
5+ yearshands on experiencewith information technology.
4+ years as a cybersecurity incident responder.
+ 2 or more years …