Incident Response Cyber Analyst
Frontier Communications | |
United States, Texas, Dallas | |
Jan 05, 2026 | |
|
Incident Response Analyst will report to the Manager of Incident Response and will be responsible for Tier 2 or Tier 3 Triage support of cyber security event escalations. As an Incident Response Analyst, you will be part of a cross functional Incident Response team of Incident Response Analysts who are responsible for security operations including log analysis, application security analysis, vulnerability analysis, incident response, and threat analysis. This role evaluates the type and severity of security events leveraging their in-depth knowledge of exploits and vulnerabilities and works with the Incident Response Lead Investigator in investigating and responding to security incidents.
Essential Duties and Responsibilities Review security escalation alerts and evaluate urgency and relevancy Perform security investigation and triage using analyst tools and techniques and determine criticality of potential security threats Follow runbook for incident escalation and event management Request or review vulnerability scan information and review the assessment report. Advises on configuration of security monitoring tools. Analyze additional log correlation Analyze network traffic and data Escalate as necessary cyber incident findings and preliminary investigation results to IR Lead Investigator Maintain technical currency and continuously leverage opportunities to strengthen skills and broaden expertise. Review Cyber Security Intelligence to determine relevancy to Frontier and research as necessary, collaborating with Vulnerability Management and IT Operations to determine exposure to zero-day vulnerabilities Serve in monthly on call rotation for afterhours escalations Identify opportunities for automation and orchestration and make recommendations Generate tickets as needed to engage appropriate IT resources Skills and Experience Required In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc. 2+ years of SOC experience, including incident response triage, threat hunting, and configuring alerting rules Experience with automation (Powershell, Python, APIs, etc.) for IR activities Solid understanding of cyber landscape and typical threat vectors Working knowledge of security technologies such as: SIEM, EDR, FW, AD, IPS, SOAR, WAF, CTI, Application and Email Defense, SandBox Fluency in spoken and written English Preferred: experience with Azure and AWS cloud technologies Education BA/BS Degree in relevant technology discipline or can substitute for additional experience in field Certifications, Licenses, Registrations CISSP Certified Information Systems Security Professional IT security certifications (CISSP, CISM, CISA, GIAC, CYSA, CEH or similar) Preferred
| |
Jan 05, 2026