- Company Name
- Euroclear
- Job Title
- Cyber Incident & Response Team Analyst
- Job Description
-
**Job Title**
Cyber Incident & Response Team Analyst
**Role Summary**
Execute and lead incident response operations, conduct forensic investigations, and manage cyber security incident resolution within a large enterprise environment. Collaborate with SOC, threat intelligence, IT, and business stakeholders to mitigate incidents, preserve evidence, and drive continuous improvement of incident response processes.
**Expectations**
- Handle complex, critical, and sensitive incidents independently from detection to resolution.
- Maintain service levels and escalation procedures while ensuring compliance with internal and external regulatory requirements.
- Provide timely, accurate reporting and stakeholder communication.
- Contribute to process development, playbook validation, and integration of automated incident management workflows.
**Key Responsibilities**
- Conduct independent investigations following established procedures and frameworks.
- Own incident lifecycle: identification, containment, eradication, recovery, and post‑incident review.
- Escalate third‑tier incidents to appropriate resolver groups and coordinate with IT teams for remediation.
- Validate and update incident response playbooks; ensure alignment with SOC and CIRT operations.
- Lead major cyber security incidents, providing executive‑level updates and stakeholder management.
- Perform forensic analysis: evidence collection, preservation, and analysis; support legal cases and fraud investigations.
- Execute root‑cause analysis for significant incidents; drive problem, issue, and risk management actions to closure.
- Engage with threat intelligence and SOC to develop integrated, automated incident response processes.
- Participate in industry‑wide cyber exercises; act as forensic and legal interface for court evidence or fraud forums.
- Develop, implement, and test supporting processes and controls before production rollout.
- Maintain relationships with device owners, application architects, and operational teams to ensure effective incident handling.
**Required Skills**
- 3+ years of experience in incident response and cyber security operations.
- Proficient with Windows and Unix/Linux operating systems; strong networking knowledge (TCP/IP, routing, switching).
- Deep understanding of forensic techniques and evidence handling (disk imaging, memory capture, log analysis).
- Knowledge of incident response frameworks (NIST, SANS, ISO 27035) and playbook development.
- Ability to conduct root‑cause analysis, problem management, and risk assessment.
- Excellent investigative, analytical, and critical‑thinking skills.
- Strong communication and stakeholder‑management capabilities.
- Integrity and discretion in handling sensitive data and legal matters.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Professional certifications preferred: CISSP, GCIA, GCIH, CEH, CRISC, or equivalent.