converge
converge11d ago
New

Security Operations - Incident Response Coordinator

Remotemid
OtherSecurity Operations
0 views0 saves0 applied

Quick Summary

Overview

Practice/Department: Delivery-Managed Services Position Title: Incident Response Coordinator Position Location: Remote - India Reports to: Director of Cyber defense and Threat Intelligence Job Summary: We are seeking a highly skilled and motivated Incident Response Coordinator to join our Security…

Requirements Summary

This role requires outstanding English language communication skills, both written and verbal. Professional certifications such as CISSP, ECIH, GCFE, GCIH Experience with digital forensics and malware analysis Knowledge of network protocols and…

Technical Tools
cybersecuritynetworking
Practice/Department: Delivery-Managed Services Position Title: Incident Response Coordinator Position Location: Remote - India Reports to: Director of Cyber defense and Threat Intelligence Job Summary: We are seeking a highly skilled and motivated Incident Response Coordinator to join our Security Operations team. This role involves planning, coordinating, and managing responses to security incidents, ensuring accurate execution of processes and timely completion of documentation and communications. The ideal candidate for the Incident Response Coordinator role is an experienced professional with the soft skills that enable effective performance in high-stakes environments. They are an active listener with strong analytical and problem-solving abilities to quickly assess and address complex incidents, and the ability to confidently communicate clear, concise updates to diverse stakeholders, including leadership and external partners. Additionally, they exhibit adaptability, attention to detail, and a commitment to ethical practices, fostering team trust and enhancing overall organizational resilience. Personnel performing this role may unofficially or alternatively be called: Incident Handler Incident Responder Incident Response Analyst Incident Response Engineer Intrusion Analyst Computer Network Defense Incident Responder Computer Security Incident Response Team Engineer Essential Functions: Coordinate the investigation, containment, recovery, and remediation of cybersecurity incidents, collaborating with IT, legal, communications, and third parties as needed Serve as the primary contact during incidents, providing status updates and coordinating activities with leadership, internal teams, and external partners Monitor and analyze network traffic, security logs, and alerts to identify, triage, and respond to suspicious activity and potential incidents Document after action incident details, actions taken, timelines, and lessons learned in line with organizational standards Core Duties: Conduct periodic incident response exercises, deliver training, and raise awareness among staff on emerging threats and protocols Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise Continuously review and improve the incident response plan, procedures, and playbooks based on post-incident reviews and lessons learned Perform initial triage and analysis of security incidents to assess scope, urgency, and impact. Guide cross-functional teams to contain threats, eradicate vulnerabilities, and restore normal operations Coordinate with the Corporate Leadership, Security Operations Center (SOC), and external parties as required Lead after-action reviews, publish findings, and recommend mitigation measures to strengthen future defenses Stay current with evolving threats, vulnerabilities, and best practices through threat intelligence monitoring and external sources Required Skills/Abilities/Competencies Knowledge of business continuity and disaster recovery continuity of operations plans. Skill in preserving evidence integrity according to standard operating procedures or international standards. Knowledge of cyber defense and information security policies, procedures, and regulations. Knowledge of incident categories, incident responses, and timelines for responses. Knowledge of incident response and handling methodologies Skill in performing impact assessments Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth) Skill in using security event correlation tools Knowledge of OSI model and underlying network protocols (e.g., TCP/IP) Knowledge of cloud service models and how those models can limit incident response. Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks) Knowledge of malware analysis concepts and methodologies Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities Skill in recognizing and categorizing types of vulnerabilities and associated attacks Strong knowledge of incident response processes, attack vectors, threat tactics, and detection methods Experience with DNS Security, SIEM and SOAR systems, endpoint detection tools, forensic software, and security monitoring solutions Excellent analytical, problem-solving, and communication skills, with the ability to perform under pressure Familiarity with regulatory requirements, security frameworks, and incident response standards (e.g., NIST, ISO 27001) Proactive mindset focused on continuous improvement, training, and cross-departmental collaboration Education and Experience: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field or equivalent work experience of 5 years or more Minimum of 2 years of experience in cybersecurity incident response or a related role Preferred Qualifications: This role requires outstanding English language communication skills, both written and verbal.   Professional certifications such as CISSP, ECIH, GCFE, GCIH Experience with digital forensics and malware analysis Knowledge of network protocols and security architecture Familiarity with malware types and attack methods Experience with scripting and automation tools Physical Requirements: Prolonged periods of sitting at a desk and working on a computer.  

Location & Eligibility

Where is the job
Worldwide
Fully remote, anywhere in the world
Who can apply
Same as job location

Listing Details

Posted
April 26, 2026
First seen
May 6, 2026
Last seen
May 8, 2026

Posting Health

Days active
0
Repost count
0
Trust Level
35%
Scored at
May 6, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

convergeSecurity Operations - Incident Response Coordinator