Sr. Cybersecurity Incident Response Analyst job opportunity at Blue Yonder, Inc..



DateMore Than 30 Days Ago bot
Blue Yonder, Inc. Sr. Cybersecurity Incident Response Analyst
Experience: 5-years
Pattern: full-time
apply Apply Now
Salary:
Status:

Job

Copy Link Report
degreeOND
loacation Monterrey, Mexico
loacation Monterrey....Mexico

Location: Remote - Monterrey, Mexico preferred (but also will consider Mexico City area) Role: Sr. Cybersecurity Incident Response Analyst (Threat Hunting) Blue Yonder Job Profile: Sr. Security Engineer, Security Architect   Overview: Blue Yonder, a leading supply chain software company, is seeking a Sr Cybersecurity Incident Response Analyst (Threat Hunting) to join its Security Operations (SOC) team. The successful candidate will be responsible for assisting with the organization's Tier 2 incident response efforts in the event of a security breach or cyber-attack. This role requires strong technical skills, attention to detail, and the ability to work under pressure. The Sr Incident Response Analyst will work closely with the Security team to develop and maintain incident response plans, conduct investigations, and provide technical guidance and support during incident response activities. Blue Yonder is seeking a candidate with a deep passion for cybersecurity, eager to stay ahead of emerging threats and continuously enhance our security posture. The ideal candidate is driven, proactive, and committed to protecting the enterprise through effective threat detection, response, and mitigation strategies. Scope/Responsibilities: This role is responsible for assisting with the detection, investigation, containment, and remediation of security incidents to protect an organization's systems, data, customers and reputation. They lead high-priority incident response efforts, coordinating with cross-functional teams such as IT, legal, and compliance to mitigate threats effectively. Technical Environment: ( Candidate should be very familiar with all the below ) Security Information and Event Management (SIEM) Endpoint Detection and Response (EDR) / Extended Detection and Response (XDR) Network Security Monitoring & Intrusion Detection/Prevention Systems (IDS/IPS) Threat Intelligence Platforms (TIP) Security Orchestration, Automation, and Response (SOAR) Digital Forensics and Incident Response (DFIR) Tools Malware Analysis & Reverse Engineering Tools Vulnerability Management & Assessment Web Application Security Testing Tools Cloud Security Monitoring & Protection Email Security & Phishing Protection Deception & Honeypot Technologies Data Loss Prevention (DLP) Privileged Access Management (PAM) & Identity Security Firewall & Next-Generation Firewall (NGFW) Solutions What you’ll do: Monitor and Analyze Security Alerts – Review alerts generated by security systems, appliances, and logs to determine the appropriate course of action to protect the enterprise and reduce overall risk. Incident Triage and Response – Quickly assess, prioritize, and respond to security incidents, ensuring timely containment, eradication, and recovery to minimize business impact. Root Cause Analysis (RCA) – Investigate security incidents to determine root causes, attack vectors, and vulnerabilities, providing recommendations to reduce the attack surface and prevent recurrence. Threat Hunting and Proactive Defense – Conduct proactive threat-hunting activities based on intelligence, anomalies, and adversary tactics to identify and mitigate threats before they escalate. Collaboration with Cross-Functional Teams – Work closely with IT, engineering, legal, compliance, and other teams to coordinate incident response efforts and ensure an effective security posture. Incident Documentation and Reporting – Maintain detailed documentation of security incidents, response actions, and lessons learned, ensuring continuous improvement in security processes. Develop and Improve Incident Response Playbooks – Enhance and maintain incident response procedures, ensuring alignment with industry best practices and emerging threats. Security Awareness and Training – Provide guidance, training, and mentorship to SOC analysts and IT staff on security threats, incident handling, and response best practices. Threat Intelligence Integration – Leverage threat intelligence sources to stay informed on evolving cyber threats and proactively adjust security strategies to defend against them. Strong familiarity with cloud security technologies and frameworks across major cloud providers ( AWS, Azure, Google Cloud ) is essential. The candidate should have experience with cloud-native security monitoring, incident response in cloud environments, and threat detection techniques to protect workloads, data, and identities in hybrid and multi-cloud architectures. What we are looking for: Bachelor's degree in Computer Science, Information Security, or related equivalent experience 5+ years of experience in information security or cybersecurity as an analyst, engineer or consultant . MUST have experience with incident response methodologies and tools (e.g. SANS IR, EDR, SIEM, Threat Intelligence, etc.) Strong technical skills and attention to detail Excellent verbal and written communication skills Ability to work independently and as part of a team Ability to work under pressure and in a fast-paced environment Strong problem-solving skills and a proactive approach to work Knowledge of security frameworks such as NIST and ISO 27001 Familiarity with security regulations and standards (e.g. PCI DSS, HIPAA, etc.) #LI-MH1 #LI-Remote Our Values If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success – and the success of our customers. Does your heart beat like ours? Find out here: Core Values All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Other Ai Matches

Staff Data Scientist I - Supply Chain Operations Analytics Applicants are expected to have a solid experience in handling Job related tasks
Lead Software Engineer (Python) Applicants are expected to have a solid experience in handling Job related tasks
Account Executive Applicants are expected to have a solid experience in handling Job related tasks
Account Manager Applicants are expected to have a solid experience in handling Job related tasks
Lead System Engineer - MS Azure, M365 & DKIM/DMARC/SPF Applicants are expected to have a solid experience in handling M365 & DKIM/DMARC/SPF related tasks
Staff Software Engineer - Terraform (Infrastructure as Code), Python, Jenkins & Groovy Applicants are expected to have a solid experience in handling Python, Jenkins & Groovy related tasks
Senior Product Director Applicants are expected to have a solid experience in handling Job related tasks
Engineering Manager - (Java, Microservices, kafka and Nosql) Applicants are expected to have a solid experience in handling Microservices, kafka and Nosql) related tasks
Account Manager Applicants are expected to have a solid experience in handling Job related tasks
Software Engineer II - Java, SQL Applicants are expected to have a solid experience in handling SQL related tasks
Staff Software Engineer Applicants are expected to have a solid experience in handling Job related tasks
Account Executive Applicants are expected to have a solid experience in handling Job related tasks
Lead Software Engineer - Java Applicants are expected to have a solid experience in handling Job related tasks
Senior Manager - Technical Accounting Applicants are expected to have a solid experience in handling Job related tasks
Director, Data Science Applicants are expected to have a solid experience in handling Data Science related tasks
Staff Data Science Consultant – Retail Planning Solutions Applicants are expected to have a solid experience in handling Job related tasks
Technical Account Advisor - TAM/SaaS/Supply Chain/ITIL Applicants are expected to have a solid experience in handling Job related tasks
Sr MFT Administrator - Cleo Harmony, VLProxy Applicants are expected to have a solid experience in handling VLProxy related tasks
Senior Software Engineer Applicants are expected to have a solid experience in handling Job related tasks
Strategic Operations Program Support Director Applicants are expected to have a solid experience in handling Job related tasks
Support Engineer 2 - Windows Server Admin/ITIL/Azure/VMware Applicants are expected to have a solid experience in handling Job related tasks
IN-Support Engineer 1 - Cloud (L1 Infra Ops, Monitoring tools, AppDynamics, Zabbix, Azure Cloud) Applicants are expected to have a solid experience in handling Monitoring tools, AppDynamics, Zabbix, Azure Cloud) related tasks
IN-Sr Support Engineer 1 - SQL DBA Applicants are expected to have a solid experience in handling Job related tasks