Location: On-Site | Columbus, OH Employment Type: Full-Time | Direct Hire
This role sits at the sharp edge of defense—where strategy meets action and calm thinking turns chaos into clarity. The Senior Cybersecurity & Incident Response Analyst designs, improves, and leads the organization’s response and protection strategies while strengthening the overall security posture of a complex, multi-site enterprise.
This is a senior-level contributor and emerging leader who blends advanced technical expertise with sound judgment, ownership, and mentorship. You’ll guide investigations, mature SOC capabilities, and influence how the organization prepares for what’s next—before the threat even knocks.
Designs, improves, and leads response and protection strategies while mentoring others and setting the technical bar for security operations excellence.
Strategic and operational. This role includes advanced investigations, proactive threat hunting, tuning and validating detection rules, and guiding enterprise-wide risk mitigation initiatives.
- Lead incident response efforts across the full lifecycle: detection, containment, eradication, and recovery
- Perform root-cause analysis and lead post-incident reviews to drive measurable improvements
- Exercise sound judgment in ambiguous or novel situations where clarity isn’t guaranteed
- Conduct proactive threat hunting across networks, endpoints, and cloud environments
- Leverage threat intelligence feeds and correlate patterns across systems to identify emerging risks
- Own assigned threat domains and continuously refine detection strategies
- Serve as a technical authority for SIEM and EDR platforms, including advanced tuning and optimization
- Automate correlation rules and workflows to improve signal quality and response speed
- Integrate and evaluate new security tools and technologies
- Perform advanced digital forensics, malware analysis, and cross-platform data correlation
- Support investigations requiring deep technical analysis and evidentiary rigor
- Develop, optimize, validate, and own incident response playbooks and operational workflows
- Design and drive continuous improvement initiatives focused on SOC maturity, automation, and operational efficiency
- Document and improve policies, standards, and procedures
- Assess control effectiveness and identify gaps against frameworks such as NIST, CIS, and CMMC
- Advise leadership on risk exposure, mitigation strategies, and security posture
- Map technical findings to compliance and regulatory expectations
- Lead cross-functional incident response and risk mitigation efforts
- Provide technical direction and mentorship to junior analysts
- Work independently while influencing decisions across IT, operations, and leadership
Accountable for results. This role develops, validates, and continuously improves workflows and playbooks, ensuring they work not just on paper—but under pressure.
- Works independently with authority to make key operational decisions
- May serve as deputy or team lead under the SOC Manager or CISO- 5–8+ years of professional experience in cybersecurity or information security
- Demonstrated expertise in incident response, threat hunting, and security operations
- CISSP, GCIA, GCIH, CEH, or equivalent certifications strongly preferred
- Deep experience with SIEM and EDR platforms
- Strong understanding of network protocols, endpoint security, and detection engineering
- Experience automating security workflows or analysis (Python, PowerShell, or similar) is a plus
You’ll own meaningful domains, influence security strategy, and help shape how the organization defends itself today—and tomorrow. It’s a role for someone who sees patterns others miss, stays steady when alarms ring, and enjoys making both systems and people better.