Tier 3 Cybersecurity Incident Response Analyst

Armavel, LLC3 months ago
Austin, TX, United States
On-site
Full-time
Junior Level (1-3 years)

Job Description

Position Overview

Armavel, LLC is offering an opportunity to join a forward-thinking cybersecurity team dedicated to protecting mission-critical systems supporting the Department of Veterans Affairs. As a Tier 3 Cybersecurity Incident Response Analyst, you will drive IR in a fast-paced environment by identifying, investigating, and mitigating complex cybersecurity threats while collaborating with experts across multiple disciplines. This is an on-site role in the Austin, TX area.

Key Responsibilities

  • Leading efforts in detecting, analyzing, and responding to the most challenging cybersecurity incidents as a Tier 3 lead analyst.
  • Operationalizing and onboarding modern detection technologies.
  • Crafting and augmenting playbooks for modern cloud-based incident response.
  • Analyzing attack vectors and patterns to determine root cause and recommending effective remediation strategies.
  • Guiding, coaching, and mentoring Tier 1 and Tier 2 analysts during incident investigations.
  • Driving all incident response activities from detection through recovery, including lessons learned and continuous improvement.
  • Developing and coordinating real-time security analytics use cases to detect sophisticated cyber threats.
  • Implementing and leveraging SOAR platforms to automate and streamline incident response workflows.
  • Collaborating with forensics, threat intelligence, IT, and network teams for effective response coordination.
  • Mentoring and supporting junior and mid-level cybersecurity staff to foster a culture of learning and collaboration.
  • Leading cybersecurity exercises, simulations, and continuous training to strengthen readiness.

Required Qualifications

  • Ability to track sophisticated, modern cybersecurity threats in a high-pressure environment.
  • Deep understanding of cybersecurity principles, incident response frameworks, digital forensics, and leadership skills.
  • Strong analytical, problem-solving, and communication skills for technical and non-technical audiences.
  • Expertise with SIEM, IDS/IPS, EDR, and network monitoring solutions.
  • Experience implementing and managing SOAR and other automation tools.
  • Proficiency with enterprise ticketing platforms such as ServiceNow.
  • Bachelor’s Degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
  • 5+ years supporting enterprise-scale IT or cybersecurity operations.
  • 3+ years managing enterprise-level incident response or Security Operations Center environments.
  • Advanced industry certifications (e.g., CISSP, GCIH, GCFA, CEH) are highly desirable.
  • In-depth knowledge of Azure/AWS native tools, security event analysis, digital forensics, malware triage, and security automation.
  • Experience leading incident response activities across multiple technical teams and managing complex IT infrastructures.
  • Must be a US Citizen with the ability to obtain a US Security Clearance.
  • Some travel may be required.

Preferred Qualifications

  • Prior experience supporting federal information systems.

Benefits & Perks

  • Freedom to approach challenging topics with strategic thinking and creative energy.
  • Opportunity to work with supportive colleagues who are committed to excellence.
  • Be part of a great team on an important mission—keeping federal data and systems secure.

Required Skills

Network Monitoring
Splunk
Leadership
Cloud-based Incident Response
SIEM
IDS/IPS
Malware Triage
ServiceNow
Security Operations
SOAR
EDR
Digital Forensics
Security Automation
Incident Response
Microsoft Sentinel
Cyber Threat Analysis
Azure/AWS Security Tools