This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Engineer III, Cyber Incident Response, is a senior technical role within the Security Operations Center (SOC) responsible for leading complex incident investigations and supporting the continuous improvement of detection and response capabilities. This role provides advanced technical expertise in identifying, analyzing, containing, and remediating cyber threats. The Engineer III will act as a mentor to junior analysts, serve as an escalation point for critical incidents, and collaborate with global cyber defense teams to ensure timely and effective responses to advanced threats.
Job Responsibility:
Lead the investigation and resolution of complex security incidents, including advanced persistent threats, ransomware, phishing campaigns, and insider activities
Perform forensic analysis across endpoints, networks, and cloud environments to identify root causes and scope of compromise
Develop and enhance incident response playbooks, runbooks, and detection use cases
Collaborate with threat intelligence, vulnerability management, and countermeasures teams to strengthen defenses
Escalate high-severity incidents to senior leadership and provide clear, actionable reporting
Act as a technical escalation point for Engineer I/II analysts during incident investigations
Contribute to red team and purple team exercises to validate and improve response capabilities
Participate in after-action reviews and lessons-learned sessions to improve SOC processes
Mentor and train junior engineers on incident response best practices and investigative techniques
Requirements:
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience
Master’s degree preferred
Strong knowledge of incident response methodologies, digital forensics, and adversary tactics
Familiarity with security frameworks such as NIST, MITRE ATT&CK, and ISO 27035
5–7 years of progressive experience in cybersecurity, with at least 3 years in incident response or SOC operations
Hands-on experience with SIEM, EDR, SOAR, and forensic tools (e.g., Splunk, CrowdStrike, EnCase, Wireshark)
Proven ability to investigate advanced threats and coordinate response activities across teams
Demonstrated success in mentoring junior analysts and improving SOC processes
Strong written and verbal communication skills with the ability to document and present technical findings clearly
Nice to have:
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Forensic Analyst (GCFA)
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)
What we offer:
medical
dental
vision care
comprehensive suite of benefits focusing on physical, emotional, financial, and social aspects of wellness
support for working families
backup dependent care
adoption assistance
infertility coverage
family building support
behavioral health solutions
paid parental leave
paid caregiver leave
training programs
professional development resources
opportunities to participate in mentorship programs