
Cybersecurity Incident Response Analyst (Remote - India) at Jobgether. This position is posted by Jobgether on behalf of a partner company. We are currently looking for a . Cybersecurity Incident Response Analyst. in . India. .. This role offers an exciting opportunity to join a global Cyber Defense Center and actively defend critical infrastructure against evolving cyber threats. You will investigate, analyze, and respond to incidents across IT, OT, Cloud, and product security environments. Working in a 24/7 hybrid environment, you will collaborate with diverse, international teams to safeguard operations and support innovative technology initiatives. The position provides hands-on experience with advanced SIEM, EDR, SOAR, and AI-enabled security tools, while contributing to the continuous improvement of incident response strategies. Strong analytical, technical, and communication skills are essential to excel in this fast-paced, high-impact role.. . Accountabilities:. Serve as a second line of defense, detecting, analyzing, and containing advanced cyber threats in real time.. Lead triage and technical investigations of incidents across IT, OT, Cloud, and product security domains.. Utilize SIEM, EDR, SOAR, and threat intelligence platforms to disrupt malicious activity efficiently.. Collaborate with global Incident Managers and Threat Hunters to implement containment and eradication strategies.. Apply forensic techniques to uncover attacker tactics, techniques, and procedures (TTPs).. Develop, refine, and automate incident response playbooks, detection rules, and scripts.. Conduct post-incident reviews and provide clear technical and strategic recommendations to stakeholders.. Track emerging threats, including nation-state actors, ransomware, and zero-day vulnerabilities.. Ensure compliance with internal and external regulations and maintain high standards of integrity and security.. . Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Information Security, or a related technical field; advanced certifications are a strong plus.. Minimum 2 years’ experience in Security Operations, Incident Response, Threat Hunting, or Digital Forensics, ideally in a global enterprise or MSSP environment.. Proven expertise with SIEM (e.g., Sentinel, Elastic), EDR (e.g., CrowdStrike, Defender), and SOAR platforms.. Deep understanding of network protocols, Windows/Linux/Cloud internals, and adversary TTPs (MITRE ATT&CK framework).. Strong analytical and problem-solving skills, with keen attention to detail in investigating incidents.. Excellent spoken and written English, with the ability to communicate complex technical issues to technical and leadership audiences.. Ability to operate in high-pressure, global 24/7 environments, including on-call rotations.. Commitment to continuous learning, collaboration, and maintaining the highest cybersecurity standards.. . Company Location: India.