Security Incident Response Analyst at Kaseya Careers
Dublin, County Dublin, Ireland -
Full Time


Start Date

Immediate

Expiry Date

03 Dec, 25

Salary

0.0

Posted On

03 Sep, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cisa, Malware Analysis, Gcih, Edr, Executive Leadership, Threat Analysis, Information Technology, Gcia, Ccnp Security, Incident Response, Carbon Black, Computer Science, Security Engineering, Digital Forensics

Industry

Information Technology/IT

Description

Kaseya® is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners www.insightpartners.com), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.
Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to www.Kaseya.com and for more information on Kaseya’s culture.
Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers.

WHAT WE ARE LOOKING FOR

We’re looking for an experienced cybersecurity professional who thrives in fast-paced environments and can operate with minimal supervision. The ideal candidate combines strong technical expertise with sharp analytical thinking and excellent communication skills.

QUALIFICATIONS

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or equivalent experience.
  • 3–5 years of hands-on experience in cybersecurity operations, incident response, or threat analysis.
  • Prior experience in a SOC or IR role with demonstrated capability in at least two domains (incident response, malware analysis, threat hunting, digital forensics, or security engineering).
  • Proficiency with SIEMs, EDR, and network forensic tools (e.g., Splunk, Sentinel, CrowdStrike, Carbon Black).
  • Familiarity with common attacker TTPs and frameworks (MITRE ATT&CK, NIST CSF).
  • Relevant certifications preferred: GCFR, GCIH, GCIA, Microsoft SC-200, CCNP Security, Linux+, CISA.
  • Strong ability to communicate technical details to both technical teams and executive leadership.
  • Experience leading small projects or initiatives within a SOC/CIRT team is highly desirable.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

WHAT YOU’LL DO

We are seeking a skilled Threat Response Analyst with proven experience in cybersecurity operations and incident response. In this role, you will take ownership of advanced investigations, lead containment and eradication efforts, and provide expert guidance to both technical and non-technical stakeholders. You will work as part of our Cybersecurity Incident Response Team (CIRT), proactively hunting for threats, analyzing malicious activity, and strengthening the security posture of our global organization.

KEY RESPONSIBILITIES

  • Act as a frontline incident responder, leading containment, eradication, and recovery for confirmed threats.
  • Perform advanced threat hunting across enterprise environments to proactively detect adversarial activity.
  • Conduct in-depth malware analysis using both static and dynamic techniques to assess and mitigate risks.
  • Manage escalations from junior analysts and provide mentorship, technical direction, and quality review.
  • Correlate events across multiple data sources (SIEM, EDR, network logs, cloud platforms) to identify sophisticated attack patterns.
  • Deliver clear, actionable incident reports and executive-level summaries.
  • Collaborate with cross-functional teams (infrastructure, application, compliance) to ensure remediation and long-term risk reduction.
  • Contribute to the development of playbooks, threat intelligence enrichment, and detection rules to enhance SOC capabilities.
Loading...