Level 3 Incident Response Analyst

Allstate Allstate · Insurance · United States · Remote

Experienced Cybersecurity professional with a strong background in incident response to join the team. The Level 3 Incident Response Analyst role is designed for someone who thrives in complex investigations, leads containment and remediation efforts, and enjoys mentoring junior analysts.

What you'd actually do

  1. Lead end‑to‑end incident response activities from triage through closure.
  2. Manage high‑severity threats from start to finish, ensuring all actions are thoroughly completed.
  3. Partner with engineering teams to improve detection rules and integrate tooling that enhances security capabilities.
  4. Facilitate incident response retrospectives and surface operational gaps and improvement opportunities.
  5. Mentor SOC analysts and serve as a subject‑matter expert for complex security challenges.

Skills

Required

  • Incident Response
  • Digital Forensics
  • Security Operations
  • Windows and Linux operating systems
  • cloud computing services (Azure, GCP, & AWS)
  • EDR/XDR platforms
  • SIEM platforms
  • Next Generation firewalls
  • MITRE ATT&CK
  • PCAP and network-traffic analysis
  • Python
  • PowerShell
  • Bash
  • written and verbal communication skills

Nice to have

  • cloud-native security monitoring and incident response
  • SIEM detection rule development or tuning
  • large enterprise or multi-cloud environments
  • GCFA
  • GCIH
  • CISSP
  • SC-200
  • AZ-500
  • SC-100
  • NIST 800-61
  • MITRE D3FEND
  • ISO 27001
  • HIPAA
  • PCI-DSS
  • Outcome-Based Delivery
  • Agile methodologies
  • generative and agentic AI

What the JD emphasized

  • 7+ years of hands‑on Cybersecurity experience, including 5+ years in Incident Response and/or Digital Forensics.
  • Strong background in Incident Response, Incident Handling, and Security Operations.