Cyber Risk Defense Consultant V - Incident Response
Tier 2 and tier 3 incident response functions, including Strong experience with 1) computer incident response and the underlying systems, platforms, and applications, 2) malware analysis, 3) Endpoint Detection and Response (EDR), 4) computer forensics, and 5) strong understanding of attacker and malware techniques and methods of unauthorized access containment
The Consultant-level Incident Handler uses incident response, investigative, and forensics skills to respond to breaches implement containment measures, and investigate impacts. This includes appropriate data collection, preservation, mitigation, remediation requirements, and security improvement plans. The Incident Handler will utilize forensic best practices and provide chain of custody service for criminal investigations (e.g., employee situations, fraud, etc.).
- Collects and preserves digital evidence in a forensically sound manner according to best practices
- Evaluates artifacts (processes, services, drivers, libraries, binaries, scripts, memory, network traffic, file, email, and other objects) for malicious activity, exploitation, and/or unauthorized access
- Identifies attack vectors, exploit methods, malicious code, C2 activity, and persistence mechanism
- Identify containment controls to halt attacks in progress against affected or exposed resources
- Performs analysis to determine scope, risk, and impact of breach or exposure
- Performs root cause analysis and recommend mitigation strategies
- Properly and thoroughly document incident findings, evidence, analysis steps, and create status updates, findings reports, and recommendations
- Focus on preserving uptime and minimize the impact on business and medical services
This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.
Essential Responsibilities:
- Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate; monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others.
- Practices self-leadership and promotes learning in others by building relationships with cross-functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas; and adapting to and learning from change, difficulties, and feedback.
- Leads team in the proactive monitoring and/or response to known or emerging threats against the KP network.
- Effectively communicates investigative findings to non-technical audiences.
- Plans and facilitates regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
- Supports closed loop processes on security efforts by providing feedback to the TDA leads and/or leadership.
- Participates in information fusion procedures across operations and engineering, including activities such as Use Case planning/development, Use Case quality assurance validation, and response procedure documentation.
- Serves as a liaison between stage teams and upper management by identifying issues, improvement areas, or security/architectural gaps and suggesting appropriate improvements.
- Drives the development of the CRDC intellectual capital by leading process or procedure improvements, consulting on brown bag training sessions, and leading the development of new training documents.
- Partners with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
- Facilitates follow-up remediation design and review efforts.
- Leads the investigation and triage of security events across multiple domains.
- Leads complex data analyses in support of security event management processes, including root cause analysis.
- Coordinates the response and resolution of high impact or critical cyber security incidents.
- Leads the deployment of threat detection capabilities and/or incident response plans which may include after-hours support and coordination among responsible teams.
- Drives the execution of incident detection and/or handling processes which may include containment, protection, and remediation activities.
- Minimum two (2) years in an informal leadership role working with project or technical teams.
- Bachelors degree in Business Administration, Computer Science, Social Science, Mathematics, or related field and Minimum eight (8) years experience in IT or a related field, including Minimum two (2) years in information security or network engineering. Additional equivalent work experience may be substituted for the degree requirement.
- Strong computer incident response and the underlying systems
- Endpoint Detection and Response EDR usage
- Background in forensics and/or deep-dive systems administration
- Malware analysis
- Computer forensics
- Strong understanding of attacker and malware techniques and methods of unauthorized access containment
Pleasanton Tech Cntr Building A, 4460 Hacienda Dr. Bldg. A, Pleasanton,California, 94588
Hawaii Remote Workers Location, 415 S Beretania St, Honolulu,Hawaii, 96813 Scheduled Weekly Hours: 40 Shift: Day Workdays: Mon, Tue, Wed, Thu, Fri Working Hours Start: 09:00 AM Working Hours End: 06:00 PM Job Schedule: Full-time Job Type: Standard Worker Location: Flexible Employee Status: Regular Employee Group/Union Affiliation: NUE-IT-01|NUE|Non Union Employee Job Level: Individual Contributor Department: KPIT ADMIN - CYBER THREAT - 9601 Pay Range: $163700 - $211750 / year Kaiser Permanente is committed to pay equity and transparency. The posted pay range is based on possible base salaries for the role and does not include the value of our total rewards package. Actual pay determined at offer will be based on years of relevant work experience, education, certifications, skills and geographic location along with a review of current employees in similar roles to ensure that pay equity is achieved and maintained across Kaiser Permanente. Travel: No
Kaiser Permanente is an equal opportunity employer committed to fair, respectful, and inclusive workplaces. Applicants will be considered for employment without regard to race, religion, sex, age, national origin, disability, veteran status, or any other protected characteristic or status.
Navigating the Hiring Process
We're here to support you!
Having trouble with your account or have questions on the hiring process?
Please visit the FAQ page on our website for assistance.
Need help with your computer and browser settings?
Please visit the Technical Information page for assistance or reach out to the web manager at kp-hires@kp.org.
Do you need a reasonable accommodation due to a disability?
Reasonable accommodations may be available to facilitate access to, or provide modifications to the following:
- Online Submissions
- Pre-Hire Assessments
- Interview Process
If you have a disability-related need for accommodation, please submit your accommodation request and someone will contact you.
Jobs For You
You have no recently viewed jobs
You currently have no saved jobs

Join Our Talent Community
Join our Talent Network today to receive email notifications about our career opportunities that match your skills.
Connect With Us