
Cyber Security Incident Response Analyst
MSG Entertainment
New York, NYThis was removed by the employer on 9/17/2025 10:41:00 AM PST
This is a Full Time Job
The Incident Response Analyst will respond to alerts and work alongside internal and external teams to remediate them. Additionally, The Incident Response Analyst will focus on Incident Response investigations and remediations. This role will regularly partner with all parts of the business to resolve alerts and remediate security incidents.
What will you do?
• Responsible for carrying out daily security monitoring and response procedures.
• Perform initial incident assessment, evidence gathering, and triage.
• Escalate incidents and participat e i n remediation efforts .
• Investigate and remediate security events occurring in email, workstations, firewall and other platforms
• Document and report steps taken to resolve security events using information security runbooks and templates
• Provide feedback and recommendations for improvement of security controls and response procedures.
• Assist with expanding MDR and SIEM capabilities, including log coverage, alert development, and process improvements.
• R eport weekly metrics to the Information Security Leadership .
• Collaborate with the Technology, People Practices, and Legal and Business Affairs departments to build a more secure MSG.
• Participate in On-Call rotation to remediate alerts and incidents outside regular business hours.
• Assist with managing , analyzing , and remediating phishing emails within our security platform.
• Other information security projects as assigned .
What do you need to succeed?
• 2 years of college-level coursework or have shown similar self-development through certifications, trade school coursework, etc. , are preferred.
• 2 years of experience in information security and/or digital forensics involving investigating and remediating cyber events.
• Comprehend current cyber security threats such as spear-phishing campaigns, business email compromises, and back-door Trojan malware.
• Experience with Endpoint Detection and Response tools such as Carbon Black, SentinelOne and Microsoft Defender.
• knowledge of Windows, Mac, and Linux operating systems . iOS and Android mobile devices.
• E xperience dealing with confidential information and tact when working on sensitive investigations
• B asic knowledge of traditional networking (T CP/IP, DNS, DHCP, etc. ) and cloud infrastructure , such as AWS , GCP, and Azure.
• Able to document detailed investigations, remediations, and procedure changes.
• Communicates effectively with peers, partner teams, and management.
• Ability to think analytically and solving problems individually and as a team.
SPECIAL REQUIREMENTS OF THE JOB:
• Participates in On-Call rotation to ensure security incident response coverage is available 24/7/365
• Possible travel of up to 10% if onsite presence is required at the company’s other locations.
Pay Range
$75,000 — $100,000 USD