Bilingual Global Incident Response (GIR) Analyst with Japanese

KPG 99 Inc. United States Posted 2h ago via Dice
Region
USA
Apply Now →

Job Description

They are now open to accepting non-local candidates as well who are willing to relocate to any of the given work locations without requiring relocation expenses

Client location: Jersey City, NJ and Tempe, AZ or Brea, CA

Work location: 3 days onsite and 1-day remote work (4-day work week)

Rate : $62/hour W2

Duration : 12 months contract initially with contract to hire option.

Working Hours:

4-day work week, hybrid/remote - 3 days per week onsite, 1 day remote (2 resources in Jersey City, NJ and 2 resources either in Tempe, AZ or Brea, CA)

Working shifts and hours:

Jersey City, NJ (Front Half) 8:00 AM - 6:00 PM EST, Sunday Wednesday (1 resource)

Jersey City, NJ (Back Half) 8:00 AM - 6:00 PM EST, Wednesday Saturday (1 resource)

Tempe, AZ / Brea, CA (Front Half) 3:00 PM - 1:00 AM EST, Sunday Wednesday (1 resource)

Tempe, AZ / Brea, CA (Back Half) 3:00 PM - 1:00 AM EST, Wednesday Saturday (1 resource)

The Bilingual Global Incident Response (GIR) Analyst will be responsible for the following:

- Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement

- Strong Incident Response knowledge and experience

- Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds

- Experience with security data collection, analysis and correlation

- Well-developed analytic, qualitative, and quantitative reasoning skills

- Demonstrated creative problem-solving abilities

- Security event monitoring, investigation, and overall incident response process

- Investigate potential cybersecurity events across multiple environments using various tools and techniques

- Development of information security policies, standards, and procedures

- Strong time management skills to balance multiple activities and lead junior analysts as needed

- Understanding of offensive security to include common attack methods

- Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event

- A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.

- Detailed knowledge and experience in security and regulatory frameworks (CRI, ISO 27001, NIST 800 series, FFIEC, SOC2, STAR, etc.)

- Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies

- Create reports analyzing activities or trends both within and outside of the organization

- Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats

- Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams

- Monitors external service provider activity to detect potential cybersecurity events

- Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations

- Analyzes compromised systems and remediates to a clean state

- Performs breach indicator assessments to investigate network traffic for malicious activity

- Assists with internal or third-party employee investigations

- Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise

- Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts

- Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices

Qualifications

Both English and Japanese language skills as well as cultural fluency are strongly required.

Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline

5 + years of experience working in the Cybersecurity Operations or Information Security

Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred

Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred

Experience with information security risk management, including information security audits, reviews, and risk assessments

First seen 2026-04-22 08:40:01 · Last verified 2026-04-22 08:40:01


Get new pentesting jobs in your inbox

Send Feedback

Help us improve Pentest Careers

0/2000