Why N-able IT doesn't get better than this N-able isn't just another software company - we're going places, and we'd love for you to be a part of that journey. With N-ablites in more than 15 countries around the world, you're adding your unique voice to a diverse team of people who are supporting our customers, and one another. The Way We Work, our hybrid working model based on trust and flexibility, allows you to maximize your contributions while growing your career. Join a team where you can make a difference The N-able team is looking someone who is a high performing Incident Response Lead Analyst within the field of cyber security. You will help to define and drive incident response across the organization and be able to see the big picture within the organization, while understanding the evolving attacker behavior and motivations. The Incident Response Lead is responsible for leading the first responders to detect, analyze, respond to, report on, and mitigate cyber security incidents and will also be accountable for driving new detection rules into the sensors and establishing new rules based on active threats and suspicious behaviours. This role will be part of a 24/7/365 work effort and may be required to participate in an on-call rotation. What You'll Do Perform advanced host (log, OS, memory, EDR) network, and cloud system forensics, log analysis, and malware triage in support of incident response investigations. Lead and/or support the Incident Commander throughout security investigations, providing analysis, documenting findings, and creating after action reports. Mentor and develop aspiring security team members. Analyze and report on actionable threat intelligence. Develop new security detection uplifts (artifacts from TTPs or IOCs) to enhance the security protections across N-able. Create and update incident response processes for N-able. Support the development and execution of tabletop exercises. What You'll Bring "Hands on" technical cyber security experience in Incident Response, Security Operations, and Cloud Security preferred. Mastery of at least 5 of the following: SIEM analysis, cloud environments, Host Forensics, Network Forensics, Malware Reversing, Intrusion Detection, Anomaly Detection, Threat Research. Excellent analytical and problem-solving skills. In depth knowledge of AWS, Azure, M365, Windows, OSX and or nix operating systems and forensic evidence concepts. Ability to lead root cause analysis of problems. The ability to learn new technology and concepts quickly. Scripting (Perl, python, PowerShell, bash), RegEx and PCRE experience is desirable. Purple Perks Medical, dental and vision coverage Generous PTO and observed holidays 2 Paid VoluNteer Days per year Employee Stock Purchase Program FuN-raising opportunities as part of our giving program N-ablite Learning - custom learning experience as part of our investment in you The Way We Work - our hybrid working model based on trust and flexibility About N-able At N-able, Inc. (NYSE: NABL), we are a global software company that turns IT possibilities into capabilities. That means we partner with technology leaders who support companies around the world by offering secure infrastructure and tools to navigate their evolving IT needs. We build strong relationships with our customers to help them thrive at every stage of growth, and at the heart of this effort is our network of N-ablites-a global team of extraordinary, diverse creators who are dedicated to making a difference in how our partners do IT. LI-NK1 LI-Hybrid "Hands on" technical cyber security experience in Incident Response, Security Operations, and Cloud Security preferred. Mastery of at least 5 of the following: SIEM analysis, cloud environments, Host Forensics, Network Forensics, Malware Reversing, Intrusion Detection, Anomaly Detection, Threat Research. Excellent analytical and problem-solving skills. In depth knowledge of AWS, Azure, M365, Windows, OSX and or nix operating systems and forensic evidence concepts. Ability to lead root cause analysis of problems. The ability to learn new technology and concepts quickly. Scripting (Perl, python, PowerShell, bash), RegEx and PCRE experience is desirable. Perform advanced host (log, OS, memory, EDR) network, and cloud system forensics, log analysis, and malware triage in support of incident response investigations. Lead and/or support the Incident Commander throughout security investigations, providing analysis, documenting findings, and creating after action reports. Mentor and develop aspiring security team members. Analyze and report on actionable threat intelligence. Develop new security detection uplifts (artifacts from TTPs or IOCs) to enhance the security protections across N-able. Create and update incident response processes for N-able. Support the development and execution of tabletop exercises.