Today’s List at a Glance
A hand-picked list of top-tier roles for ambitious professionals. Here’s the breakdown:
- 💰 Salary Range: $52K – $294K
- 🏢 Top Companies Hiring: MorganStanley, Booz Allen Hamilton, Ernst & Young
- 📍 Geographic Spread: Roles span major U.S. hubs (Virginia, Texas, New York, New Jersey, Georgia) plus Port Rowan, ON — 0 remote positions and 1 hybrid role (Arlington, VA).
- 🪜 Seniority Level: Primarily entry to mid-level incident response and cybersecurity analyst roles (Junior → Associate / Analyst II).
Featured Incident Response & Cybersecurity Roles
Incident Response Analyst at MorganStanley
📍 Location: Port Rowan, ON
💰 Salary: $70K – $95K *
Why it’s a great opportunity: Entry-level IR role at a major financial institution with structured SOC responsibilities—ideal for analysts building hands-on IR experience.
Incident Response Analyst at Booz Allen Hamilton Inc.
📍 Location: Mclean, VA (Fairfax County)
💰 Salary: $86K – $198K *
Why it’s a great opportunity: Hands-on IR at a defense contractor with broad exposure to enterprise-scale incidents and defensive tooling.
Cybersecurity Analyst, Junior at Booz Allen Hamilton Inc.
📍 Location: Rome, NY (Oneida County)
💰 Salary: $52K – $108K *
Why it’s a great opportunity: Explicitly junior role focused on defense and risk analysis—an accessible entry point into IR and SOC work.
Analyst/Sr Analyst, IT Cybersecurity Incident Response at AmericanAirlines
📍 Location: Dallas, TX (Dallas County)
💰 Salary: $80K – $110K *
Why it’s a great opportunity: Airline IT IR role with operational responsibilities—great for analysts wanting experience in mission-critical environments.
Our AI Resume Optimizer can help you tailor your resume’s content, section by section, for each of these specific roles.
(Cyber) Incident Management Analyst – Hybrid at Nightwing
📍 Location: Arlington, VA (Arlington County) – Hybrid
💰 Salary: $80K – $110K *
Why it’s a great opportunity: Hybrid role focused on breach investigation and mitigation—ideal for early-career candidates seeking government-facing IR experience.
Cyber Threat Hunter at CACI International
📍 Location: Springfield, VA (Fairfax County)
💰 Salary: $75K – $158K *
Why it’s a great opportunity: Threat hunting at a major contractor with hands-on triage and hunting tooling—directly builds IR-relevant skills.
Cybersecurity Analyst II (Threat Researcher) at CAPPS
📍 Location: Austin, TX (Travis County)
💰 Salary: $94K – $96K *
Why it’s a great opportunity: Focused threat research with close collaboration on incident response—great for analysts transitioning from detection to research.
Cybersecurity Ops III – Associate at MorganStanley
📍 Location: Alpharetta, GA (Fulton County)
💰 Salary: $90K – $120K *
Why it’s a great opportunity: Operational role in a 24/7 environment emphasizing incident management and automation—strong IR exposure for early-career analysts.
Cyber Defense Analyst at Ernst & Young
📍 Location: Hoboken, NJ (Hudson County)
💰 Salary: $152K – $294K *
Why it’s a great opportunity: High-compensation role at a Big Four firm involving red-team and defense activities—accelerated learning and visibility for ambitious analysts.
Cybersecurity Analyst at Booz Allen Hamilton Inc.
📍 Location: Mclean, VA (Fairfax County)
💰 Salary: $86K – $198K *
Why it’s a great opportunity: Broad cybersecurity role at a major consultancy with adversary analysis and offensive/defensive exposure—excellent IR runway.
Strategic Playbook for Landing These Roles
Profile of an Ideal Candidate
- Core Responsibility: Detect, investigate, contain and remediate adversary activity while improving detection and response processes across enterprise environments.
- Essential Experience: A background in SOC or IR operations — practical experience with SIEM, EDR, threat hunting and host/network forensics is consistently requested.
- Key Competencies: Beyond technical chops, employers want strong analytical thinking, clear incident narratives, cross-team collaboration and the ability to prioritize under time pressure.
The Resume Blueprint: Keywords & Metrics
Keywords to Target:
Threat Hunting
SIEM
EDR / Forensics
Triage & Containment
Metrics that Matter:
✅ Reduced Mean Time to Detect (MTTD) by 40% through improved alert tuning and automated playbooks, measured over a six-month period.
✅ Investigated and resolved 20–40 security incidents per month, documenting root cause, impact and remediation steps to prevent recurrence.
✅ Implemented 15+ detection rules or hunting queries that increased true-positive detection coverage across endpoints and network telemetry.
Nailing the Narrative: Your Interview Strategy
Be prepared to answer tough, strategic questions. Here are some specific examples:
“Walk me through a recent incident you owned—how you discovered it, your triage steps, containment choices, and the measurable outcome.”
“Describe a time you developed or tuned a detection that reduced alert noise. What was your process and how did you measure success?”
“How do you prioritize multiple active incidents when resources are limited? Give an example that shows your decision framework.”