At Broadridge, we've built a culture where the highest goal is to empower others to accomplish more. If you’re passionate about developing your career, while helping others along the way, come join the Broadridge team.
Role Overview
We are seeking a highly skilled Senior Incident Response Analyst to join our cybersecurity team. This role is responsible for leading and executing complex incident response investigations, improving detection and response capabilities, and mentoring junior analysts. The ideal candidate brings deep hands-on technical expertise, strong analytical skills, and a passion for developing people and processes. Reporting to the head of the SIRT, this person will help to drive program improvements and maturity.
Responsibilities
Lead and coordinate response efforts for high-severity security incidents, including malware outbreaks, ransomware, data breaches, insider threats, and advanced persistent threats (APTs)
Perform in-depth incident investigation, containment, eradication, and recovery activities across endpoint, network, cloud, and identity platforms
Conduct advanced forensic analysis (endpoint, memory, log, and network) to determine root cause, scope, and impact
Develop and refine incident response playbooks, runbooks, and standard operating procedures
Serve as an escalation point and subject matter expert for junior and mid-level analysts
Mentor and coach junior analysts through hands-on guidance, case reviews, and knowledge sharing
Lead post-incident reviews and drive lessons learned into actionable improvements
Collaborate with SOC, Threat Intelligence, Vulnerability Management, Legal, and IT teams
Assist in tabletop exercises, incident simulations, and readiness assessments
Provide clear, concise communication to technical teams and non-technical stakeholders during incidents
Your Profile
7–10 years of experience in cybersecurity, with significant hands-on experience in incident response or digital forensics
Strong understanding of attacker tactics, techniques, and procedures (TTPs), aligned with frameworks such as MITRE ATT&CK
Experience responding to real-world incidents in enterprise environments
Proficiency with SIEM, EDR/XDR, network security tools, and log analysis
Solid understanding of Windows, Linux, and cloud environments (AWS, Azure, or GCP)
Ability to remain calm and decisive under pressure during high-impact incidents
Prior experience in a formal SOC or IR team leadership or mentorship role
Excellent written and verbal communication skills
Good to have
GIAC Certified Incident Handler (GCIH) or equivalent strongly desired
Additional certifications such as GCED, GCFA, GREM, CISSP, or similar
Experience with cloud incident response and SaaS platforms
Experience in highly regulated industries (e.g., financial services, healthcare, energy, government).
Familiarity with nation state, cybercrime, insider threat, and hacktivist activity.
#LI-KA2
#LI-Hybrid
We are dedicated to fostering a collaborative, engaging, and inclusive environment and are committed to providing a workplace that empowers associates to be authentic and bring their best to work. We believe that associates do their best when they feel safe, understood, and valued, and we work diligently and collaboratively to ensure Broadridge is a company—and ultimately a community—that recognizes and celebrates everyone’s unique perspective.
Use of AI in Hiring
As part of the recruiting process, Broadridge may use technology, including artificial intelligence (AI)-based tools, to help review and evaluate applications. These tools are used only to support our recruiters and hiring managers, and all employment decisions include human review to ensure fairness, accuracy, and compliance with applicable laws. Please note that honesty and transparency are critical to our hiring process. Any attempt to falsify, misrepresent, or disguise information in an application, resume, assessment, or interview will result in disqualification from consideration.
JR1080415