Bilingual Global Incident Response (GIR) Analyst
Contract NewBookmark Details
NextGen/GTA - Kelly Telecom Company
We are seeking a Bilingual Global Incident Response (GIR) Analyst to join a large, enterprise-level security operations team supporting a global environment
Job Type:Can be in either Jersey City, NJ or Tempe, AZ
About the Role
We are seeking a Bilingual Global Incident Response (GIR) Analyst to join a large, enterprise-level security operations team supporting a global environment. This is a hands-on incident response role where you will actively investigate, analyze, and respond to cybersecurity threats across multiple systems and regions.
This position is ideal for someone who thrives in a fast-paced SOC/IR environment and is passionate about identifying and mitigating real-time security threats.
Hybrid remote and 3 days per week onsite Jersey City, NJ or Tempe, AZ
REGION Time Zone / Shift Days
NJ Front Half 8:00 AM – 6:00 PM EST Sunday – Wednesday
NJ Back Half 8:00 AM – 6:00 PM EST Wednesday – Saturday
Tempe, AZ Front Half 3:00 PM – 1:00 AM EST Sunday – Wednesday
Tempe, AZ Back Half 3:00 PM – 1:00 AM EST Wednesday – Saturday
Key Responsibilities
Investigate and respond to cybersecurity incidents across enterprise environments
Analyze security artifacts to determine attack vectors and recommend remediation
Monitor, triage, and escalate security alerts from SIEM and other tools
Correlate data across multiple sources (logs, endpoints, network traffic) to identify threats
Perform threat hunting, forensic analysis, and root cause investigations
Remediate compromised systems and restore to a secure state
Develop and improve incident response playbooks, detections, and automation
Support security monitoring across Windows, Linux, MacOS, and cloud environments
Create reports on security incidents, trends, and emerging threats
Partner with compliance, risk, and audit teams to ensure adherence to security frameworks
Assist with internal and external investigations as needed
Stay current on evolving threats, vulnerabilities, and industry best practices
Required Qualifications
Fluent in Japanese and English (required)
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field
5+ years of experience in Cybersecurity Operations, Incident Response, or Information Security
Hands-on experience with incident detection, investigation, and response
Strong understanding of operating systems (Windows, Linux, MacOS) and cloud environments
Experience with SIEM, EDR, and security monitoring tools
Knowledge of common attack methods and threat vectors
Strong analytical, problem-solving, and communication skills
Preferred Qualifications
Industry certifications (CISSP, GIAC, GCIH, GCFA, CEH, CISM, etc.)
Experience with threat hunting and digital forensics
Familiarity with security frameworks (NIST, ISO 27001, SOC2, FFIEC, etc.)
Experience supporting audits, risk assessments, and compliance initiatives
Prior experience mentoring junior analysts or contributing to team processes
What You’ll Get
4-day work week (better work-life balance)
Opportunity to work in a global, enterprise security environment
Hands-on exposure to real-world cybersecurity incidents
Collaborative, fast-paced team environment
Share
Facebook
X
LinkedIn
Telegram
Tumblr
Whatsapp
VK
Bluesky
Threads
Mail