Cyber incident response is one of cybersecurity’s most interesting and rewarding careers. It’s an in-demand role, and it pays well. But how do you get started?

First, let’s start with the basics.

What is Cyber Incident Response?

Cyber incident response is the preparation for and practice of identifying, containing and ending cyber attacks.

A computer security incident response team (CSIRT) within an organization — ideally including the chief information security officer, security operations center staff, executives and representatives from the legal, resources, compliance and risk management staff — develops and executes an incident response plan or a separate incident response plan for each type of cyberattack.

This plan includes all the moving parts of the response: roles and responsibilities; the incident response methodology; rules for documenting the attack and response; a business continuity plan; and a communication plan for informing all stakeholders.

There are usually six general incident response steps that are widely accepted:

1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Lessons Learned

Many people are involved in cyber incident response, but nobody is involved more than the cyber incident response professional on the team.

Cyber Incident Response as a Career

The role of a cyber incident responder is often challenging, interesting and rewarding. Here’s what’s involved in day-to-day life.

One major responsibility is the prevention of cyberattacks. This includes critical involvement in developing cyber incident response plans and the hunt for vulnerabilities and security gaps in policies and procedures. Some of this is informal, and some formal, including security audits, risk analysis and penetration testing. And, of course, the application of remedies and fixes for when gaps and vulnerabilities are discovered.

Cyber incident responders also monitor systems for attacks in progress, and take immediate (planned) steps to contain and ultimately terminate the attack.

And once the attack has been terminated, cyber incident response calls for preparing a report detailing what happened and why. This report is key because it should be reviewed by top management, other security and IT staff, and possibly the legal department.

To succeed as an incident response analyst, you’ll need skills in the areas of network forensics, risk analysis, penetration testing and reverse engineering.

You’ll also need a strong familiarity with a wide range of operating systems, programming languages and protocols, including Linux, Unix, Windows, C++, Python, PowerShell, Java, ASM, PHP, PERL, TCP/IP, Domain Name System (DNS), Dynamic Host Configuration and others.

You’ll need to know network security architecture inside and out, management tools and deep familiarity with all types of cyberattacks.

And finally, you’ll need to get inside the heads of attackers — to know the tradecraft, culture and methods of malicious hackers.

It’s a lot to know. You’ll want to prepare.

How to Prep for a Career in Incident Response

Incident response professionals arrived at their positions with a wide range of backgrounds, educations and experience. They often start as system, network and security administrators or in other IT positions.

With this experience, your next step is getting the training, education and certifications that make you eligible for an incident response role.

Make sure you have a relevant university degree — computer science, computer forensics, electrical engineering, information assurance or cybersecurity, for example. If you’re interested in future management and administration, a master’s degree would be helpful.

Get experience with a security team for at least two years if you don’t have it already.

Once you have the right education and experience, it’s time to get certified.

Cyber Incident Response Certifications

Cyber incident response analysts and professionals aren’t generalists, per se, but have to be specialists in the full incident response lifecycle.

Employers will give priority to applicants with the following professional certifications:

  • Certified Penetration Tester (CPT)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Certified Forensic Analyst (GCFA)
  • CERT-Certified Computer Security Incident Handler (CERT-CSIH)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • Cisco Certified Network Associate (CCNA)
  • Certified Computer Examiner (CCE)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Intrusion Analyst (GCIA)
  • Certified Computer Forensics Examiner (CCFE)
  • Certified Reverse Engineering Analyst (CREA)
  • CompTIA Advanced Security Practitioner (CASP+)

You’ll Also Need Some Soft Skills

The work of a cyber incident response professional has social and leadership dimensions that call for specific soft skills.

For starters, the work involves leadership in the formation and organization of the computer security incident response team. This team brings together security specialists with others in the organization who have minimal knowledge and experience with cybersecurity. The job of making sure real communication happens may fall in large part on your shoulders.

The quality of incident reports is an extremely important metric for success. These reports not only inform security practices and provisioning in the future, but they also educate leaders across the organization, as well as end users. The reports may also be used as evidence in the prosecution of cyber attackers and for other legal purposes. This range of “target audiences” for these reports requires a level of writing ability and clarity of communication that many IT and security professionals may not possess.

The job comes with plenty of liaison communication with other professionals.

And finally, while it might not be a “soft skill,” the ability to work under pressure is an absolute must. You’ll have to work efficiently and creatively during an active cyberattack when every second counts.

The truth is that turnover is high in incident response roles. And there are several reasons for this — chief among these is that the experience of the role is very stressful and intrusive on personal time. Still, the knowledge and experience make these professionals desirable for other, higher-paying positions.

Cyber incident response analysts are the “firefighters” of cybersecurity — you’ll prevent cyberattack “fires” if you can, but put them out if you must.

Want to learn about what it’s like to work incidents live? Hear directly from IBM Security X-Force incident responders in the webinar, “Tales from the Digital Frontlines” – available on demand.

More from Incident Response

5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that's already too late.Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for ones that evade the dashboards of their security solutions.However, advanced threat actors have learned to blend in with their target's environment, remaining unnoticed for prolonged periods. Based…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

People, Process and Technology: The Incident Response Trifecta

Let's say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for investment, your budget has been approved and expanded. With your newfound wealth, you focus on acquiring technology that will improve your monitoring, detection and analysis of data traffic. Has the incident program really improved by the technology acquisition, or is the uplift merely cosmetic? If no other changes have been…

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. While Discord and its related software…