Cyber Investigations and Response Lead

Aon Corporation
5dRemote

About The Position

The Cybersecurity Investigations & Response (CIR) team within AC3 (Aon’s Global Cybersecurity Operations) is responsible for leading and coordinating incident response, conducting in‑depth investigations, and continuously improving how Aon detects, responds to, and recovers from cyber events. This role can be virtual near one of our US office locations. Aon is in the business of better decisions At Aon, we shape decisions for the better to protect and enrich the lives of people around the world. As an organization, we are united through trust as one inclusive team, and we are passionate about helping our colleagues and clients succeed. What the day will look like This role focuses on deep investigation, coordination, and response leadership—ensuring incidents are executed according to defined processes, evidence is preserved, risks are clearly understood, and lessons learned to drive measurable improvements across Aon’s cybersecurity program. Incident Response & Investigations Lead or support end-to-end investigations for security incidents, from initial triage through containment, eradication, and recovery. Perform detailed analysis of alerts, logs, and telemetry across multiple domains (SIEM, endpoint, identity, network, cloud, email, and third-party sources) to determine scope, root cause, and business impact. Partner closely with AC3 Threat Detection & Response (TDR) teams to validate true positives, refine investigative hypotheses, and improve the quality and reliability of detection signals. Develop clear incident timelines, findings, and technical assessments, ensuring accurate and complete case documentation. Maintain high-quality incident records and evidence within Aon’s case management and response tooling. Crisis & Stakeholder Coordination Support crisis execution during major or high-severity incidents, collaborating with GEOC, Legal, Risk, Audit, Communications, and business leadership as required. Translate technical findings into clear, risk-based insights for both technical and non-technical audiences. Follow and reinforce consistent escalation and communication patterns—ensuring the right stakeholders are informed at the right time with the right level of detail. Contribute to calm, structured, and disciplined response execution during high-pressure events. Playbooks, Procedures & Readiness Help develop, maintain, and improve incident response runbooks, playbooks, and standard operating procedures for common and high-impact scenarios (e.g., ransomware, BEC, insider threat, data ex-filtration, cloud compromise). Participate in, and help design, tabletop exercises and simulations to test technical response and crisis readiness. Support audit, regulatory, and internal assurance activities by clearly documenting response processes, decisions, and evidence of execution. Continuous Improvement & Threat‑Informed Defense Lead or contribute to lessons‑learned activities following incidents and near misses; track improvement actions through to completion. Partner with vulnerability management, identity, infrastructure, cloud, and application security teams to ensure investigation insights drive real risk reduction. Identify detection and visibility gaps and work with TDR to enhance telemetry, tune detections, and improve signal-to-noise ratios across AC3. Strengthen Aon’s threat‑informed defense by feeding investigative insights back into controls, detections, and processes. Collaboration & Global Alignment Operate within a follow‑the‑sun global model, coordinating with CIR and TDR peers across North America, EMEA, and APAC. Support alignment of tools, telemetry, processes, and reporting across regions to enable consistent, scalable operations. Contribute to a culture of collaboration, shared ownership, and continuous improvement across AC3 and Global Cybersecurity Solutions. How this opportunity is different As a CIR Analyst, you will play a critical role in investigating and responding to security incidents across Aon’s North America region. You will work closely with TDR, Global Security Operations, IT, Legal, Risk, Audit, and business stakeholders to ensure incidents are handled effectively and consistently.

Requirements

  • Professional experience in cybersecurity operations, incident response, digital forensics, threat hunting, or a closely related discipline.
  • Strong understanding of core security domains, including: Network security; Endpoint security; Identity and access management; Cloud security fundamentals; Common attack techniques (MITRE ATT&CK familiarity preferred);
  • Hands-on experience with multiple security technologies, such as: SIEM platforms (log analysis, investigation, correlation); EDR/EPP tools; Network security tools (firewalls, proxies, IDS/IPS); Email security and identity platforms; Cloud security and logging solutions
  • Demonstrated ability to analyze telemetry, develop investigative hypotheses, and methodically work incidents through to resolution.
  • Strong written and verbal communication skills, including the ability to produce clear technical documentation and concise executive-level summaries.
  • Familiarity with structured incident response frameworks (e.g., NIST, SANS, ISO) is preferred.
  • Bachelor’s degree or equivalent years of industry experience.

Nice To Haves

  • Experience in a large, complex, or global enterprise environment.
  • Prior work experience in a SOC, DFIR function, or Cyber Incident Response Team.
  • Familiarity with automation or scripting (e.g., Python, PowerShell, KQL, or SOAR platforms) to accelerate investigations and response.
  • Experience working with SOAR or case management platforms in an operational environment.
  • Relevant industry certifications (e.g., GCIA, GCFA, GNFA, GCIH, CISSP, CISM) are a plus but not required.

Responsibilities

  • Lead or support end-to-end investigations for security incidents, from initial triage through containment, eradication, and recovery.
  • Perform detailed analysis of alerts, logs, and telemetry across multiple domains (SIEM, endpoint, identity, network, cloud, email, and third-party sources) to determine scope, root cause, and business impact.
  • Partner closely with AC3 Threat Detection & Response (TDR) teams to validate true positives, refine investigative hypotheses, and improve the quality and reliability of detection signals.
  • Develop clear incident timelines, findings, and technical assessments, ensuring accurate and complete case documentation.
  • Maintain high-quality incident records and evidence within Aon’s case management and response tooling.
  • Support crisis execution during major or high-severity incidents, collaborating with GEOC, Legal, Risk, Audit, Communications, and business leadership as required.
  • Translate technical findings into clear, risk-based insights for both technical and non-technical audiences.
  • Follow and reinforce consistent escalation and communication patterns—ensuring the right stakeholders are informed at the right time with the right level of detail.
  • Contribute to calm, structured, and disciplined response execution during high-pressure events.
  • Help develop, maintain, and improve incident response runbooks, playbooks, and standard operating procedures for common and high-impact scenarios (e.g., ransomware, BEC, insider threat, data ex-filtration, cloud compromise).
  • Participate in, and help design, tabletop exercises and simulations to test technical response and crisis readiness.
  • Support audit, regulatory, and internal assurance activities by clearly documenting response processes, decisions, and evidence of execution.
  • Lead or contribute to lessons‑learned activities following incidents and near misses; track improvement actions through to completion.
  • Partner with vulnerability management, identity, infrastructure, cloud, and application security teams to ensure investigation insights drive real risk reduction.
  • Identify detection and visibility gaps and work with TDR to enhance telemetry, tune detections, and improve signal-to-noise ratios across AC3.
  • Strengthen Aon’s threat‑informed defense by feeding investigative insights back into controls, detections, and processes.
  • Operate within a follow‑the‑sun global model, coordinating with CIR and TDR peers across North America, EMEA, and APAC.
  • Support alignment of tools, telemetry, processes, and reporting across regions to enable consistent, scalable operations.
  • Contribute to a culture of collaboration, shared ownership, and continuous improvement across AC3 and Global Cybersecurity Solutions.

Benefits

  • a 401(k) savings plan with employer contributions
  • an employee stock purchase plan
  • consideration for long-term incentive awards at Aon’s discretion
  • medical, dental and vision insurance
  • various types of leaves of absence
  • paid time off, including 12 paid holidays throughout the calendar year, 15 days of paid vacation per year, paid sick leave as provided under state and local paid sick leave laws
  • short-term disability and optional long-term disability
  • health savings account
  • health care and dependent care reimbursement accounts
  • employee and dependent life insurance and supplemental life and AD&D insurance
  • optional personal insurance policies
  • adoption assistance
  • tuition assistance
  • commuter benefits
  • an employee assistance program that includes free counseling sessions

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service