1. Home
  2. Jobs
  3. Mexico
  4. Nuevo León
  5. Monterrey
  6. Cybersecurity
  7. Cybersecurity Incident Response Analyst
NI

Cybersecurity Incident Response Analyst

NOV Inc.
Posted onFeb 24, 2026
LocationMonterrey, Nuevo León, Mexico (Hybrid)
Employment typeFull-time

About NOV

NOV delivers technology-driven solutions to empower the global energy industry. For more than 150 years, NOV has pioneered innovations that enable its customers to safely produce abundant energy while minimizing environmental impact. The energy industry depends on NOV’s deep expertise and technology to continually improve oilfield operations and assist in efforts to advance the energy transition towards a more sustainable future.

At NOV, we are a globally diverse happy family, driven to power the people who power the world.

About The Role

NOV is seeking a Cybersecurity Incident Response Analyst to detect, investigate, and help contain cyber threats across our global enterprise. You’ll be on the front line of our cybersecurity operations—triaging alerts, analyzing activity, running investigations, and contributing to real-world threat response across IT, cloud, and OT environments.

This role leverages a modern, AI-enhanced security toolset. You’ll use AI and large language models (LLMs) to enrich alerts, summarize incidents, and accelerate response actions. You’ll work with telemetry from tools like SentinelOne, Okta, and Zscaler to detect and respond to both known and novel threats. Come and join a great team who are driving tomorrow’s cybersecurity.

What You’ll Do

  • Monitor, triage, and investigate alerts from SIEM, EDR, identity platforms, and cloud environments
  • Use AI/LLM-powered tools to enrich alerts, summarize logs, and support root cause analysis
  • Correlate telemetry across identity, endpoint, cloud, and network systems to build clear incident timelines
  • Support containment and remediation efforts in collaboration with SOC, engineering, and IT teams
  • Analyze AI-generated threat scores, behavioral anomalies, and recommendations to detect stealthy or emerging threats
  • Assist in evidence collection for forensics, insider threat, or audit-related investigations
  • Document incidents thoroughly and contribute to response playbooks and process improvements
  • Participate in tabletop exercises and threat simulation activities to improve detection and response maturity
  • Recommend enhancements to detection rules and automation workflows based on incident learnings
  • Other duties as assigned by organization leadership

What You Bring

  • Possess strong communications and interpersonal skills in English
  • Self-directed, organized, and able to manage multiple priorities
  • Strong ability to work collaboratively with others, to influence based on knowledge and experience
  • Experience in a SOC, cybersecurity operations, or incident response role
  • Hands-on experience with tools like SentinelOne, Defender for Endpoint, Microsoft Sentinel, Zscaler, or Splunk
  • Familiarity with MITRE ATT&CK and common attacker tactics, techniques, and procedures
  • Working knowledge of endpoint behavior, log analysis, DNS/HTTP/SOC telemetry, and identity-related indicators
  • Basic scripting or automation (PowerShell, Python, Bash) to assist in triage or data parsing
  • Experience using or interpreting AI/ML-driven detection tools, or LLM-based security assistants (e.g., for alert summaries or ticket generation)
  • Strong communication and documentation skills for technical and non-technical audiences
  • Calm under pressure and effective in active response situations

Preferred Qualifications

  • Certifications: Security+, or equivalent
  • Familiarity with SOAR platforms or AI-enhanced triage systems
  • Exposure to OT/ICS incident response is a plus
  • Experience working with cloud-native environments (Azure, AWS)

Why NOV?

  • Join a cybersecurity team that actively uses AI to improve response speed and clarity
  • Investigate real-world threats affecting global infrastructure across IT, OT, and cloud
  • Collaborate with engineers and analysts who focus on outcomes, not just alerts

We are an equal opportunity employer.

NOV is committed to building a diverse environment and is proud to be an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law.

We offer a comprehensive employee benefits package including health, life, and disability insurance; a retirement plan; and paid time off. Our company is committed to crafting a lasting impact for ourselves, our customers, and the communities where we live and work.

NOV is a global provider of technology-driven equipment, services, and solutions for the oil and gas industry, with over 150 years of innovation in energy infrastructure.

Similar jobs

You might also be interested in...

KE2w

SOC Analyst (Level 1)

Keyrock

California City, California, United States or Remote (California, United States + 15 more)

GC2w

Remote SOC Analyst

Global Channel Management, Inc.

Atlanta, Georgia, United States or Remote (United States)

$58k – $59k Yearly

GM1w

Staff Cyber Detection Incident Analyst - Security Operations

General Motors

Warren, Michigan, United States (Hybrid)

LD23h

Cybersecurity Intern - Threat Intel Analyst (Beavercreek, OH, US, 45431)

Leonardo DRS, Inc.

Beavercreek, Ohio, United States (On-site)

RG2w

Cybersecurity Engineer - Level 2

Rhodian Group

United States or Remote (United States)