βΆBlue team (defensive IR) vs red team (offensive pentest) β what's the difference?
Blue team = incident response, forensics, threat hunting, defense-in-depth. React to real attacks, fix vulns, build detection rules, harden systems. Red team = ethical hackers hired to find vulns before attackers do. Career progression often overlaps: pentest β IR engineer, or IR engineer who pivots to red team. IR pays solid ($110-160k mid) but red team ($130-180k+) has higher ceiling. Most organizations need more blue team than red team.
βΆNIST Incident Response phases β what are they and why matter?
NIST IR framework has 4 phases: (1) Preparation (tooling, playbooks, training), (2) Detection & Analysis (identify breach, determine severity), (3) Containment/Eradication/Recovery (stop spread, remove attacker, restore systems), (4) Post-Incident Activity (forensics, root cause, improve controls). Every IR retainer and job expects you to reference NIST IR. Knowing these phases is table stakes for IR engineer interviews.
βΆRansomware playbook β how do I handle a ransomware incident?
Immediately: (1) isolate infected machines (air-gap, network segment), (2) identify patient zero via logs/alerts, (3) preserve forensics (disk snapshot, memory dump), (4) determine variant via ransom note + file extension, (5) don't pay (unless approved by legal/insurance), (6) notify legal/leadership, (7) engage law enforcement if US-based, (8) use MISP/TheHive to track IOCs. Post-incident: analyze malware behavior, review detection gaps, implement EDR/behavior-based blocking, simulate incident response gameday.
βΆSupply chain attack response β SolarWinds/3CX/MOVEit examples β how do you respond?
Supply chain attacks target a vendor's software, affecting all downstream customers. IR playbook: (1) identify which versions/customers affected (cross-reference deployment logs), (2) isolate any systems running vulnerable version, (3) revoke affected credentials, (4) scan enterprise for backdoors/beacons, (5) update vendor software as soon as patch drops, (6) if no patch yet: disable/remove vulnerable component (e.g., SolarWinds Orion on non-critical systems), (7) hunt for C2 connections (Wireshark, Splunk DNS logs), (8) coordinate with vendor's public advisories. Supply chain IR is more about inventory/hunting than zero-day exploit analysis.
βΆAI and ML in Incident Response 2026 β how are they changing IR?
2026 trends: (1) AI-powered alert triage reducing false positives from 99%β70%, (2) ML behavior analytics catching zero-day malware via process/network anomalies (vs signature matching), (3) generative AI drafting initial IR playbooks and timeline analysis, (4) automated containment (kill process, revoke token, isolate VM) based on detection rules, (5) SOAR platforms auto-executing playbooks end-to-end. But: AI requires clean data (false positives poison training), humans still own decisions (no autopilot IR), and prompt injection attacks are now a threat vector. IR folks in 2026 need to understand ML output interpretability, not just use black-box alerts.
βΆIR retainer firms vs internal IR team β career path?
Retainer IR firms (Mandiant, CrowdStrike Services, Deloitte Cyber, Kroll): fast-paced, diverse incident types, travel expected, client-facing, $110-180k. Internal IR team (CSIRT, SOC manager role): deeper domain knowledge, on-call, defend same org repeatedly, more predictable schedule, $130-200k+ for leads. Early career: retainer gives variety + training. Mid-career: internal role offers stability + influence over security strategy. Most senior IR folks have done both. For resume: retainer = breadth, internal = depth.
βΆThreat hunting vs incident response β aren't they the same?
Threat hunting = proactive, no alert triggered. You write queries/rules to find suspicious behavior before attackers hit an alarm. IR = reactive, someone (or a tool) detected anomaly; you investigate. Hunting helps IR: better detection rules catch more incidents faster. IR skills help hunting: forensics knowledge tells you where to look. Career-wise: hunt before you respond (easier to learn IR first, then graduate to hunting). Threat hunter pays ~$120-150k; IR engineer $110-160k. Skills transfer both ways.