POSITION OVERVIEW:
Leads the strategic development and execution of security incident response initiatives to enhance the organization's resilience against cyber threats.
ESSENTIAL JOB DUTIES/RESPONSIBILITIES:
1. Manage, lead and develop a professional security incident response team fostering technical growth, security telemetry sourcing, data ingestion, security testing center, and continuous improvement.
2. Oversee planning, design, implementation, testing, and operation of incident response processes and systems to ensure effective threat detection, containment, and remediation.
3. Serve as the Incident Commander during major incidents, by engagement translating technical issues into clear business risks timely and actionable updates for stakeholders and executives.
4. Direct post-incident forensics and root-cause analysis, ensuring lessons learned translate into improved defenses and remediation plans.
5. Plan and execute red/purple team exercises, breach and attack simulation, cyber deception operations and other readiness activities to test and strengthen response capabilities.
6. Develop and maintain incident response playbooks, escalation protocols, cross-team coordination, User and Entity Behavior Analytics (UEBA) program, and model alert correlation processes.
7. Work as an integral part of security management team, supporting business and technology, synchronizing communications and actions.
8. Develop scripts, tools, or processes to enhance team capabilities and operational effectiveness.
9. Foster collaboration with remote teams to ensure consistent incident response and security operations.
10. Comply with all applicable laws/regulations, as well as company policies/procedures.
11. Perform other duties as assigned.
QUALIFICATIONS:
Bachelor's degree in business, computer science, information systems and / or related field or equivalent formal training
Five (5) years of experience in information technology, cyber security, or incident.
Certification in one of the following GCIH/GCFA/GCFE/GNFA/GREM/GPEN/OSCP, preferred
Knowledge of malware analysis, Lockheed Cyber Kill Chain, Mitre Attack, and network traffic monitoring techniques.
Experience leading large-scale incidents in a commander role.
Strong knowledge of post-attack forensics and incident containment strategies
Experience with security incident response tools and methodologies
Excellent analytical and problem-solving skills with SIEM data analytics for effective incident investigation of root cause.
Excellent communication skills for clear reporting and collaboration with technical teams and executives
JOB CONDITIONS:
Some travel required
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.