Primary Responsibilities include, but are not limited to:
Plan and validate the organization's Incident Response plan (IR).
Being able to quickly classify an incident and guide the team towards the necessary course of action as the primary global incident commander.
Drive lessons learned and remediation activities throughout the organization.
Recommend security enhancements to management or senior staff.
Work with legal compliance, litigation, and privacy for forensics review of company assets. Provide cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities, and attacks
Assist in the evaluation, development, testing and understanding of emerging data access control technologies, information systems security issues, safeguards, and techniques Recommend mitigation Tactics Techniques and Procedures (TTPs) for identified malicious logic within the customer's environment
Maintain current knowledge of tools and best-practices in advanced persistent threats
Regularly developing and producing succinct written intelligence and flash reports constructed from technical analysis and collected threat information
Contributing cyber security perspective to discussions and decisions regarding global technology infrastructure and technology deployments
Partnering with peer cyber operations teams to understand events and support technical analysis of malicious cyber security incidents
Tracking potential threats associated with attempted intrusions, network & host-based attacks, and coordinating incident response efforts with cyber security teams
Minimum requirements
A minimum of 3-5 years in IT Security Incident Management
Global problem and incident management experience
Experience with security operations in working with a SOC/NOC
Hands-on experience with security and access technologies
Experience with prevention and threat detection devices
Understanding of NIST Framework
Understanding of project management and ITIL methodologies
Passion and Personal Accountability
Guidance Encase Forensics and chain of custody knowledge
Desired skills
B.S. degree in Computer Science or a related technical degree is highly desired
Strong strategy, process, and policy development skills
You have a high level of communication and interpersonal skills