serves as a subject matter expert in cyber threat detection and incident response, overseeing detection, mitigation, and reporting of security incidents across business units. This management role includes coordinating escalation schedules, leading response operations, and ensuring effective security across both on-premise and cloud environments.
Coordinate with IT, Legal, Human Resources, and other business units to gather
incident details, assess impact, and manage
coordinated response actions.
Handle all phases of
Cyber Detection and Incident Response
including preparation, notification, containment, eradication, recovery, analysis, and post-incident review.
Serve as a subject matter expert for cybersecurity detection and response operations across the organization.
Respond to security incidents involving
diverse technologies, contain and mitigate threats, coordinate remediation
, and provide recommendations for continuous improvement to senior management.
Utilize advanced security technologies including
to manage incident detection and response.
Provide technical expertise to
proactively detect potential security threats
and improve the organization's overall security posture.
Collaborate with the Cyber Intelligence team to
design and implement new threat detection logic to address emerging cybersecurity risks
.
Develop, document, and refine incident detection and response processes and procedures in collaboration with frontline operations teams.
Produce detailed documentation, reports, and verbal briefings
summarizing incident findings, risk assessments, and mitigation outcomes.
Evaluate and
prioritize risks to ensure mitigation efforts align with organizational
priorities and business objectives.
Coordinate with IT resources to execute
effective incident response
and remediation tasks.
Lead incident response operations as the
during active incidents to minimize exposure and business impact.
Conduct
root cause analyses and prepare comprehensive post-incident reports,
including lessons learned and recommendations.
Continuously
identify, evaluate, and implement
process improvements to enhance detection, response, and recovery efficiency.
JOB SPECIFICATIONS:
Excellent verbal and written communication skills with the ability to articulate technical issues clearly and effectively.
Strong analytical and logical problem-solving capabilities to address complex cybersecurity challenges.
Proven experience working within high-performing, collaborative teams, with a deep understanding of SOC (Security Operations Center) environment dynamics.
Solid knowledge of cybersecurity principles, tools, and cloud security practices.
Relevant industry certifications such as
CISSP
,
GCIH
,
AWS Certified Cloud Practitioner
,
AWS Certified Security - Specialty
, or equivalent certifications preferred.
Strong commitment to continuous learning and staying updated with emerging cybersecurity trends and technologies.
Eligibility Criteria:
Bachelor's degree in Computer Science, Information Technology, or a related discipline with a minimum of 3 years of relevant work experience.
Work Timings:
Availability required between
03:00 PM and 11:00 PM Eastern Time (US)
.
Work hours are aligned with
US Eastern business hours
and will adjust locally twice a year to accommodate daylight saving time changes.
Eligibility Criteria:
In lieu of a degree, candidates with a High School Diploma or GED must have a minimum of 5 years of equivalent professional experience.
Minimum of 2 years of hands-on experience in information security or related technology domains; prior experience in the securities or financial services industry is an added advantage.
Minimum of 2 years of experience in cybersecurity, incident response, or security operations, specifically involving detection, analysis, containment, eradication, and recovery from cybersecurity incidents.
Job Types: Full-time, Permanent
Pay: ?400,000.00 - ?700,000.00 per year
Work Location: In person
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.