Job Title : Cyber Security Engineering V / Sr. Incident Response Lead
Duration : 24 + months with possible extension
Work Location : Charlotte, NC/Detroit, MI/Remote
Mandatory : ** Sr. Incident Response Lead**: ** Cloud experience – preferably Azure/AWS security experience, GCIA, GCIH, or other GIAC certifications preferred; **Forensic capability and Automation; **Splunk/Sort/Phantom – practical experience. ** AI; **Able to participate in a rotating On-Call schedule approximately once a month for after-hours information security events / incidents. **Excellent communication skills – customer facing – calm – even demeanor when challenged, team player who works well with others and works well collaboratively. High EQ. Ethical Hacker skills. Incident commander - Lead calls, strong and varied technical capabilities, social awareness – working with all levels, able to prioritize.
Job Description
Sr. Incident Response Lead
The CSIRT Incident Response position at Client is a member of the Information Protection and Risk Management team and works closely with other members of the IPRM program to develop and implement a comprehensive approach to the management of security risks at Client. The candidate will work with subject matter experts drawn from other teams within IPRM to manage the response to cyber security threats and incidents.
This role is also responsible for working with other team members in responding to security incidents according to established policies and best practices. It will also require strong organizational, workflow / process flow, Use Case development, and documentation capabilities.
Job Responsibilities
· Lead investigations into information security events / incidents
· Drive efforts towards containment of threats and remediation of environment during or after an incident
· Maintain and improve Client’s CyberSecurity Incident Response plan
· Lead audit management responsibilities to ensure identified gaps are addressed in respect to required timing to reduce risk
· Contribute to the development of use case and prioritization of use case development
· Contribute to the process improvement process through development of new detections and changes in the response processes
· Perform complex security investigations and root cause analyses
· Participate in a rotating On-Call schedule for after hours information security events / incidents
· Perform Post Incident reviews and After Action Reports
· Assemble and coordinate with technical teams and third-party vendors to resolve incidents as quickly and efficiently as possible
· Ensure that all incidents are recorded and tracked to meet audit and legal requirements where necessary
· Function as stakeholder to strengthen the overall Response framework inclusive of SOC and CSIRT
· Serve as escalation point for the PCI environment including guidance for monitoring and response