Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading company is seeking a Cybersecurity Incident Manager to guide a team of first responders. The role involves providing expertise on cybersecurity events and incidents, mentoring junior analysts, and managing shift operations to ensure 24/7 coverage. Ideal candidates will have hands-on experience in IT security and incident management across multiple domains, as well as strong leadership skills.
Business Unit: Protect Platform - Operations
Duration: 3 months
Extension possible: Possibly
Conversion Possible: Possibly
Interview Process: 2 rounds: Virtual (Manager and Sr Leads)
Work Location: Hybrid (any 2 days – preferably Tues and Wed)
CANDIDATE PROFILE DETAILS:
Years of experience: 3-5
Reason for request/why opened: backfill
% Interaction with Stakeholders: 60% within the team – 40% within the bank
Team Size: 12 people on shifts at any given time - very collaborative
Project: will be working on Shift queues
Selling Point of the position: Very strong team background, sense of humor, consistent sense of sharing and always someone to help
How will performance be measured: Reports on tickets sent to manager and touchpoints with manager
Best vs Average Candidate: Have 3 years’ experience in cybersecurity, strong team player, looking to contribute, investigation mindset, and adaptability to change.
SUMMARY OF DAY-TO-DAY RESPONSIBILITIES:
We are looking for someone to guide a group of Cybersecurity Incident and Forensic first responders. You will provide specialized expertise on Cybersecurity Events, Incidents, and Digital Forensics.
· Support learning and growth of team members as a guide in Threat Defense Operations with a focus on mitigating risks to protect the bank.
· Participate in projects of moderate to high complexity, providing complex reporting, analysis, and assessments at various levels.
· Demonstrate moderate to advanced hands-on experience with modern operating systems, role-based access, internal file structures, registries, and data storage.
· Have moderate to advanced experience as an Incident Manager handling complex security incidents, coordinating with internal/external teams, vendors, and partners.
· Experience handling cybersecurity events related to network layer 7/application and internet-facing attacks.
· Ability to brief executives on cybercrime and security incidents, including triage, containment, and recovery.
· Ability to author complex communications and maintain playbooks and process documentation.
Essential job functions include:
· Continuously advancing knowledge in cybersecurity domains (Incident Response, Forensics, Offensive Security, Threat Intelligence, Risk Management).
· Capable of performing hands-on L1 and L2 responsibilities when necessary.
· Mentoring junior analysts in investigations.
· Investigating cybersecurity events, tuning security controls, and debugging alerts for legitimacy.
· Overseeing shift operations to ensure 24/7 coverage, managing workloads, and ensuring SLAs are met.
· Performing peer reviews and coordinating with senior incident management teams.
· Managing shift handovers, communications, scheduling, and reporting on team coverage.
· Utilizing dashboards and attending situational calls for incident management.
MUST HAVE:
1) 3+ years of practical experience in IT security and incident management across multiple domains.
2) Hands-on experience with modern OS (Windows/Linux/Cloud/Mobile).
3) Experience with incident detection tools like SIEM, EDR, XDR, Firewall, WAF, email proxies, NIDS.
4) Knowledge of organizational controls, cybersecurity, and risk assessment.
5) Experience with Azure, Defender, Sentinel.
SOFT SKILLS MUST HAVES:
· Strong leadership and team-building skills within IT and cybersecurity.
· Ability to participate in large, complex projects.
· Ability to serve as a lead resource for security controls and technology.
NICE TO HAVE:
1) Security certifications or accreditations are an asset.