Enable job alerts via email!

Manager, Security Incident Response

TechAlliance of Southwestern Ontario, London Economic Development Corporation

Toronto

On-site

CAD 90,000 - 130,000

Full time

20 days ago

Job summary

A leading tech organization seeks an experienced Security Incident Response Manager to safeguard clients and vital data. This role involves leading a team, managing major investigations, and improving incident response frameworks. Ideal candidates will have a degree in Information Security and extensive experience in cybersecurity, focusing on threats and compliance.

Qualifications

  • 5+ years of experience in cybersecurity, with at least 3 years in incident response or related roles.
  • Strong knowledge of incident response frameworks (NIST, ISO).
  • Proficient in handling cloud-based incidents.

Responsibilities

  • Lead and manage security incident response functions.
  • Establish incident response procedures aligned with industry frameworks.
  • Conduct security investigations and analyze advanced persistent threats.

Skills

Leadership
Incident response
Cybersecurity
Collaboration
Critical thinking
Communication

Education

Bachelor’s degree in Computer Science
Information Security

Tools

SIEM tools
EDR/XDR platforms
Forensic tools

Job description

We are seeking an experienced Security Incident Response Manager to lead and manage our security incident response function. This role is critical to protecting our business, data, and clients by ensuring rapid, effective, and efficient responses to cybersecurity incidents and threats. The ideal candidate will have deep expertise in the incident response lifecycle, strong leadership skills, and the ability to collaborate across various departments and stakeholders.

As part of our Information Security team, you will manage a team of analysts, lead high-profile investigations, and develop and implement response plans for diverse security incidents. Your work will directly contribute to minimizing risks, safeguarding sensitive information, and enhancing the overall cybersecurity posture of our organization.

What you will do :

  • Develop, lead, and oversee the end-to-end security incident response process, including preparation, detection, analysis, containment, eradication, recovery, and post-incident review.
  • Act as the primary point of contact and coordinator during major security incidents, managing incident communications and escalating as needed.
  • Establish and maintain incident response playbooks, procedures, and runbooks aligned with industry frameworks (NIST, ISO 27035, SANS, etc.).
  • Coordinate with the Security Operations Center (SOC) team, Threat Intelligence, and Vulnerability Management to proactively detect and respond to potential threats.
  • Ensure incidents are properly documented, classified, and reported, and lead root cause analysis (RCA) efforts to identify lessons learned.
  • Regularly conduct tabletop exercises and simulations to assess and improve the organization’s incident response readiness.

Security Investigations and Threat Management

  • Manage and conduct security investigations to determine the cause, scope, and impact of security breaches.
  • Oversee evidence gathering to support investigations, ensuring chain of custody and compliance with legal and regulatory standards.
  • Work with threat intelligence team to analyze and respond to advanced persistent threats (APTs), malware outbreaks, ransomware incidents, and other cyberattacks.
  • Collaborate with external partners, law enforcement, and industry groups to stay informed of emerging threats and incorporate intelligence into incident response processes.

Collaboration and Stakeholder Engagement

  • Act as a liaison between the Security Incident Response Team (SIRT) and business units, IT, Legal, Compliance, Risk, and external vendors.
  • Work closely with internal audit, governance, and risk management teams to ensure alignment with corporate security policies and regulatory requirements.
  • Communicate effectively with senior leadership during high-severity incidents, providing regular updates on impact, response activities, and mitigation plans.
  • Partner with business continuity and disaster recovery teams to ensure seamless integration of incident response with overall organizational resilience.

Process Development and Maturity

  • Continuously enhance and refine the incident response framework to align with evolving threats, business objectives, and regulatory landscapes.
  • Develop and maintain comprehensive incident response policies, standards, and guidelines that address the needs of the business while aligning with global best practices.
  • Establish key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of the incident response program.
  • Lead initiatives to automate and optimize incident response activities through the integration of SOAR (Security Orchestration, Automation, and Response) platforms and other tools.

Leadership and Team Management

  • Build, mentor, and manage a team of incident responders and analysts, fostering a culture of continuous learning and collaboration.
  • Provide ongoing training and development for the team to ensure they are up-to-date with the latest threat landscapes, tools, and techniques.
  • Foster strong relationships with third-party incident response providers to ensure additional support when required.

What you bring :

  • Bachelor’s degree in computer science, Information Security, or a related field.
  • 5+ years of experience in cybersecurity with at least 3 years in incident response or related roles.
  • Demonstrated experience leading security incident response teams and managing major incidents.
  • Deep understanding of incident response frameworks (NIST 800-61, ISO 27035, MITRE ATT&CK, etc.) and industry best practices.
  • Strong knowledge of threat detection, digital forensics, malware analysis, network security, and endpoint security.
  • Experience in handling cloud-based incidents (Azure, AWS, GCP) and familiarity with cloud security principles.
  • Proficient in SIEM (Security Information and Event Management) tools, EDR / XDR platforms, and forensic tools.
  • Strong project management skills and the ability to manage multiple investigations and priorities simultaneously.
  • Certifications such as GCIH, GCFA, CISSP, CISM, or CRISC are highly desirable.
  • Experience in the insurance or financial services sector is a strong asset.
  • Familiarity with privacy regulations (GDPR, PIPEDA, CCPA) and industry compliance requirements.
  • Experience working with executive leadership and Board-level communications during incidents.
  • Critical thinking and problem-solving under pressure.
  • Excellent communication skills with the ability to explain technical concepts to non-technical audiences.
  • Strong collaboration and interpersonal skills to work effectively across teams and business units.
  • Detail-oriented with a high level of integrity and professionalism.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs