Role Summary
Threat Detection & Incident Response Manager responsible for investigating and responding to IT security incidents, performing digital forensics, and leading major incident response efforts. Works with stakeholders across IT/Security to align readiness, evaluate tools and procedures, and guide incident response as a subject-matter expert on digital forensics and incident response. The role is based in Raritan, NJ or fully remote in the U.S.
Responsibilities
- Digital Forensics and Incident Response: Perform active investigation and response to IT security alerts and incidents; perform root cause analysis and remediation of material security risks.
- Major Incident Response: Support major incident response activities as an individual contributor or response commander; coordinate with stakeholders inside and outside IT/Security; provide status updates to leadership; participate in on-call rotation.
- Evaluate and implement enhancements to tooling, runbooks, detection logic, and proactive improvements to prevent or detect future incidents.
- Team Development: Mentor and develop team members, fostering a culture of innovation and continuous improvement.
- Tool Evaluation and Selection: Evaluate and recommend cybersecurity tools and technologies that enhance response capabilities.
- Risk Management: Identify potential risks and vulnerabilities in systems and processes and coordinate mitigation of them.
- Threat Intelligence and Analysis: Utilize threat intelligence to inform response efforts and bolster proactive defense measures.
Qualifications
- Education: A bachelor's degree or equivalent experience required.
- Required Experience & Skills: 8 yearsβ experience in digital forensics and incident.
- Required Experience & Skills: Digital forensics tools and techniques.
- Required Experience & Skills: Incident response including major incident response leadership.
- Required Experience & Skills: Technical writing and communication.
- Required Experience & Skills: Cyber defense frameworks (NIST, ISO, CIS).
- Required Experience & Skills: SIEM tools (Splunk, Sentinel).
- Required Experience & Skills: Programming or scripting (PHP, Python, Javascript).
- Preferred Skills: Business Process Design, Crisis Management, Critical Thinking, Information Security Auditing, Information Security Management System (ISMS), Information Technology (IT) Security Assessments, Information Technology Strategies, Mentorship, Organizing, Presentation Design, Process Optimization, Root Cause Analysis (RCA), Security Architecture Design, Security Policies, Technical Credibility, Vulnerability Management
Education
- A bachelor's degree or equivalent experience required.