Role Summary
Threat Detection & Incident Response Manager responsible for investigating and responding to IT security incidents, leading digital forensics, and guiding incident response strategy. This role interfaces with stakeholders to ensure alignment, evaluate tooling, and provide expert guidance on digital forensics and incident response. Location: Raritan, NJ or fully remote in the United States.
Responsibilities
- Digital Forensics and Incident Response. Perform active investigation and response to IT security alerts and incidents. Perform root cause analysis and remediation of material security risks.
- Major Incident Response. Support major incident response activities as either an individual contributor (performing digital forensics and incident response) or response commander (performing overall leadership and management of the major incident). Engage various stakeholders inside and outside of IT/Security, and provide status updates to leadership. Participate in on-call rotation to receive and review incident escalations ahead of major incident response team activation.
- Evaluate and implement enhancements to tooling, documentation/runbooks, detection logic, and/or implement proactive improvements to prevent or detect future incidents.
Education
- A bachelor's degree or equivalent experience required.
Qualifications
- Required: 8 yearsβ experience in digital forensics and incident.
- Required: Digital forensics tools and techniques.
- Required: Incident response including major incident response leadership.
- Required: Technical writing and communication.
- Required: Cyber defense frameworks (NIST, ISO, CIS).
- Required: SIEM tools (Splunk, Sentinel).
- Required: Programming or scripting (PHP, Python, Javascript).
- Preferred: Business Process Design
- Preferred: Crisis Management
- Preferred: Critical Thinking
- Preferred: Information Security Auditing
- Preferred: Information Security Management System (ISMS)
- Preferred: Information Technology (IT) Security Assessments
- Preferred: Information Technology Strategies
- Preferred: Mentorship
- Preferred: Organizing
- Preferred: Presentation Design
- Preferred: Process Optimization
- Preferred: Root Cause Analysis (RCA)
- Preferred: Security Architecture Design
- Preferred: Security Policies
- Preferred: Technical Credibility
- Preferred: Vulnerability Management