The opportunity The Cyber & Investigative Services (CIS) Incident Coordinator will exercise strong incident management techniques to coordinate security incident response to cybersecurity events or incidents stemming from suspected threats. Candidates for the role must have a strong comprehension of incident response plans and coordination of activities, work well with others, and have strong verbal and written communication skills. Including, a sense of diplomacy, ability to anticipate obstacles, and decision-making skills to handle the fast-paced world of incident management. Foundational skills in incident response, incident management, chain of custody, forensics, event analysis, and hands on cyber security skills are essential.
Your key responsibilities Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT Help lead small to medium sized projects as directed by leadership Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company's incident response plan As requested, develop and deliver metrics to leadership Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event Own and manage the teams internal action playbooks and knowledgebase Must be willing to be on-call off-hours in rotation with other team members (Required)
Skills and attributes for success Resolution of security incidents by validating root cause and solutions Analyze findings in investigative matters, and develop fact-based reports Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities Demonstrated integrity and judgment within a professional environment Inquisitive approach to analysis and peer review Application of emotional intelligence and calm under pressure Ability to appropriately balance work/personal priorities
To qualify for the role, you must have Education: Bachelors or Masters Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience Experience: 7+ years' experience in at least two of the following roles:
Member of a Security Operations Center (SOC) Security Incident Response Analyst or supporting function (2 years minimum) eDiscovery or related role performing forensic functions Deep understanding of security threats, vulnerabilities, and incident response Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis Understanding of regulatory stipulations regarding security incidents Experience with SIEM technologies (i.e. Splunk) Deep understanding of both Windows and Unix/Linux based operating systems
Ideally, you'll also Candidates must hold or be willing to pursue related professional certifications such as GCFE, GCFA, GCIH, CISA, CISM, CISSP, or CCIM What we look for Demonstrated integrity in a professional environment Ability to work independently Have a global mind-set for working with different cultures and backgrounds Knowledgeable in business industry standard security incident response process, procedures, and life-cycle Excellent organizational skills and strong attention to detail Excellent teaming skills Excellent social, communication, and writing skills Excellent customer service skills required
#J-18808-Ljbffr