Epicareer Might not Working Properly
Learn More

Incident Commander

  • Full Time, onsite
  • ONE IT CORP
  • Hybrid3 days onsite in a week, United States of America
Salary undisclosed

Apply on


Original
Simplified

Incident Commander

Hybrid - Deerfield Beach, FL

Contract

Must have:

Visible experience with the actual Incident Response process.

Actually going through the IR process from Detection to Containment to Lesson s Learned etc.

The Incident Manager is a key member of the Information Security department and reports directly to the Manager, Security Operations Team with the primary responsibility is to manage the response to any and all cybersecurity incidents impacting JM Family Enterprises.

Responsibilities include but not limited to:

  • Be Responsible to manage the response for all cybersecurity incidents tracked and Investigated by the Security Operations team.
  • Assume operational control of Incident Response resources in the event of a cybersecurity Incidents.
  • Ensure alignment and sound execution of the incident resolution process, with transparent communication to stakeholders and senior leadership
  • Able to oversee multiple investigations/incidents concurrently providing proper direction to each work stream.
  • Timely reporting/updates on all cybersecurity incidents to management.
  • Create knowledge, artifacts, and tools to be used during an actual cybersecurity incidents.
  • Regularly interact with senior leadership and business organizations
  • Collaborate with counterparts in other regions around the world to ensure that all cybersecurity incidents are worked appropriately.
  • Participate in post-incident process reviews to ensure continuous improvement of operations and execution, and contribute to the improvement of the incident response process based on lessons learned.

Desired Skills:

  • Knowledgeable in business industry standard security incident response process, procedures, and life-cycle.
  • Flexible working hours to support operations
  • Required Interpersonal Skills
  • Excellent oral and written communication ability
  • Ability to present complex technical issues and findings to diverse audiences in both technical and non-technical parlance, both orally and in writing
  • Demonstrate leadership and directive control of stressful situations.
  • Ability to utilize interpersonal skills listed above to communicate with customers and stakeholders and bring quick resolution
  • Demonstrated ability to analyze ongoing situations for the potential of a security incident
  • Ability to maintain incident records in support of recovery, regulatory and legal requirements
  • Familiar with ITIL service management methodology.
  • Prior experience in a 24x7x365 operations environment.
  • Experience with electronic investigations, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis.
  • Understanding of and strict adherence to digital chain of custody forms and processes.
  • Experience in vendor management specific to incident response and security tools.
  • Experience and/or SME knowledge of the ISO 27001, NIST 800-53, NIST CSF and PCI DSS.

Qualifications/Requirements:

  • 10+ years of experience working in a large technology enterprise environment.
  • 7+ years of experience working with cybersecurity incident response teams
  • 5+ years of experience as a cybersecurity Incident Response or SOC analyst
  • Hold technical cybersecurity certifications from for organizations such as SANS or ISC2
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job
Similar Jobs