Director of Security Operations overseeing incident response tasks at Gartner. Leading a geographically dispersed team and improving capabilities for detecting and responding to threats.
Responsibilities
Drive operational excellence of a geographically dispersed Security Operations team.
Serve as the Incident Commander during the incident response process.
Continuously seek out opportunities to improve the team’s ability to rapidly and effectively respond to security incidents.
Work with key business stakeholders to detect, respond to, and remediate security issues.
Provide mentorship and guidance to team members, promoting a culture of open communication, continuous improvement, and operational excellence.
Drive automation initiatives, enhancing analyst capabilities and workflows while eliminating monotonous tasks.
Develop innovative and cutting-edge detection content aligned with ATT&CK, Cyber Kill Chain, and various other cyber security frameworks.
Bring your own ideas and solutions to a fast-paced, growing, and evolving team centered around operational excellence.
Ensure smooth handover of alerts and incidents between team members located in various geographic locations.
Requirements
Bachelor’s in Computer Science, Information Security, Engineering, or 6+ years of experience in Information security.
Previous experience leading a SOC, Hunt, and/or Incident Response Team or progressive growth in responsibilities in a SOC environment.
Demonstrated ability to prioritize and analyze security events, enabling swift decision-making on appropriate courses of action and initiating timely and proportional responses.
Expertise in conducting and driving analysis and investigation of cybersecurity incidents.
Experience articulating technical findings and creating detailed incident reports.
Extensive experience in leveraging security tools such as SIEM, EDR, web proxy and email security tools.
Experience driving security projects from requirements gathering to completion.
Ability to mentor, motivate, and coach team members, leading to operational excellence.
Passion for security and solving tomorrow’s problems.
Certifications like CISSP, GCIH, GCFA or equivalent are a plus.
Cloud experience (AWS, Azure, GCP).
Demonstrated ability to transform and shape teams.
Scripting or programming experience (Python, PowerShell, Bash).
Benefits
Competitive compensation.
Limitless growth and learning opportunities.
Ongoing mentorship and apprenticeship; Leadership courses, development programs, technical courses, certification opportunities and more!
A collaborative and positive culture - join a diverse team of professionals that are as smart and driven as you.
A chance to make an impact – your work will contribute directly to our strategy.
Enjoy the flexibility of working from home and the energy of collaborating with peers in our dynamic offices.
20+ PTO days plus holidays and floating holidays in your first year.
Extensive medical, dental insurance and vision plan.
Information Security Analyst supporting information security function at Ten, a trusted service provider. Ensuring compliance with global standards and managing security risks within the organization.
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.
Senior Director of Global Security Operations at CyrusOne strategizing and managing security across global data centers. Driving execution, governance, and operational excellence in a high - availability environment.
Cybersecurity generalist at PwC providing security solutions and maintaining the protection of client systems. Involves monitoring security alerts, incident response, and collaboration with stakeholders.
Security Operations Manager overseeing safety measures for corporate office locations and events at Whatnot. Responsible for developing security frameworks and managing vendor relationships across global operations.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.