Cybersecurity Incident Response Supervisor



< Back to Search Results

Cybersecurity Incident Response Supervisor

ApplyRefer A FriendJoin Our Talent Network

  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
  • Share by Mail

FCA is seeking an experienced Cybersecurity Incident Response Supervisor providing team management, incident coordination, investigation and forensic analysis of any potentially compromised assets as well as malware reverse engineering, identification and remediation efforts.

Essential Functions:

  • Lead a team of Cybersecurity Incident Response Analysts, setting direction, developing and growing staff, and execution of performance and management processes
  • Coordinate communication 
  • Investigate information security incidents to resolution
  • Coordinate with technical teams and third-party vendors to triage and contain threats and quickly mitigate damages
  • Perform after-incident reporting and root cause analyses
  • Manage relevant threat intelligence and apply to incident response and escalation
  • Maintain and update playbooks based on new procedures and best practice methodologies

Basic Qualifications:

  • Bachelor’s degree in Computer Science, Cybersecurity or relevant discipline 
  • Security certification(s) (CISSP, CISA, CISM, CEH, and/or GSEC) 
  • Minimum 8 years of Information Technology experience
  • 3+ years of supervisory experience leading teams and direct reports
  • 3+ years of experience in cybersecurity incident response or security operations
  • Ability to organize activities and lead others in accomplishing goals and objectives in a fast moving environment
  • Familiarity with Cyber Kill Chain methodology and techniques to disrupt it
  • Experience with or managing an enterprise level SIEM platform
  • Demonstrated understanding of network threats, attack vectors, and methods of exploitation, intrusion tactics, techniques, and procedures
  • Deep understanding of TCP/UDP, networking ports and protocols
  • Ability to analyze large data sets and unstructured data (logs, NetFlow, packet capture) for the purpose of identifying trends and anomalies indicative of malicious activity
  • Understanding of OSI model and ability to apply to troubleshooting issues
  • Ability to correlate firewall, DNS, anti-malware, NTP, HIPS, IDS/IPS events
  • Experience with malware analysis concepts and methods
  • Demonstrated understanding and experience with current incident response best practices and standards
  • Ability to research, tools, techniques, and process improvements for current and emerging threat and attack vectors
  • Excellent written and verbal communication skills
  • Ability to effectively present complex technical information to varied audiences

Preferred Qualifications:

  • Experience working with commercial and/or open-source threat intelligence feeds
  • Ability to write scripts/code using Python, Bash, Powershell, Java
  • Capability to provide memory forensics
  • APT threat hunting

FCA is proud to extend to its employees a compensation and benefits package that is designed to retain their talent and to motivate and reward job performance. Our present compensation program provides for competitive, market based salaries, and annual vacation and holiday time off. We make available a comprehensive health care benefits plan which, depending upon the employee’s role, includes medical, dental, vision and prescription drug coverage. We also offer a disability absence plan, group and optional life insurance program, savings plan, tuition assistance, and vehicle purchase and lease discounts for certain employees, and for their family and friends.

Note: Some of the benefits listed above may not apply to summer vacation replacement and temporary employees.



Read Full DescriptionHide Full Description
Confirmed 6 hours ago. Posted 30+ days ago.

Discover Similar Jobs

Suggested Articles

One Step Register
Need an account? Sign Up