Overview

Lead, Cyber Security Incident Response (CSIRT) Jobs in North Carolina, United States at Optomi

Title: Lead, Cyber Security Incident Response (CSIRT)

Company: Optomi

Location: North Carolina, United States

Lead, Cyber Security Incident Response (CSIRT) – 100% remote (EST)

Optomi, in partnership with an enterprise level client in the FinTech space is looking to add a Lead CSIRT Analyst to their growing team! The Lead CSIRT Analyst/Specialist is a member of the Information Protection and Risk Management team and works closely with other members to develop and implement a comprehensive approach to the management of security risks. The candidate will work with subject matter experts to manage the response to cyber security threats and incidents. This role is also responsible for working with other team members in responding to security incidents according to established policies and best practices. It will also require strong organizational, workflow / process flow, Use Case development, and documentation capabilities.

The right candidate for this role has had solid cloud analytics exposure to AWS OR Azure cloud. This environment moving to full cloud in the next year.

This is a full-time/direct-hire opportunity. Preference is for this person to sit close to Charlotte, NC but open to remote candidates.

What You Will Do:

Lead security investigations

Drive efforts towards containment of threats and remediation of environment during or after an incident.

Maintain and improve IR plans.

Contribute to the development of use case and prioritization of use case development

Contribute to the process improvement process through development of new detections and changes in the response processes.

Perform complex security investigations and root cause analyses.

Assemble and coordinate with technical teams and third-party vendors to resolve incidents as quickly and efficiently as possible.

Ensure that all incidents are recorded and tracked to meet audit and legal requirements where necessary.

Function as stakeholder to strengthen the overall Response framework inclusive of SOC and CSIRT.

Serve as escalation point for the PCI environment including guidance for monitoring and response.

What’s Required:

5+ years of cyber security experience

Deep understanding of network protocols and troubleshooting

Deep understanding of server and workstation operating systems

Experience securing multi-cloud environments, FaaS and CI/CD pipelines

Bachelor’s degree in information systems or equivalent experience

Ability to analyze large data sets and unstructured data for the purpose of identifying trends and anomalies indicative of malicious activity, as well as demonstrated capability to learn and develop new techniques.

Strong knowledge of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to research current information security landscape

Ability to research, develop, and keep abreast of tools, techniques, and process improvements in support of security detection and analysis in accordance with current and emerging threat and attack vectors

Ability to incorporate threat intel data into existing security solutions to monitor or prevent current threat actors.

Experience with cyber hunting practices/exercises using SIEM, Enterprise search tools, or other solutions.

Excellent communications skills (verbal and written) are required

Excellent problem-solving skills and troubleshooting skills with a strong attention to detail

Ability to interact with personnel at all levels across the organization and to comprehend business imperatives.

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.

About Optomi