Director of Security Operations overseeing incident response tasks at Gartner. Leading a geographically dispersed team and improving capabilities for detecting and responding to threats.
Responsibilities
Drive operational excellence of a geographically dispersed Security Operations team.
Serve as the Incident Commander during the incident response process.
Continuously seek out opportunities to improve the team’s ability to rapidly and effectively respond to security incidents.
Work with key business stakeholders to detect, respond to, and remediate security issues.
Provide mentorship and guidance to team members, promoting a culture of open communication, continuous improvement, and operational excellence.
Drive automation initiatives, enhancing analyst capabilities and workflows while eliminating monotonous tasks.
Develop innovative and cutting-edge detection content aligned with ATT&CK, Cyber Kill Chain, and various other cyber security frameworks.
Bring your own ideas and solutions to a fast-paced, growing, and evolving team centered around operational excellence.
Ensure smooth handover of alerts and incidents between team members located in various geographic locations.
Requirements
Bachelor’s in Computer Science, Information Security, Engineering, or 6+ years of experience in Information security.
Previous experience leading a SOC, Hunt, and/or Incident Response Team or progressive growth in responsibilities in a SOC environment.
Demonstrated ability to prioritize and analyze security events, enabling swift decision-making on appropriate courses of action and initiating timely and proportional responses.
Expertise in conducting and driving analysis and investigation of cybersecurity incidents.
Experience articulating technical findings and creating detailed incident reports.
Extensive experience in leveraging security tools such as SIEM, EDR, web proxy and email security tools.
Experience driving security projects from requirements gathering to completion.
Ability to mentor, motivate, and coach team members, leading to operational excellence.
Passion for security and solving tomorrow’s problems.
Certifications like CISSP, GCIH, GCFA or equivalent are a plus.
Cloud experience (AWS, Azure, GCP).
Demonstrated ability to transform and shape teams.
Scripting or programming experience (Python, PowerShell, Bash).
Benefits
Competitive compensation.
Limitless growth and learning opportunities.
Ongoing mentorship and apprenticeship; Leadership courses, development programs, technical courses, certification opportunities and more!
A collaborative and positive culture - join a diverse team of professionals that are as smart and driven as you.
A chance to make an impact – your work will contribute directly to our strategy.
Enjoy the flexibility of working from home and the energy of collaborating with peers in our dynamic offices.
20+ PTO days plus holidays and floating holidays in your first year.
Extensive medical, dental insurance and vision plan.
Security Operations & Office Coordinator at WOOD handling daily security processes and front - office operations. Ensuring compliance with government requirements and maintaining an organized office environment.
SecOps Engineer focusing on automation, cloud security, and operational excellence at Viber. Collaborating with a skilled team on real - world security challenges.
Senior SOC Analyst at RSM leading high - severity investigations and guiding SOC's technical direction. Engaging with diverse client organizations in a managed security services environment.
Cybersecurity SOC Analyst Intern providing hands - on experience in monitoring security events. Collaborating with experienced analysts to protect organizational systems and data in a hybrid setup.
Security Operations Junior Analyst responsible for security monitoring and incident handling in a technology hub. Working with tools to ensure safety of enterprise information systems 24/7 in Cluj - Napoca.
SOC Analyst managing and responding to security incidents within a digital security team. Involves analyzing security data, collaborating with teams, and implementing security measures.
Information Security Analyst supporting information security function at Ten, a trusted service provider. Ensuring compliance with global standards and managing security risks within the organization.
Security Operations Center Analyst managing incidents and security alerts for 7 - Eleven stores. Focusing on in - depth analysis and proactive monitoring within a state - of - the - art Security Operations Center.
Security Operations Manager at Qnity managing physical security programs across global sites. Overseeing operations and collaborating with cross - functional teams to mitigate risk and maintain secure facilities.
SOC Analyst monitoring security events and responding to incidents at Junglee Games. Collaborating on security protocols to ensure protection of digital assets.