About the role

  • Incident Manager overseeing cyber incident response engagements for large enterprises at Long View. Utilizing strong leadership and technical skills to ensure effective incident resolution.

Responsibilities

  • Lead and oversee complex, high‑profile cyber incident response and investigation engagements, guiding clients through preparation, response, and recovery
  • Direct and participate in hands‑on investigative work during critical or high‑impact incidents, including ransomware investigations
  • Manage multiple concurrent incident response projects across a diverse client base, spanning various industries, technologies, and geographies
  • Act as the primary point of contact for clients, building trusted‑advisor relationships and ensuring high‑quality, consistent service delivery
  • Oversee technical investigations to ensure thorough analysis of large‑scale cyber incidents and data breaches
  • Design and facilitate both technical and executive workshops covering incident response, network security, vulnerability management, and related topics
  • Provide strategic guidance on incident containment, remediation, and recovery using best‑practice frameworks such as NIST and SANS
  • Lead and support the execution of tabletop simulation exercises for technical teams and executive stakeholders
  • Oversee the creation of high‑quality deliverables, including detailed investigation reports, executive briefings, and remediation recommendations
  • Ability to work evenings and weekends

Requirements

  • 5+ years of experience in digital forensics and incident response, or a closely related field
  • 2+ years in a leadership or managerial role
  • Experience managing incident response engagements:
  • Ransomware, data breaches, business email compromise, network intrusions, cloud incidents
  • Ability to investigate and respond to ransomware attacks, including familiarity with ransomware TTPs, negotiation processes, and decryption/recovery strategies
  • Experience with industry-standard digital forensic tools:
  • Magnet Axiom, Encase, XWays, FTK, Velociraptor, etc
  • Experience with EDR tools:
  • CrowdStrike Falcon, Carbon Black EDR, Microsoft Defender for Endpoint, etc
  • Familiarity with security monitoring solutions:
  • Splunk, Microsoft Sentinel, Elastic/ELK, etc
  • Understanding of SOC operations, operating systems, file systems, cloud platforms (Azure, AWS, GCP), and enterprise IT infrastructure
  • Experience leading and mentoring teams in high-pressure, dynamic environments
  • Strong ability to communicate complex technical concepts to both technical and non-technical stakeholders, including executive leadership
  • Demonstrated client management and relationship-building skills
  • Excellent time management and organizational abilities**

Benefits

  • Great people and culture
  • RSP Plan
  • Career growth – Permanent staff positions, paid training, career life planning, and relocation and travel opportunities
  • Interesting work – Be part of exciting projects while accessing all the latest technologies

Job title

Incident Manager

Job type

Experience level

Mid levelSenior

Salary

CA$100,000 - CA$120,000 per year

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job