Looking for a leader who can build not just defenses, but help lead a security-first culture.
Guide and mentor a team, fostering an environment of collaboration and continuous improvement.
Take an expert role in the management of information security related events, including driving information security group metrics, response plans and communication.
Act as an escalation point of contact for the Detection and Response Team during a high severity cybersecurity incident.
Facilitate logistics, communications, and scheduling of event response meetings, and administrative follow-up tasks for all designated stakeholders and handlers.
Lead the development, strategy and implementation of a coordinated monitoring center bringing together the multiple monitoring functions.
Provide oversight for the Executive Protection Program, Dark Web Monitoring, and Internal Investigations.
Contribute to the development, collection, and publication of Information Security and Cyber Operations group metrics that illustrate group performance, Risk Trends and highlight obstacles thwarting team potential.
Drive continuous improvement across the group and its processes and maintain awareness of new technology, techniques, and industry best practices.
Requirements
10+ years of increasing responsibility and work complexity to include multifaceted management roles in complex organizations
Extensive technical experience in Cybersecurity and Information Technology, ideally in individual contributor and leadership roles.
Detailed understanding of the MITRE ATT&K Framework and other cyber security industry frameworks.
Experience working within the financial or other highly regulated industries desired.
Ability to communicate via written and verbal communication in both formal and casual situations.
Bachelor’s Degree in Computer Science or related field and/or equivalent work experience.
Benefits
Health and Wellness: We offer a range of medical, dental and vision insurance plans, as well as mental health support and wellness initiatives to promote overall well-being.
Retirement Savings: We offer retirement benefits options, which vary by location. In the U.S., our competitive 401(k) Plan offers a generous dollar-for-dollar Company matching contribution of up to 6% of eligible pay and a Company contribution equal to 3% of eligible pay (subject to annual IRS limits and Plan terms). These Company contributions vest immediately.
Employee Assistance Program: Confidential counseling services and resources are available to all employees.
Matching charitable donations: Corebridge matches donations to tax-exempt organizations 1:1, up to $5,000.
Volunteer Time Off: Employees may use up to 16 volunteer hours annually to support activities that enhance and serve communities where employees live and work.
Paid Time Off: Eligible employees start off with at least 24 Paid Time Off (PTO) days so they can take time off for themselves and their families when they need it.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.
Intern role in Product Security Operations for Salesforce, leading innovative AI - driven security tools and initiatives. Collaborate with experts to enhance security governance and risk management processes.
Security Operations Manager leading colleague safety and security programs at CVS Health. Responsible for managing security risks and operational performance in retail environments.