Responsibilities
Incident Response Leadership
- Oversee the entire incident response lifecycle from detection to resolution.
- ead investigations of IT security incidents and ensure thorough root cause analysis and remediation.
- Develop and maintain incident response playbooks and procedures.
- Coordinate with internal, external stakeholders, and vendors during incidents.
- Conduct post-incident reviews and report findings to management.
Monitoring and Detection
- Develop and implement advanced threat detection and monitoring strategies.
- Utilize SIEM, EDR, and other security tools for timely incident detection.
- Perform threat hunting and proactive security assessments.
- Collaborate with IT teams to deploy and optimize security solutions.
Threat Statistics and Reporting
- Analyze and compile statistics on threats relevant to the Institute.
- Prepare and present detailed reports on threat statistics to stakeholders.
- Use data visualization tools to communicate threat trends and insights.
Requirements
Educational Background
- A University Degree in Information Systems, Computer Science, Cybersecurity, or a related field.
- Professional Certification(s) in incident handling and security analysis preferred.
- GCIH or its equivalent is preferred.
Professional Experience
- Minimum of 8 years of progressive experience in IT security, with a focus on Incident response.
- Minimum of 4 years of experience in a security operations center, with proven leadership capabilities.
- Intermediate knowledge of security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration.
- Proven experience in managing incident response and performing threat hunting.
Technical Expertise
- Proficiency in Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), traffic and packet analysis, and cloud security.
- Experience in firewall, Intrusion Prevention Systems (IPS), Web Application Firewalls (WAF) administration, virtualization, and cloud technologies.
- Experience in monitoring and administering host-based intrusion detection systems.
- Knowledge and experience in Linux/Windows/Database technologies preferred.
- Strong knowledge of industry standards and information security policy frameworks.
- Hands-on experience with scripting and automation tools to enhance security operations.
- Ability to conduct gap analysis of current processes and identify opportunities for improvement.
- Evaluate internal and external environments for threats related to Information Security and act as a subject matter expert to ensure these are properly addressed and controlled.
- Continuously improve event correlation and alerting processes and use cases to detect potential incidents.
- Automate manual processes to enhance security incident response.
- Experience with network security assessment tools.
Leadership and Communication
- Excellent leadership and team management skills, with the ability to inspire and motivate a team.
- Strong communication skills, with the ability to effectively interact with stakeholders at all levels, including University administration.
- Demonstrated ability to drive strategic initiatives and lead a team through change.
- Exceptional problem-solving skills and the ability to think critically under pressure.
- Ability to interview stakeholders to define and document business requirements.
- Provide advice and guidance on response action plans for information risk events and incidents based on incident type and severity.