IT Incident Response Lead
Job ID# 10082 – Posted 7/05/22 – Downey CA
Position Description
An Information Incident Response Lead interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements. The Information Incident Response Lead redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability. The Information Incident Response Lead will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents.
Skills Required
The Information Incident Response Lead will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.
Skills Preferred
– Experience with documenting incident response process and procedures.
– Experience with first responder forensics analysis and investigation.
– Experience with triage and resolving advanced vector attacks such as botnets and advanced persistent threats (APTs).
– Experience as the leas during business impacting situations, and work to restore normal service operations in cooperation with cross-functional partners.
– Advanced skills in timely communications and updates are provided for incident management and root-cause scenarios.
– Ability to work directly with data asset owners and business response plan owners during high severity events of interest.; Leads the effort on messaging and communication related to incident reporting for all audiences.
– Experience driving containment strategy during data loss or breach events.
– Experience with the documentation and maintaining chain of custody of incident evidence.
– Experience driving post-containment recovery effort through to complete incident closure
– Should work with teams to provide recommendations to resolve and/or reduce the impact of incidents and to prevent future similar incidents.
– Develop and enrich restoration procedures to mitigate future outages and business disruptions.
– Experience providing written final incident report to executive management that provide; Assessing scope of incident damage and assisting in the determination of incident severity.; Document activities such as investigation, discovery, and recovery during the incident.
– Experience with collaborating with departmental IT teams to identify the root cause of recurring incidents and create action plans to remediate and prevent recurring situations.
– Maintain on-call availability for 24x7x365 coverage.
Experience Required
This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation. At least three (3) years of that experience must be in information security analysis.
Experience Preferred
– One or more of the following professional certifications are desired: Qualified Security Assessor (QSA), Certified Information Systems Auditor (CISA), Certified Information Systems Security Professionals (CISSP), Certified Information Security Manager (CISM), Certified Information Privacy Professional (CIPP), GIAC Certified Incident Handler, (GCIH) or GIAC Network Forensic Analyst.
– Desired three (3) years of experience in the last five (5) years as an IT Security Incident Response Manager, supporting a complex enterprise security environment for large public or private organizations.
– Desired three (3) years of experience in the past five (5) years as an IT Security Incident Response Manager, supporting Enterprise Multi-Tenant environment, including responding, containing, remediating, and reporting on the infrastructure connecting to the large private or public organization and Public Cloud Providers, such as AWS, Azure and/or GCP.
– Minimum of two (2) years experience in the last three (3) years analyzing, responding, and remediating enterprise network & security architectures.
– Minimum of two (2) years experience in the last three (3) years leading IT Security/Information Security teams.
– Minimum of two (2) years experience in the last three (3) years delivering Incident Reports and Remediation Recommendations in a large enterprise organization.
– Demonstrated ability to create clear, concise technical documentation such as procedures, Visio diagrams, and system support documents, and strong presentation skills with experience using Microsoft PowerPoint.
Education Required
This classification requires the possession of a bachelor’s degree in an IT-related or Engineering field. Additional qualifying experience may be substituted for the required education on a year-for-year basis.
Apply Now
Please send your resume and any additional information to our recruitment team at recruitment@teknita.com