This job has expired and you can't apply for it anymore. Start a new search.
FCA logo
Company Name:
Approximate Salary:
Not Specified
Auburn Hills, MI
United States
Position type:
Experience level:
Education level:

Cybersecurity Incident Response Supervisor

FCA is seeking an experiencedCybersecurity Incident Response Supervisor providing team management, incident coordination, investigation and forensic analysis of any potentially compromised assets as well as malware reverse engineering, identification and remediation efforts.

Essential Functions:

  • Lead a team of Cybersecurity Incident Response Analysts, setting direction, developing and growing staff, and execution of performance and management processes
  • Coordinate communication
  • Investigate information security incidents to resolution
  • Coordinate with technical teams and third-party vendors to triage and contain threats and quickly mitigate damages
  • Perform after-incident reporting and root cause analyses
  • Manage relevant threat intelligence and apply to incident response and escalation
  • Maintain and update playbooks based on new procedures and best practice methodologies

Basic Qualifications:

  • Bachelor's degree in Computer Science, Cybersecurity or relevant discipline
  • Security certification(s) (CISSP, CISA, CISM, CEH, and/or GSEC)
  • Minimum 8 years of Information Technology experience
  • 3+ years of supervisory experience leading teams and direct reports
  • 3+ years of experience in cybersecurity incident response or security operations
  • Ability to organize activities and lead others in accomplishing goals and objectives in a fast moving environment
  • Familiarity with Cyber Kill Chain methodology and techniques to disrupt it
  • Experience with or managing an enterprise level SIEM platform
  • Demonstrated understanding of network threats, attack vectors, and methods of exploitation, intrusion tactics, techniques, and procedures
  • Deep understanding of TCP/UDP, networking ports and protocols
  • Ability to analyze large data sets and unstructured data (logs, NetFlow, packet capture) for the purpose of identifying trends and anomalies indicative of malicious activity
  • Understanding of OSI model and ability to apply to troubleshooting issues
  • Ability to correlate firewall, DNS, anti-malware, NTP, HIPS, IDS/IPS events
  • Experience with malware analysis concepts and methods
  • Demonstrated understanding and experience with current incident response best practices and standards
  • Ability to research, tools, techniques, and process improvements for current and emerging threat and attack vectors
  • Excellent written and verbal communication skills
  • Ability to effectively present complex technical information to varied audiences

Preferred Qualifications:

  • Experience working with commercial and/or open-source threat intelligence feeds
  • Ability to write scripts/code using Python, Bash, Powershell, Java
  • Capability to provide memory forensics
  • APT threat hunting

More Jobs Like This