Job Description & How to Apply Below
Verisk is seeking a Manager, Cyber Security - Incident Response to lead the continued evolution of Verisk’s Cyber Incident Response program. This is a technical role involving all aspects of incident response. Successful candidates will be capable of performing in-depth root cause analysis on complex incidents including but not limited to malware, system intrusions, and user/system behavior events individually and as part of a team.
Reporting to the AVP, Cyber Threat Management within the Enterprise Risk & Compliance group, you will be responsible for leading the Threat and Incident Response team, with overall accountability for timely and appropriate response to security alerts, threats and incidents. This is a key role as it is one of the main lines of defense of the organization.
You will have the opportunity to lead a cross-functional team responsible for both the day to day security event and incident management, as well as handling major incident response through the entire incident lifecycle, including conducting postmortem meetings and following improvement actions to completion. You will lead technical staff through incident as well as brief senior leaders, all while maintaining confidentiality.
The responsibilities of this role are:
Support the Enterprise Incident Response Program by identifying and responding to potential information security incidents; manage all aspects of incident response from identification to resolution to postmortem follow-up.
Proactively hunt for potential threats and intrusions to Verisk systems.
Deploy and support information security systems and solutions such as SIEM, UBA, IRP platforms.
Define and maintain dashboards and metrics that support the threat management team’s initiatives.
Apply a formal structured methodology to guide an incident through its lifecycle with a consistent level of quality.
Develop and present accurate and timely information to stakeholders outlining proper technical solutions, recommendations, and accurate conclusions.
Demonstrated ability to communicate complex subjects regarding strategic and tactical processes of incident response to stakeholders of varying technical levels.·
Proven skills in various elements of incident response including but not limited to computer intrusion investigations and digital forensics in enterprise environments.
Proficiency with leading EDR platforms as well as familiarity with forensic analysis tools.
Advanced understanding of information security governance concepts including security incident response plans, incident management, and incident lifecycle.
Strong understanding of attacker methodologies including attack lifecycle, cyber kill chain, and the ATT@CK framework.
Capable of working independently as well as providing leadership during incident response scenarios.
Thorough understanding of network protocols, network devices, computer security, and secure architecture in support of intrusion investigations and computer forensics.
Working experience with virtualization and cloud environments.
Experience in Windows and Linux operating systems.
Excellent written and verbal communication skills.
Knowledge and experience with enterprise Windows and Linux environments including Active Directory and Exchange preferred.
Minimum of one industry-related certification (SANS, OffensiveSecurity, or PenTesterAcademy)
Preferred certifications are GCIH, GCFA, GCFE, GREM, CISSP.
Networking, Cloud, and other certifications a plus.
Experience with incident documentation and automation tools is a must, as well as experience with multiple aspects of incident response.
Search for further Jobs Here: