Logo
3Core Systems Inc

Information Security Incident Commander

3Core Systems Inc, Deerfield Beach, Florida, United States, 33441


Deerfield Beach, United States | Posted on 11/01/2024Title:

Information Security Incident CommanderLocation:

Deerfield Beach, FL (Hybrid role with 3 days in the Deerfield Beach office and 2 days remote)Duration:

6 Months C2H Contract with the potential to go permManager Notes:Commander/Investigator/Critical IssuesUse Service Now but that’s a basic toolDetection/Analysis and Scope of the IncidentKey Skills:Responsibilities include but are not limited to:Responsible for managing the response for all cybersecurity incidents tracked and investigated by the Security Operations team.Assume operational control of Incident Response resources in the event of a cybersecurity incident.Ensure alignment and sound execution of the incident resolution process, with transparent communication to stakeholders and senior leadership.Able to oversee multiple investigations/incidents concurrently providing proper direction to each work stream.Timely reporting/updates on all cybersecurity incidents to management.Create knowledge, artifacts, and tools to be used during actual cybersecurity incidents.Regularly interact with senior leadership and business organizations.Collaborate with counterparts in other regions around the world to ensure that all cybersecurity incidents are worked appropriately.Participate in post-incident process reviews to ensure continuous improvement of operations and execution, and contribute to the improvement of the incident response process based on lessons learned.Desired Skills:Knowledgeable in business industry standard security incident response process, procedures, and life-cycle.Flexible working hours to support operations.Excellent oral and written communication ability.Ability to present complex technical issues and findings to diverse audiences in both technical and non-technical parlance, both orally and in writing.Demonstrate leadership and directive control of stressful situations.Ability to utilize interpersonal skills to communicate with customers and stakeholders and bring quick resolution.Demonstrated ability to analyze ongoing situations for the potential of a security incident.Ability to maintain incident records in support of recovery, regulatory, and legal requirements.Familiar with ITIL service management methodology.Prior experience in a 24x7x365 operations environment.Experience with electronic investigations, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification, and analysis.Understanding of and strict adherence to digital chain of custody forms and processes.Experience in vendor management specific to incident response and security tools.Experience and/or SME knowledge of the ISO 27001, NIST 800-53, NIST CSF, and PCI DSS.Qualifications/Requirements:10+ years of experience working in a large technology enterprise environment.7+ years of experience working with cybersecurity incident response teams.5+ years of experience as a cybersecurity Incident Response or SOC analyst.Hold technical cybersecurity certifications from organizations such as SANS or ISC2.

#J-18808-Ljbffr