Synchrony
VP, Senior Incident Response Lead
Synchrony, Stamford, Connecticut, United States, 06925
Synchrony
Find great deals, promotional offers, credit cards, savings products, payment solutions, and more. See how Synchrony can help you today!
The VP, Senior Incident Response Lead is part of the Synchrony Joint Security Operations Center (JSOC) leadership team. This position is responsible for identifying and leading the implementation of key initiatives that aim to enhance and mature the Synchrony detection and incident response capabilities. Through collaboration with JSOC leaders, Cyber Intelligence, and other cross-functional teams, this individual will ensure Incident Response strategy and capabilities remain consistent with industry best practices, and act as a technical subject matter expert during complex intrusions. The ideal candidate will be an inquisitive and curious critical thinker demonstrating significant domain expertise across three or more security domains including threat intelligence, threat hunting, incident response, digital forensics, cloud security, security engineering, security operations, endpoint security, or offensive security.
Responsibilities:
Spearhead key technical and strategic Incident Response initiatives with specific focus on Cloud Incident Response capabilities.
Benchmark and implement industry best practices for incident response and cybersecurity operations, such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
Provide technical leadership and expertise to enable proactive detection of potential security threats and recommendations for improvements in overall security posture.
Proactively identify, research, and dissect emerging attack techniques to develop custom detection, containment, and remediation plans to support the JSOC.
Act as the technical SME for complex and priority targeted detection and response projects aimed at rapidly improving controls related to priority threats.
Coordinate with multidisciplinary teams across intel, detection, engineering, and technology to iteratively improve security controls and detection capabilities.
Provide counsel to management regarding vendors and technologies, and interact with suppliers to ensure appropriateness of security tools and their configuration.
Mentor, and upskill less-experienced team members across cyber operations through coaching collaboration and leadership.
Interface with industry peers to acquire and share Incident Response best-practices in the sector.
Perform other duties and/or special projects as assigned.
Qualifications/Requirements:
Bachelor's degree and seven years of cyber security experience with at least five years focused on Threat Hunting, Incident Response, or Detection Engineering. In lieu of a Bachelor's degree, ten years of relevant experience.
Expert level abilities to collect and analyze forensic artifacts across multiple major operating systems (Windows, Linux, Mac).
In-depth attack surface knowledge of one or more major cloud providers (AWS, Azure, GCP).
Proficiency in using Python or other similar scripting language to interact with APIs or manipulate large datasets for analysis.
One or more relevant security certifications (GCIH, GCIA, GCFE, GCFA, SANS, AWS Certified Cloud Practitioner, AWS Certified Security Specialty, or comparable).
Desired Characteristics:
Experience and familiarity with analytic standards and tradecraft.
Experience in the financial services sector.
Strong oral and written communications skills.
Strong analytical & critical thinking capabilities.
Expertise to clearly define complex issues despite incomplete or ambiguous information.
Grade/Level:
13
The salary range for this position is 150,000.00 - 250,000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level, or knowledge. Salaries are adjusted according to market in CA, NY Metro, and Seattle.
Eligibility Requirements:
You must be 18 years or older.
You must have a high school diploma or equivalent.
You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process.
You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act.
Our Commitment:
When you join us, you’ll be part of a diverse, inclusive culture where your skills, experience, and voice are not only heard—but valued. We celebrate the differences in all of us and believe that our individual, unique perspectives is what makes Synchrony truly a great place to work.
Reasonable Accommodation Notice:
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job.
#J-18808-Ljbffr
The VP, Senior Incident Response Lead is part of the Synchrony Joint Security Operations Center (JSOC) leadership team. This position is responsible for identifying and leading the implementation of key initiatives that aim to enhance and mature the Synchrony detection and incident response capabilities. Through collaboration with JSOC leaders, Cyber Intelligence, and other cross-functional teams, this individual will ensure Incident Response strategy and capabilities remain consistent with industry best practices, and act as a technical subject matter expert during complex intrusions. The ideal candidate will be an inquisitive and curious critical thinker demonstrating significant domain expertise across three or more security domains including threat intelligence, threat hunting, incident response, digital forensics, cloud security, security engineering, security operations, endpoint security, or offensive security.
Responsibilities:
Spearhead key technical and strategic Incident Response initiatives with specific focus on Cloud Incident Response capabilities.
Benchmark and implement industry best practices for incident response and cybersecurity operations, such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
Provide technical leadership and expertise to enable proactive detection of potential security threats and recommendations for improvements in overall security posture.
Proactively identify, research, and dissect emerging attack techniques to develop custom detection, containment, and remediation plans to support the JSOC.
Act as the technical SME for complex and priority targeted detection and response projects aimed at rapidly improving controls related to priority threats.
Coordinate with multidisciplinary teams across intel, detection, engineering, and technology to iteratively improve security controls and detection capabilities.
Provide counsel to management regarding vendors and technologies, and interact with suppliers to ensure appropriateness of security tools and their configuration.
Mentor, and upskill less-experienced team members across cyber operations through coaching collaboration and leadership.
Interface with industry peers to acquire and share Incident Response best-practices in the sector.
Perform other duties and/or special projects as assigned.
Qualifications/Requirements:
Bachelor's degree and seven years of cyber security experience with at least five years focused on Threat Hunting, Incident Response, or Detection Engineering. In lieu of a Bachelor's degree, ten years of relevant experience.
Expert level abilities to collect and analyze forensic artifacts across multiple major operating systems (Windows, Linux, Mac).
In-depth attack surface knowledge of one or more major cloud providers (AWS, Azure, GCP).
Proficiency in using Python or other similar scripting language to interact with APIs or manipulate large datasets for analysis.
One or more relevant security certifications (GCIH, GCIA, GCFE, GCFA, SANS, AWS Certified Cloud Practitioner, AWS Certified Security Specialty, or comparable).
Desired Characteristics:
Experience and familiarity with analytic standards and tradecraft.
Experience in the financial services sector.
Strong oral and written communications skills.
Strong analytical & critical thinking capabilities.
Expertise to clearly define complex issues despite incomplete or ambiguous information.
Grade/Level:
13
The salary range for this position is 150,000.00 - 250,000.00 USD Annual and is eligible for an annual bonus based on individual and company performance. Actual compensation offered within the posted salary range will be based upon work experience, skill level, or knowledge. Salaries are adjusted according to market in CA, NY Metro, and Seattle.
Eligibility Requirements:
You must be 18 years or older.
You must have a high school diploma or equivalent.
You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process.
You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act.
Our Commitment:
When you join us, you’ll be part of a diverse, inclusive culture where your skills, experience, and voice are not only heard—but valued. We celebrate the differences in all of us and believe that our individual, unique perspectives is what makes Synchrony truly a great place to work.
Reasonable Accommodation Notice:
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job.
#J-18808-Ljbffr