Security Operations - IR Lead

28 Minutes ago • 6-10 Years
Cyber Security

Job Description

The Security Operations - IR Lead will be responsible for detecting and responding to cyber security threats, partnering with global SOC teams, and acting as a liaison with stakeholders. Key duties include monitoring security systems, conducting in-depth incident investigations, developing response plans, and coordinating mitigation efforts. The role also involves documenting incidents, mentoring junior staff, staying current with threats, and driving tabletop exercises to enhance readiness. Proactive threat hunting, security system upgrades, and risk remediation are also crucial, along with generating security reports and ensuring compliance with standards.
Good To Have:
  • People Management experience.
Must Have:
  • Detect and respond to cyber security threats.
  • Partner with internal SOC team and keep CISO informed.
  • Monitor security systems and networks for breaches.
  • Conduct in-depth investigations into security incidents.
  • Develop and implement incident response plans.
  • Coordinate with cross-functional teams for incident mitigation.
  • Document incident response activities.
  • Stay current with emerging cybersecurity threats and vulnerabilities.
  • Define and Drive tabletop exercises.
  • Perform proactive threat hunts.
  • Upgrade security systems and remediate risks.
  • 6-10 years experience in security incident response, vulnerability management, or penetration testing.
  • Practical experience with threat detection, monitoring, and incident response implementation.
  • Ability to query and write detection rules.
  • Experience with SIEM (Qradar/Splunk), SOAR, WAF, AV, Firewalls.
  • Experience conducting technical analysis of security events including Malware analysis and digital forensics.
  • Excellent analytical and problem-solving skills.
  • Effective communication skills.
  • Bachelor’s degree in information security or related fields.
  • Experience in public cloud infrastructure (Azure, GCP, AWS).
  • Familiarity with security frameworks (NIST, ISO 27001/2).
  • Proven experience with vulnerability management products (Tenable, Qualys, Nexpose).
  • Demonstrated understanding of information security concepts (firewalls, intrusion prevention, TCP/IP, log management).

Add these skills to join the top 1% applicants for this job

cross-functional
communication
ethical-hacking
game-texts
automated-testing
incident-response
aws
azure
threat-intelligence
microsoft-azure
splunk

Responsibilities

  • Detect and respond to cyber security threats to ensure your organization operates securely.
  • Partner with the existing internal SOC team across the world and keep the CISO informed about security Incidents.
  • Act as a liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients, or regulatory bodies.
  • Monitor security systems and networks for potential security breaches or incidents.
  • Conduct in-depth investigations into security incidents to determine the root cause and extent of the compromise.
  • Develop and implement incident response plans and procedures to contain, eradicate, and recover from security incidents.
  • Coordinate with cross-functional teams, including IT, legal, and senior management, to respond to and mitigate security incidents.
  • Document incident response activities, including findings, actions taken, and lessons learned, for future reference and improvement.
  • Provide guidance and mentor junior members of the latest security trends techniques.
  • Stay current with emerging cybersecurity threats, vulnerabilities, and trends to proactively enhance incident response capabilities.
  • Define and Drive tabletop exercises and simulated incident scenarios to test and improve incident response readiness.
  • Carry Table-top exercise for Customer on various Incident Response Scenarios
  • Collaborate with external partners, such as law enforcement and industry peers, to share threat intelligence and best practices.
  • Develop incident management plans and procedures, surveying the networks for signs of a breach, and coordinating and executing tabletop exercises to practice, develop plans, policies, and procedures.
  • Perform proactive threat hunts to identify threats and assess the state of security controls; work with in-house red teams to detect offensive operations, and capture and action findings.
  • Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
  • Proactive identification of threats and risk remediation.
  • Generate metrics for the Management as needed. Prepare system security reports by collecting, analyzing, and summarizing data and trends.
  • Define and participate in implementation of On-prem and Cloud architecture and security controls.
  • Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.

Qualifications

  • 6 – 10 years of proven experience in Security incident response handling, Vulnerability Management or Penetration testing; a master’s degree can be substituted for experience.
  • Practical experience with threat detection, monitoring and incident response and implementation, ability to query and write detection rules, and management of security related technologies, (i.e., SIEM (Qradar / Splunk), SOAR, WAF, AV, Firewalls, Internet-facing services).
  • Proven experience in cybersecurity incident response, including hands-on experience with incident detection, analysis, and response.
  • Experience conducting technical analysis of security events including Malware analysis, incident triage, escalation, communication, and digital forensics.
  • Excellent analytical and problem-solving skills, with the ability to think critically and make decisions under pressure.
  • Effective communication skills, both verbal and written, can convey technical information to non-technical stakeholders.
  • Familiarity with scripting for automation.
  • Strong expertise in gathering and condensing threat intelligence into actionable and meaningful communication materials.
  • Bachelor’s degree in information security or information technology or computer science or related fields.
  • Experience in public cloud infrastructure such as Microsoft Azure, GCP, AWS.
  • Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2.
  • Proven experience with products dealing with vulnerability management services which include Tenable, Qualys, Nexpose, etc.
  • Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting.
  • Certifications such as CISM, CEH, GCIA, GCIH, CISSP or equivalent.
  • People Management experience is a plus.
  • Results focused and attention to detail

Set alerts for more jobs like Security Operations - IR Lead
Set alerts for new jobs by Blue Yonder
Set alerts for new Cyber Security jobs in India
Set alerts for new jobs in India
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙