Cyber Security Incident Response Team Manager

Overview

On Site
USD 179,273.00 - 286,837.00 per year
Full Time

Skills

Operational Excellence
Security Operations
Mentorship
Virtual Team
Artificial Intelligence
Machine Learning (ML)
Analytics
Incident Management
Workflow
Scripting
MEAN Stack
Legal
Business Continuity Planning
Privacy
KPI
Management
Penetration Testing
Threat Analysis
System On A Chip
Leadership
Cyber Security
Computer Science
GCIH
GCFA
CISSP
OSCP
Python
Windows PowerShell
Bash
SIEM
Splunk
IBM QRadar
SQL
Query Optimization
Snow Flake Schema
Databricks
Data Lake
Normalization
Cloud Computing
Information Retrieval
Investor Relations
International Relations
Amazon Web Services
Microsoft Azure
Forensics
Malware Analysis
Reverse Engineering
Communication
Decision-making
People Management
Dashboard
Reporting
SAP BASIS
Military
Law

Job Details

"I can succeed as a Cyber Security Incident Response Team Manager at Capital Group."

We are seeking a highly technical and hands-on Incident Response Manager to lead our 24/7 global team of analysts responsible for monitoring, detecting, and responding to cybersecurity incidents. This role combines leadership, technical expertise, and operational excellence in a fast-paced environment. You will manage incident response activities, enforce playbooks and policies, and serve as a point of escalation during critical events.

The ideal candidate is a strong leader with advanced technical skills, coding ability, and experience in security operations and incident response. You will work closely with cybersecurity leadership, IT, and business stakeholders to ensure incidents are prioritized, investigated, and remediated effectively.

"I am the person Capital Group is looking for."
  • Lead and mentor a globally distributed team of security analysts and engineers responsible for initial detection, triage, containment, and advanced investigation of security incidents.
  • Serve as incident commander and escalation point for high-severity incidents, including ransomware, account compromise, phishing, and data leakage.
  • Architect and automate Integrate AI/ML-driven threat detection and behavioral analytics into IR processes. Design incident response workflows using SOAR platforms and custom scripting (Python, PowerShell, Bash, etc.) to improve mean time to respond (MTTR).
  • Implement and enforce IR playbooks, policies, and best practices aligned with NIST and MITRE ATT&CK frameworks.
  • Coordinate cross-functional response with IT, developers, legal, privacy, and business continuity teams.
  • Analyze and prioritize complex incidents, ensuring adherence to SLAs and regulatory/privacy requirements.
  • Continuously improve detection, response, and reporting processes through metrics, trends, KPIs, KRI's and post-incident reviews
  • Conduct tabletop exercises and oversee vulnerability and penetration testing assessments to identify gaps.
  • Stay current with emerging threats, attacker TTPs, and integrate threat intelligence into response strategies.
  • Foster a culture of learning and technical excellence, supporting team certifications and hands-on development.

Qualifications:
  • 7+ years in cybersecurity (SOC and IR), including 3+ years in a leadership role.
  • Bachelor's degree in Cybersecurity, Computer Science, or related field preferred.
  • Certifications such as GCIH, GCFA, GCFE, CISSP, OSCP, or equivalent highly desirable.
  • Proven ability to lead distributed teams under pressure and in high-stakes environments.
  • Hands-on coding in Python (preferred), PowerShell, Bash, or similar languages.
  • Proven expertise with traditional and Next-Generation SIEM platforms such as Splunk, Sentinel, QRadar, Exabeam, and CrowdStrike Falcon.
  • Strong proficiency in SQL and query optimization across modern data lake platforms (e.g., Snowflake, Databricks, Azure Data Lake).
  • Familiarity with Cribl LogStream, data normalization, and enrichment strategies for high-fidelity alerting.
  • Advanced knowledge of attacker methods (escalation, lateral movement, TTPs).
  • Familiarity with cloud IR (AWS, Azure) and hybrid environments.
  • Strong understanding of forensic analysis, malware reverse engineering, and threat hunting.
  • Exceptional organizational, communication, and decision-making abilities.
  • Proven ability to foster team well-being, prevent burnout, and support professional growth.
  • Ability to remain calm under pressure and manage team well-being.
  • Experience in building dashboards, metrics, and reporting frameworks.

Southern California Base Salary Range: $179,273-$286,837

San Antonio Base Salary Range: $147,378-$235,805

New York Base Salary Range: $190,040-$304,064

In addition to a highly competitive base salary, per plan guidelines, restrictions and vesting requirements, you also will be eligible for an individual annual performance bonus, plus Capital's annual profitability bonus plus a retirement plan where Capital contributes 15% of your eligible earnings.

You can learn more about our compensation and benefits here.

* Temporary positions in Canada and the United States are excluded from the above mentioned compensation and benefit plans.

We are an equal opportunity employer, which means we comply with all federal, state and local laws that prohibit discrimination when making all decisions about employment. As equal opportunity employers, our policies prohibit unlawful discrimination on the basis of race, religion, color, national origin, ancestry, sex (including gender and gender identity), pregnancy, childbirth and related medical conditions, age, physical or mental disability, medical condition, genetic information, marital status, sexual orientation, citizenship status, AIDS/HIV status, political activities or affiliations, military or veteran status, status as a victim of domestic violence, assault or stalking or any other characteristic protected by federal, state or local law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.