Overview
Remote
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 48 Month(s)
Able to Provide Sponsorship
Skills
CISSP
GCIH
GCFA
Incident Management
OSINT
PCI DSS
SIEM
Risk Management
ISO/IEC 27001:2005
IT Security
Forensics
Servers
Handling
Incident Response
Job Details
Job Title: IT Security Manager (Incident Management)
Location: Remote
Location: Remote
Position Overview
We are seeking a highly skilled IT Security Manager (Incident Management) to serve as the focal point for security event review, incident escalations, and incident handling. This role will lead the detection, containment, and remediation of emerging security incidents, conduct forensic and OSINT investigations, and ensure incidents are managed according to our Incident Response Policy and Procedures.
You will work closely with IT Security, Legal, HR, and Senior Leadership, while mentoring junior team members, running executive-level incident bridges, and leading post-mortem activities. This is a remote position within our Global Business Services (GBS) division, supporting a global 24x7x365 security operation.
Key Responsibilities
- Lead incident detection, triage, containment, eradication, and recovery efforts.
- Act as primary point of contact for all emerging information security incidents.
- Perform forensic investigations and OSINT analysis to identify threat actors, tactics, techniques, and procedures (TTPs).
- Conduct forensically sound collections from multiple sources (laptops, servers, cloud environments).
- Participate in and lead red team/blue team exercises.
- Collaborate with global security teams to develop and refine incident response procedures.
- Drive the incident response process end-to-end, documenting activities and lessons learned.
- Maintain threat intelligence awareness, monitoring SIEM/SOAR and other security platforms.
- Deliver clear and concise executive reports on incidents, findings, and recommended actions.
- Ensure compliance with enterprise security policies, legal requirements, and regulatory standards (GDPR, ISO 27001, NIST, PCI DSS).
Qualifications
Education & Experience:
- Bachelor s degree in Computer Science, MIS, or equivalent experience.
- 7+ years in IT, with at least 3+ years in information security.
- 2+ years dedicated to incident handling/incident management.
Technical Skills:
- Strong understanding of security principles: confidentiality, integrity, availability.
- Experience with OSINT tools, forensic analysis, malware analysis, and incident response automation.
- Proficiency with SIEM/SOAR platforms (e.g., Splunk, Snowflake, Swimlane, Demisto) and forensic tools (EnCase, AccessData, SIFT, Axiom).
- Knowledge of network protocols, intrusion detection systems, encryption, and vulnerability management.
- Experience in risk analysis, risk management, and ITIL service management.
Interpersonal Skills:
- Proven ability to brief and collaborate with executive leadership.
- Strong verbal/written communication with both technical and non-technical audiences.
- Ability to manage priorities under pressure and maintain composure in high-stress situations.
- High integrity when handling sensitive and confidential information.
Preferred Certifications:
- CISSP, ITIL, GCIH, GCFA, GCFE, GCTI, GCFR, CERT/CC CSIH, GIME.
- Multilingual capabilities a plus.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.