
Managing Director, Cybersecurity Incident Response
- Southington, CT
- $170,000-180,000 per year
- Permanent
- Full-time
- Lead and manage the cyber incident response team, providing strategic direction and operational oversight.
- Oversee Cybersecurity Incident Management and coordinate with the Major Incident Management (MIM) team during crises.
- Develop and maintain Incident Response Playbooks.
- Plan, coordinate, and execute Tabletop Exercises & Simulations.
- Direct Threat Hunting Operations to proactively detect and mitigate threats.
- Oversee Digital Forensics and Malware Analysis efforts.
- Ensure Regulatory & Legal Compliance during incident handling.
- Manage Third-party/Vendor Incident Response coordination.
- Create, track and report Incident Metrics; drive continuous improvement initiatives.
- Collaborate with SOC and other security pillars to optimize detection and response capabilities.
- Stay current with emerging threats, vulnerabilities, and best practices.
- Respond to and coordinate efforts for incident management in relation to critical third-party partners and supply chain.
- Partner with the Resiliency team in efforts to test catastrophic cybersecurity scenario response capability from detection to recovery.
- Partner with infrastructure partners to threat model catastrophic technology events to create, test, and maintain response playbooks.
- Ensure the Incident Response program is well documented to heightened standards and meets all the criteria identified in regulatory and industry standard frameworks.
- Manage Incident Response platforms.
- Collaborate with the Security Operations Center (SOC) to perform quality assurance of level 1 and 2 analyses and to ensure all incident tickets are well-documented and complete.
- Track and remediate any findings or lessons learned from incidents, assessments, and cybersecurity exercises.
- Serve as an escalation point for level 1 and 2 analyst triages.
- Manage the relationship with IR managed security service providers and partners.
- Bachelor’s or Master’s in Computer Science, Cybersecurity, or related field preferred.
- Certifications such as: CISSP, CISM, GIAC (GCFA, GCIH), or equivalent.
- 10+ years in cybersecurity with 5+ years in incident response leadership.
- Expertise in digital forensics, malware analysis, and threat hunting.
- Experience with regulatory frameworks (e.g., FFIEC, GDPR, NYDFS).
- Experience with industry frameworks (e.g., CRI, NIST CSF, MITRE).
- Strong leadership, crisis management, and communication skills.
- Familiarity with SIEM, SOAR, EDR, and forensic tools.
- Candidate must show experience managing true cybersecurity incidents
- IR consulting preferred but not required.
- Experience in the banking industry desired.
- Previous management experience desired.