Cyber Incident Response Planner
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, IT Project Manager
Overview
We are seeking an experienced and highly motivated Cyber Incident Response Planner to drive the development and implementation of robust incident response plans and processes. As an integral part of the Governance, Risk, and Compliance (GRC) Division within the Information and Cybersecurity Department, you will lead response efforts to mitigate cybersecurity breaches, minimize risk, and safeguard enterprise systems. This role requires a skilled communicator, critical thinker, and experienced responder who thrives in staying ahead of the evolving threat landscape.
This is a cross-functional role offering the opportunity to work across teams, contribute to enterprise risk management, and help build a strong incident response culture. The ideal candidate will bring technical expertise, communication acumen, and leadership skills to effectively influence and collaborate across multiple stakeholder groups. This role reports to the GRC Manager and is designated as on-site, with a current expectation of two days in the office due to space considerations.
Work will be performed in the Eastern Time Zone (ET) in Atlanta, GA.
- Incident Response Planning & Implementation:
Maintain governance over incident response (IR) documentation. Develop, document, and implement comprehensive IR plans, policies, standards and procedures to ensure swift and effective responses to cybersecurity incidents or breaches. - Incident Response Planning & Implementation:
Update and maintain IR documentation, workflows, automation initiatives, and response playbooks and similar, to remain aligned with evolving threats and operational requirements. - Incident Response Planning & Implementation:
Create and maintain secure methods for tracking and reporting IR activities. - Incident Handling & Coordination:
Assist with handling of security events/incidents, including triage, remediation, documentation of the incident, including Indicators of Compromise (IOCs), and escalation to management. - Incident Handling & Coordination:
Coordinate incident investigations, containment, and recovery efforts in collaboration with internal teams and external stakeholders. - Incident Handling & Coordination:
Serve as a liaison, ensuring clear and accurate communication of incident details while gathering information for stakeholders across multiple departments and governance bodies. Observe and document events during cybersecurity incidents and exercises to facilitate post-incident response reviews to identify and implement comprehensive improvements based on the lessons learned. - Incident Handling & Coordination:
Submit required IR reports to governing bodies to meet legal, regulatory, contractual, and policy obligations (e.g., federal agencies or institutional reporting directives). - Threat Awareness & Communication:
Maintain a deep and current understanding of the threat landscape, including malware identification, threat actor activity, and emerging attack vectors. - Threat Awareness & Communication:
Continuously analyze and consult various publications, websites, news sources, and cyber forums to monitor cyber threats relevant to our environment. - Threat Awareness & Communication:
Effectively communicate risks, threats, and potential impacts to stakeholders outside of the cybersecurity domain in a clear and actionable manner. - Testing & Validation:
Plan and execute incident response exercises, (e.g., tabletop exercises, simulations, and controlled disruptions) to validate and enhance organizational IR capabilities. - Testing & Validation:
Facilitate post-incident response exercise reviews to identify gaps, implement lessons learned, and refine IR processes. - Data Analysis & Enterprise Incident Management:
Manipulate, analyze, and interpret complex datasets to support cybersecurity investigations and enterprise risk initiatives. - Data Analysis & Enterprise Incident Management:
Leverage GRC tools to enhance enterprise cybersecurity risk management processes. - Data Analysis & Enterprise Incident Management:
Identify opportunities to automate and innovate IR workflows for improved efficiency. - Additional Responsibilities:
General GRC Support:
Resolve service desk incidents and issues assigned by the GRC team. - Additional Responsibilities:
General GRC Support:
Review and contribute to cybersecurity documentation for completeness, currency, and accuracy, such as plans for system security, incident response, contingency, disaster recovery, and business/impact analysis. Update as necessary. - Additional Responsibilities:
General GRC Support:
Contribute to the preparation of regulatory and compliance reports, collaborate with other organizational units ensuring data accuracy and compliance
- Minimum of two (2) years of demonstrated incident response experience, including active participation as a member of an IR team, or supporting incident-handling activities.
- Strong knowledge of incident response protocols, malware operation, containment techniques, and overall threat…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).