More jobs:
SOC Incident Response Manager - Senior Vice President
Job in
Irving, Dallas County, Texas, 75084, USA
Listed on 2026-01-12
Listing for:
Citibank (Switzerland) AG
Full Time
position Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity
Job Description & How to Apply Below
Our technology solutions are the foundations of everything we do from keeping the bank safe, managing global resources, and providing the technical tools our workers need to be successful to designing our digital architecture and ensuring our platforms provide a first-class customer experience. We reimagine client and partner experiences to deliver excellence through secure, reliable, and efficient services. ## Responsibilities:
* Lead, mentor, and manage a global team of 6-10 Security Operations Center Incident Responders, fostering a culture of excellence and continuous improvement.
* Oversee and direct incident response functions, ensuring adherence to established playbooks and best practices across diverse computing environments.
* Drive strategic initiatives to enhance incident detection, containment, and eradication capabilities.
* Lead and support in-depth triage and investigations of urgent cyber incidents.
* Manage team performance, conduct regular reviews, and facilitate career development for direct reports.
* Ensure the team effectively performs host-based analytical functions (e.g., digital forensics, metadata, malware analysis, etc.) through investigating Windows, Unix-based, appliances, and Mac OS X systems to uncover Indicators of Compromise (IOCs) and/or Tactics, Techniques and Procedures (TTPs).
* Oversee the creation and tracking of metrics based on the MITRE ATT&CK Framework and other standard security-focused models, using these to drive continuous improvement.
* Lead collaboration with application and infrastructure stakeholders to identify key components and information sources such as various environments (on-premises versus other distributed systems), servers, workstations, middleware, applications, databases, logs, etc.
* Direct incident response efforts using forensic and other custom tools to identify sources of compromise and/or malicious activities.
* Collaborate with global multidisciplinary groups for triaging and defining the scope of large-scale incidents.
* Direct the documentation and presentation of investigative findings for high-profile events and other incidents of interest to senior leadership.
* Lead and participate in readiness exercises such as purple team, table tops, etc.
* Develop and implement training programs for junior and mid-level colleagues on relevant best practices and advanced incident response techniques.
* Act as a key escalation point for critical incidents and provide expert guidance to the team.
* Bachelor's degree in a technically rigorous domain such as Computer Science, Information Security, Engineering, Digital Forensics, etc.
* 10+ years of professional experience in cybersecurity and/or information security, or demonstrated equivalent capability.
* 5+ years hands-on working in cyber incident response and investigations, with at least 3 years in a leadership or management capacity, overseeing medium to large global teams, with exposure to various computing environments including cloud and traditional infrastructure.
* Proven experience in leading, mentoring, and developing technical teams.
* Demonstrated expertise or oversight in Dev/Sec/Ops practices within various computing environments.
* Deep understanding and experience with common services and platforms from a security and incident response perspective.
* Proven experience leading or directing forensic investigations or large-scale incident response efforts across diverse environments.
* Strong understanding and strategic leadership in containerization methods and tools (e.g., Docker, Kubernetes), including incident response and digital forensics considerations.
* Advanced certifications (e.g., GIAC, CISSP) in security or equivalent expertise.
* Demonstrated ability to lead teams in analyzing and pivoting through large data sets during incident investigations.
* Extensive experience in leading digital forensics (e.g., computer, network, mobile device forensics, and forensic data analysis) activities, including: + Memory collection and analysis from various platforms. + Evidence preservation, following industry best practices. + Familiarity with malware analysis and Reverse Engineering of samples (e.g., static, dynamic, de-obfuscation, unpacking). + In-depth file system knowledge and analysis. + In-depth experience with timeline analysis.
+ In-depth experience with Registry, event, and other log file and artifact analysis. + Hands-on experience with a DFIR toolset and related scripting. + Current expertise with an EDR system.
* Multiple advanced GIAC (e.g., GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.) or other…
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×