Cyber Incident Manager with excellent stakeholder and team management skills as well as a technical mindset.
This role will require you in the office at least twice a week and be on-call one in every four weeks. You will be required to go through SC clearance so need to have been a UK resident for the past five years, unfortunately we will not be able to provide sponsorship.
The Cyber Incident Manager role will be working in the Cyber Response Services (CRS) Team within our Risk Consulting practice, reporting directly into the head of cyber response. Cyber security is one of the areas which has been identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us to help them understand and respond to that threat.
Responsibilities
* Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response.
* Digital forensics of relevant incident data (disk, volatile memory, network packets, log files).
* Maintaining a current view of the cyber threat, and being able to advise clients on the threat landscape and attacks which may be relevant to them.
* Manage the development of in house cyber-response tools.
* Assess client incident response capability maturity.
* Help stand-up or improve clients’ own incident response capabilities.
* Project management of engagements to deliver high quality work in a timely manner, including:
* Scoping and costing of engagements
* Financial management of projects
* Engagement and risk management
* Production and review of deliverables to a high standard.
* Liaising with clients on delivery, implementation and project issues.
* Ability to generate well-structured responses to bids and requests for proposals.
Required skills and experience:
* Excellent communication skills (both written and oral) and project management skills.
* Strong IT and network skills – knowledge of common enterprise technologies – Windows and Windows Active Directory, Linux, Cisco, etc.
* Working programming skill-set to be able to author and develop tools. Most in-house security tools are written in Python, but we accept that a competent programmer will be able to transfer skillsets across languages.
* Technical proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and dynamic malware analysis / reverse engineering, advanced mobile device forensics
* Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF) / AXIOM, TZWorks, and/or Cellebrite
* Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling encryption such as BitLocker, FileVault, and/or LUKS)
* Experience with and understanding of enterprise Windows security controls
* Experienced working as Senior Incident Manager ideally for a consultancy.
* Strong stakeholder management and team management skills.
Advantageous:
* Degree level qualified, MSc in Information Security, IT or relevant STEM subjects.
* General information security certificates such CISSP, CISM or CISA.
* Incident management certifications such as:
* CREST certified incident manager (CCIM).
* GIAC Certified Incident Handler (GCIH)
* Digital forensics certificates such as:
* CREST certified registered intrusion analyst (CRIA),
* CREST certified network intrusion analyst (CCNIA),
* CREST certified host intrusion analyst (CCHIA),
* CREST certified malware reverse engineer (CCMRE),
* GIAC Certified (Network) Forensic Analyst (GCFA, GNFA)
Send me alerts about jobs like this.
Please enter your email address to continue setting up an email alert for similar jobs to this one. By entering your email address and clicking apply you will sign up to Jobs4 and agree to our terms and conditions .
#J-18808-Ljbffr