Cyber Security Incident Response Team Manager

Capgroup5 months ago
San Antonio, TX, United States
Hybrid
Full-time
Junior Level (1-3 years)

Job Description

Position Overview

We are seeking a highly technical and hands-on Incident Response Manager to lead our 24/7 global team of analysts responsible for monitoring, detecting, and responding to cybersecurity incidents. In this role, you will manage incident response activities, enforce playbooks and policies, and serve as a critical escalation point during high-severity events, ensuring rapid containment and resolution of security incidents.

Key Responsibilities

  • Lead and mentor a globally distributed team of security analysts and engineers responsible for detection, triage, containment, and investigation of security incidents.
  • Serve as incident commander and escalation point for high-severity incidents including ransomware, account compromise, phishing, and data leakage.
  • Architect and automate integration of AI/ML-driven threat detection and behavioral analytics into Incident Response processes using SOAR platforms and custom scripting (Python, PowerShell, Bash, etc.).
  • Implement and enforce IR playbooks, policies, and best practices aligned with NIST and MITRE ATT&CK frameworks.
  • Coordinate cross-functional responses with IT, development, legal, privacy, and business continuity teams.
  • Analyze and prioritize complex incidents ensuring adherence to SLAs and regulatory/privacy requirements.
  • Continuously improve detection, response, and reporting processes through metrics, trends, KPIs, KRIs, and post-incident reviews.
  • Conduct tabletop exercises and oversee vulnerability and penetration testing assessments to identify process gaps.
  • Integrate emerging threat intelligence and advanced attacker TTPs into dynamic incident response strategies.

Required Qualifications

  • 7+ years of experience in cybersecurity, with significant hands-on work in Security Operations Centers (SOC) and Incident Response, including 3+ years in a leadership role.
  • Bachelor’s degree in Cybersecurity, Computer Science, or a related field preferred.
  • Certifications such as GCIH, GCFA, GCFE, CISSP, OSCP, or equivalent.
  • Proven ability to lead distributed teams under high-pressure and high-stakes environments.
  • Hands-on coding experience in Python (preferred), PowerShell, Bash, or similar languages.
  • Expertise with traditional and Next-Generation SIEM platforms (e.g., Splunk, Sentinel, QRadar, Exabeam, CrowdStrike Falcon).
  • Strong proficiency in SQL along with experience in modern data lake platforms (e.g., Snowflake, Databricks, Azure Data Lake).
  • Familiarity with forensic analysis, malware reverse engineering, threat hunting, cloud IR (AWS, Azure), and hybrid environments.
  • Exceptional organizational, communication, and decision-making skills, with an ability to maintain team morale and well-being.

Benefits & Perks

  • Base Salary: Southern California: $173,211-$277,138; San Antonio: $142,394-$227,830; New York: $183,613-$293,781.
  • Performance Bonus: Eligible for an individual annual performance bonus plus Capital’s annual profitability bonus.
  • Retirement Plan: Capital contributes 15% of your eligible earnings.
  • Learn more about our compensation and benefits details on our website. (Temporary positions in Canada and the United States are excluded from these plans.)

Required Skills

MITRE ATT&CK
SIEM Management
Incident Response
Team Leadership
Risk Analysis
Threat Detection
Forensic Analysis
Cross-functional Coordination
Bash Scripting
Dashboard and Reporting
NIST Framework
Cloud Incident Response (AWS, Azure)
Cybersecurity Operations
Python Programming
PowerShell Scripting