Cyber security incident manager
Job Title - Cyber security incident manager
SC cleared or eligible for clearance.
3 month rolling ( likely 1 year)
Fully remote
Key Responsibilities
Incident Response & Management
- Lead and coordinate major cyber security incidents (e.g., ransomware, data breaches, phishing campaigns, insider threats).
- Serve as primary incident commander during high severity events.
- Oversee triage, impact assessment, containment strategies, and remediation plans.
- Ensure timely escalation and communication to leadership and relevant stakeholders.
- Maintain accurate incident logs, timelines, and evidence for audits or legal processes.
Threat Analysis & Investigation
- Direct technical investigations, working with SOC analysts, threat intelligence teams, and external partners.
- Analyse attack vectors, exploits, and root causes.
- Guide forensic activity where required, ensuring evidence integrity.
Governance, Reporting & Continuous Improvement
- Produce detailed incident reports, executive summaries, and post incident reviews.
- Track incident metrics, trends, and lessons learned to improve security posture.
- Drive improvements in incident response playbooks, processes, and tooling.
- Ensure incidents are handled in alignment with frameworks such as NIST
Stakeholder & Vendor Coordination
- Act as the key liaison during incidents with IT, Risk, Legal, Compliance, HR, Communications, and third party partners.
- Support customer facing communication where relevant (for MSSP or managed services environments).
- Manage relationships with external responders, MSSPs, and law enforcement as applicable.
Operational Readiness
- Support the development and delivery of cyber incident simulations, tabletop exercises, and readiness assessments.
- Ensure IR documentation is current, accessible, and aligned with business needs.
- Provide mentoring and support to junior analysts and incident responders.
Essential Skills & Experience
- Proven experience leading complex cyber security incidents in a mid to large enterprise or MSSP environment.
- Strong understanding of attack methodologies, malware behaviour, and adversary TTPs.
- Experience with SIEM, EDR, SOAR, threat intel platforms, and forensic tools.
- Deep knowledge of IR frameworks:
- Ability to make clear decisions under pressure and command multi disciplinary response teams.
- Excellent communication skills, with the ability to convey technical detail to senior leadership.