Employer: National Football League
Location: New York, NY
The Security Incident Response Manager (SIRM) will drive information security practices and processes for incident response throughout the organization. The SIRM will balance business priorities, information security risks, emerging threats, and best practices to ensure the confidentiality, integrity, and availability of the National Football League’s information assets. The position requires a strong information security professional, who is able to identify potential risks and develop achievable and effective strategies. The SIRM will need a strong security industry knowledge that evolves with current and emerging threats, as well as an ongoing understanding of key business and technological processes.
The SIRM will be responsible for responding to information security incidents across the enterprise, using the information security policies, standards, guidelines, and industry best practices to remediate the incident and restore normal business operations. The SIRM will conduct highly-confidential investigations; threat assessments and Penetration tests across the National Football League to identify and remediate security vulnerabilities.
Responsibilities:
• Providing leadership in the detection, response, mitigation, and reporting of cyber incidents impacting the environment
• Collaborates with other technical leads: Engineering, Operations, Service Desk, Applications to integrate security controls into a complex technical architecture that sufficiently mitigates risk
• Review alerts from MSSP provider as well as from internal monitoring tools. Determine impact and severity and lead mitigation efforts as needed.
• Operating and use of the cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, host based forensics, and case management system
• Manage NFL Litigation hold process including the electronic discovery as well as forensic examination of electronically stored information
• Manage processes for incident, patch, and threat management in compliance with policies.
• Develop Insider Threat Program
• Conduct vulnerability/penetration Tests
• Conduct Incident Response Table Top Exercises
• Lead all notifications during major incident mitigation.
• Alert technical leads to emerging threats.
• Maintain and publish incident reports and threat level metrics.
• Act as the primary contact to our Managed Security Service provider.
Requirements:
• Bachelor’s degree or equivalent experience and education required
• 5+ years of experience in information security
• Security certifications such as E|CIH, GCIH, CISSP or equivalent
• Strong telecommunication and system security background
• Experience with incident management frameworks such as NIST and ITIL
• Experience with Security tools such as: Encase, CyberArk, Resolver (GRC), McAfee EPO, Proofpoint, Stealthbits, nmap, Nessus, Qualys, Metasploit, OpenVAS, OpenSSL, WebInspect, etc.) and manual testing
• Familiarity with PCI, and HIPAA requirements
• Excellent written and verbal communication skills
View or apply to job