Senior Cybersecurity Incident Response Manager (Azure Cloud-Native)

cyber focus ai United State
Remote
Apply
AI Summary

Lead incident response program, manage security operations, and develop playbooks. 5+ years of cybersecurity experience required. $130,000-$140,000 salary, 100% remote work, and comprehensive benefits.

Key Highlights
Lead incident response program
Manage security operations
Develop and maintain incident response playbooks
Technical Skills Required
Azure KQL PowerShell SIEM monitoring Incident investigation Threat intelligence
Benefits & Perks
$130,000-$140,000 salary
100% remote work
Comprehensive health, dental, and vision insurance
Flexible PTO policy
12 company-paid holidays
Continuing education annual stipend

Job Description


Cyber Focus AII's mission is to help cybersecurity professionals discover cutting-edge opportunities in their field. We are not a staffing firm or agency. Cyber Focus AI does not hire for these roles—we use advanced technology to locate and verify them from actual employers.

Employer Industry: Insurance Technology

Why Consider This Job Opportunity

  • Salary estimated between $130,000-$140,000, with potential for higher based on qualifications and experience
  • 100% remote work opportunity, providing flexibility
  • Comprehensive health, dental, and vision insurance, with 100% of premiums covered by the employer
  • Flexible PTO policy offering up to 4-5 weeks of time off annually after the first year
  • 12 company-paid holidays each year, plus a continuing education annual stipend
  • Supportive work environment focused on integrity, humility, passion, and intelligence

What To Expect (Job Responsibilities)

  • Lead the organization's incident response program and manage day-to-day security operations
  • Perform security monitoring and analysis to detect and investigate security incidents
  • Develop and maintain incident response playbooks and metrics for reporting to leadership
  • Collaborate with internal and external teams to assess the impact of detected intrusions
  • Act as incident commander during incidents and lead tabletop exercises for incident response

What Is Required (Qualifications)

  • 5+ years of experience in cybersecurity and 3+ years in Azure cloud-native environments
  • Advanced understanding of incident response processes and investigations
  • Experience with SIEM monitoring, incident investigation, and threat intelligence
  • Proficient in advanced log analysis (KQL) and network traffic analysis
  • Strong written and verbal communication skills

How To Stand Out (Preferred Qualifications)

  • Experience with Microsoft 365, including Office 365 security
  • Knowledge of container security (Docker, Kubernetes, etc.)
  • Proficiency in PowerShell scripting
  • Relevant security certifications (e.g., CySA+, CISSP, GIAC) or cloud certifications (e.g., Azure, CCSP)

#InsuranceTechnology #Cybersecurity #RemoteWork #CareerGrowth #EmployeeBenefits

"We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately. We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer."

#CyberFocusAI

Subscribe our newsletter

New Things Will Always Update Regularly