Lead and manage the security operations function, overseeing incident response, threat detection, and security monitoring activities.
Develop, implement, and refine incident response plans and procedures. Help lead security incident investigations from detection to resolution, ensuring timely containment, eradication, recovery, and post-incident analysis.
Oversee the administration, tuning, and enrichment of the Security Information and Event Management (SIEM) system to enhance visibility, improve alert fidelity, and support proactive threat hunting.
Implement, configure, and maintain advanced email security solutions to protect against phishing, malware, business email compromise (BEC), and other email-borne threats.
Design and conduct regular tabletop exercises to test and improve incident response capabilities, identify gaps, and train relevant stakeholders.
Establish and maintain 24/7 coverage for the Security Operations Center, ensuring continuous monitoring, rapid response, and effective threat management.
Mentor and lead a team of security operations engineers, fostering a culture of continuous learning, professional growth, and operational excellence.
Contribute to the overall security strategy, aligning security operations with business objectives and evolving threat landscapes.
Integrate threat intelligence feeds and platforms into security operations and SIEM to proactively identify, analyze, and respond to emerging threats.
Build, lead, and manage a geographically dispersed security operations team, ensuring 24/7 incident response readiness and effective threat management across all regions.
Develop and present key performance indicators (KPIs), key risk indicators (KRIs) and metrics related to security operations, incident response, and threat posture to leadership.
Requirements
7+ years of experience in security operations, incident response, or related roles.
Strong knowledge of cybersecurity principles, practices, and frameworks (e.g., MITRE ATT&CK. NIST 800-53, ISO 27001).
Hands-on experience with penetration testing tools and techniques.
Familiarity in AWS cloud security, including IAM, VPC, and S3 security controls.
Proficiency with enterprise security solutions (EDR, MDM, SAST, SIEM, etc.,)
Experience building and maintaining SIEM systems for security event management and analysis.
Understanding of security assessments, GRC frameworks, and regulatory compliance requirements.
Ability to conduct forensic analysis
Excellent analytical and problem-solving skills, with the ability to troubleshoot complex security issues.
Strong communication and collaboration skills, with the ability to work effectively in a team environment.
Prefer Bachelor's degree in Computer Science, Information Security, or related field (or equivalent work experience).
Prefer CISSP, CISM, or OSCP
Benefits
We strongly believe we are changing how games studios operate and at the core of what we do is making great games that create a connected community
We're not just about making Games Where You Belong. We're also about building communities where our people belong. That's why Fortis is a thriving environment that celebrates diversity, embraces inclusivity, and fosters growth.
Build and grow with a seasoned team of accomplished talent who have left an impactful mark in their disciplines, both in and out of gaming.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.