Hewlett Packard Enterprise

Director, Cyber Defense Center

Hewlett Packard Enterprise

full-time

Posted on:

Location Type: Hybrid

Location: Spring • California, District of Columbia, New York, Texas, Washington • 🇺🇸 United States

Visit company website
AI Apply
Apply

Salary

💰 $170,000 - $412,500 per year

Job Level

Lead

Tech Stack

CloudCyber Security

About the role

  • Lead and manage the CDC’s round-the-clock operations, ensuring rapid detection, analysis, and coordinated response to cyber threats across HPE.
  • Lead critical incidents as the primary incident commander.
  • Build, mentor, and scale a highly skilled, globally leveraged team, addressing talent gaps and driving professional development.
  • Champion the adoption of advanced technology, automation, and AI to enhance operational efficiency and effectiveness.
  • Operationalize actionable threat intelligence, integrating it into CDC workflows and incident response.
  • Drive investigation self-sufficiency, enabling the CDC to handle complex incidents without external support.
  • Strengthen processes for accountability in structural security remediation, leveraging risk management and cyber governance maturity.
  • Collaborate across cyber defense functions (Detection Engineering, Threat Hunting, Threat Intelligence, Insider Threat, Offensive Security) to ensure seamless integration and shared responsibility.
  • Establish, enhance, and track key metrics (e.g., Mean Time to Contain, detection rates) to measure and continuously improve CDC performance.
  • Ensure comprehensive visibility and monitoring across HPE’s environment, including M&A entities and affiliates.
  • Foster a security-aware culture, partnering with IT, business units, and security champions to drive behavioral change.
  • Lead the CDC’s transformation to a single, global SOC model, supported by DevSOCOps and aligned with business priorities.

Requirements

  • Proven experience leading large-scale, complex cyber defense or SOC operations in a global enterprise environment.
  • Demonstrated track record of managing significant cybersecurity incidents, including those with public visibility and high business impact.
  • Deep expertise in incident detection, response, and investigation across multiple domains (network, endpoint, cloud, OT).
  • Strong background in leveraging automation, AI, and advanced analytics to drive operational maturity.
  • Experience integrating threat intelligence and proactive threat hunting into SOC workflows.
  • Track record of driving process improvement, accountability, and cross-functional collaboration.
  • Master’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
  • Minimum 12+ years of experience in cybersecurity, with significant leadership in SOC/CDC or similar operational roles.
  • At least 10+ years should include people management.
  • At least 5 years of experience in leading leaders.
  • Industry certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable.
Benefits
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
incident detectionincident responseinvestigationautomationAIadvanced analyticsthreat intelligence integrationproactive threat huntingprocess improvementcybersecurity
Soft skills
leadershipmentoringcollaborationaccountabilitycommunicationteam buildingoperational maturitybehavioral changecross-functional collaborationstrategic thinking
Certifications
CISSPCISMGIACMaster's degree in CybersecurityMaster's degree in Computer ScienceMaster's degree in Information Technology