
Director, Cyber Defense Center
Hewlett Packard Enterprise
full-time
Posted on:
Location Type: Hybrid
Location: Spring • California, District of Columbia, New York, Texas, Washington • 🇺🇸 United States
Visit company websiteSalary
💰 $170,000 - $412,500 per year
Job Level
Lead
Tech Stack
CloudCyber Security
About the role
- Lead and manage the CDC’s round-the-clock operations, ensuring rapid detection, analysis, and coordinated response to cyber threats across HPE.
- Lead critical incidents as the primary incident commander.
- Build, mentor, and scale a highly skilled, globally leveraged team, addressing talent gaps and driving professional development.
- Champion the adoption of advanced technology, automation, and AI to enhance operational efficiency and effectiveness.
- Operationalize actionable threat intelligence, integrating it into CDC workflows and incident response.
- Drive investigation self-sufficiency, enabling the CDC to handle complex incidents without external support.
- Strengthen processes for accountability in structural security remediation, leveraging risk management and cyber governance maturity.
- Collaborate across cyber defense functions (Detection Engineering, Threat Hunting, Threat Intelligence, Insider Threat, Offensive Security) to ensure seamless integration and shared responsibility.
- Establish, enhance, and track key metrics (e.g., Mean Time to Contain, detection rates) to measure and continuously improve CDC performance.
- Ensure comprehensive visibility and monitoring across HPE’s environment, including M&A entities and affiliates.
- Foster a security-aware culture, partnering with IT, business units, and security champions to drive behavioral change.
- Lead the CDC’s transformation to a single, global SOC model, supported by DevSOCOps and aligned with business priorities.
Requirements
- Proven experience leading large-scale, complex cyber defense or SOC operations in a global enterprise environment.
- Demonstrated track record of managing significant cybersecurity incidents, including those with public visibility and high business impact.
- Deep expertise in incident detection, response, and investigation across multiple domains (network, endpoint, cloud, OT).
- Strong background in leveraging automation, AI, and advanced analytics to drive operational maturity.
- Experience integrating threat intelligence and proactive threat hunting into SOC workflows.
- Track record of driving process improvement, accountability, and cross-functional collaboration.
- Master’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
- Minimum 12+ years of experience in cybersecurity, with significant leadership in SOC/CDC or similar operational roles.
- At least 10+ years should include people management.
- At least 5 years of experience in leading leaders.
- Industry certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable.
Benefits
- Health & Wellbeing
- Personal & Professional Development
- Unconditional Inclusion
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
incident detectionincident responseinvestigationautomationAIadvanced analyticsthreat intelligence integrationproactive threat huntingprocess improvementcybersecurity
Soft skills
leadershipmentoringcollaborationaccountabilitycommunicationteam buildingoperational maturitybehavioral changecross-functional collaborationstrategic thinking
Certifications
CISSPCISMGIACMaster's degree in CybersecurityMaster's degree in Computer ScienceMaster's degree in Information Technology