
Director, Threat Management
North
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $175,000 - $245,000 per year
Job Level
Tech Stack
About the role
- Oversee the monitoring of security events and incidents
- Develop and lead Threat Hunting and Detection Engineering functions
- Implement proactive threat hunting and detection strategies
- Develop and lead a Cyber Threat Intelligence function
- Maintain Incident Response plans including playbooks and escalation procedures
- Conduct post-incident analysis and oversee forensic investigations
- Collaborate with various teams for coordinated responses
- Lead tabletop exercises with senior management and executive teams
- Provide leadership and direction to the team
- Manage team performance and development
Requirements
- Bachelor's degree in Computer Science, Cyber Security or related field
- 10+ years of experience in Cybersecurity or related fields
- Hands-on experience in Threat Hunting, Malware Research, Red Teaming
- Strong background in cybersecurity domains including Vulnerability exploitation detection, Malware identification and Reverse Engineering, security content and signature development
- Experience conducting hunts or incident response across networks, endpoints, cloud and application environments
- Demonstrated ability to interpret and write automated scripts and programming code
- Working knowledge of TTPs for EDR evasion, vulnerability and zero-day exploitation investigations
- Proficiency and hands-on experience with Incident Response tools, protocols, and analysis techniques
- Familiarity with packet capture analysis
- Experience with log and SIEM analysis to detect malicious activity
- Proficiency in cloud platforms and security tools
- Knowledge of how AI and ML are used in threat detection and response
- Ability to create detailed incident reports for both technical and non-technical stakeholders
- Must understand threats, vulnerabilities, and risk management
- Familiarity with attacks such as credential stuffing, ransomware, malware, phishing, and DDoS attacks
- Understanding of incident response procedures
- Knowledge of digital forensics
- Experience with cyber threat intelligence resources
- Familiarity with Kill Chain, Diamond and MITRE ATT&CK frameworks
- Experience developing and implementing disaster recovery plans is beneficial
Benefits
- Medical, Dental, & Vision Coverage
- Flexible Paid Time Off
- 401(k) + Match
- Mental Health Support & Well-Being Program
- Paid Maternity & Paternity Leave
- Education Assistance
- Company-funded Lifestyle Spending Account
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
Threat HuntingMalware ResearchRed TeamingVulnerability exploitation detectionMalware identificationReverse EngineeringIncident ResponsePacket capture analysisLog analysisCyber threat intelligence
Soft Skills
LeadershipTeam performance managementCollaborationCommunicationPost-incident analysisDirectionCoordinated responsesTabletop exercisesReport writingStakeholder engagement