Role Description
Security incident manager is responsible for managing the processes of; detecting, analyzing, managing, and responding to security threats in our client’s organisation. The role will
minimise the impact, contain security incidents like data breaches, hacking, cyber- attacks, system failures, and restore business continuity. The role holder will support the business to improve key processes and strengthen security posture. During any Info Sec Incident, the Manager will take the lead. Investigating the incident and working with internal stakeholders such as Compliance and Legal to
ensure accurate information is provided for any reporting submissions to the relevant authorities
Key Roles & Responsibilities:
1. Design and implement an Information Security Incident Management Framework including template responses.
2. Design and implement a dashboard to monitor key systems and networks continuously for unauthorized data leaks and breaches, implementing detection tools for timely identification.
3. Collaborate with the SOC (Security Operations Centre) team to ensure efficient operational and management of SOC services. To ensure in robust and effective incident response and escalation.
4. Develop and deliver training programs to enhance cybersecurity awareness (phishing) among employees through regular workshops and informational sessions.
5. Manually review and analyze phishing and smishing attempts, offering recommendations to strengthen defences against these threats.
6. Proactively search for Indicators of Compromise (IoCs) and potential threats, utilizing various tools to uncover hidden risks.
7. Gather and analyze threat intelligence from multiple sources to stay updated on emerging threats, sharing insights with the SOC team and stakeholders.
8. Monitor the dark web for compromised data related to the organization, providing alerts and recommendations based on findings.
9. Track online activities that may threaten the organization’s brand reputation
and respond to potential brand abuse or impersonation incidents.
10. Post any investigation, ensuring the relevant processes and controls are reviewed with reporting and risks identified for the appropriate risk register and governance tool.
11. Regularly assess the organization’s attack surface for vulnerabilities, collaborating with teams to remediate identified weaknesses, appropriately escalating and reporting.
12. Oversee the security monitoring of network and system infrastructure, ensuring proper logging and alerting mechanisms are established
Certificates/Qualifications Required
- Bachelor’s degree in Computer Science, Cyber Security, or related field.
Masters would be an added advantage. - Certificates such as; ISO 27001, CISA, CISM, CISSP etc. would be an added
advantage
Experience & Skills
- 8 to 10 years of experience in Cybersecurity, with a focus on incident response and threat management.
- Hands-on experience handling complex security incidents, including forensic
analysis and root cause investigation. - Excellent communication and interpersonal skills.
- Ability to collaborate effectively with cross-functional teams.
- Strong analytical and problem-solving skills.
- Experience with security tools and technologies.