Associate Director, Cybersecurity Operations

Remote Full-time
About the position The ideal candidate for this role will be an experienced incident response analyst with extensive detection development experience across various enterprise technologies. This individual will be responsible for designing, developing and enhancing threat detection capabilities across the organizations detection platforms while providing incident response experience during critical incidents, and providing mentorship to junior analysts. The primary focus for this role will be the creation and optimization of threat detection use cases, leveraging advanced tools and techniques to identify and mitigate cyber threats in real time through collaboration with cross-functional teams to ensure that the threat detection solutions align with the organization's security strategy. This position will consider remote work approval for the right candidate. Responsibilities • Design and implement advanced detection architectures across the organization's security landscape, utilizing SIEM, EDR, XDR and cloud security platforms. • Lead the development and refinement of complex, high-fidelity detection use cases, custom correlation rules, and detection models tailored to the organization's unique risk profile and threat landscape. • Continuously enhance and optimize detection techniques, reducing alert fatigue and improving detection accuracy. • Identify and develop improvement initiatives within the Detection and Response team, implementing best practices and optimizing processes to enhance security capabilities. • Lead investigations into critical incidents, coordinate containment and eradication activities, and ensure recovery aligns with NIST incident response framework principles. • Leverage SOAR platforms to automate triage, enrichment, and response workflows for improved Incident Response efficiency. • Utilize AI-based tools such as Agentic AI and Co-pilot to enhance investigation speed, threat hunting, and reporting accuracy. • Leverage MDR capabilities to enhance detection and response workflows and streamline investigation prioritization. • Use endpoint protection and diagnostic tools such as Microsoft Defender for Endpoint (MDE) and CrowdStrike to conduct forensic analysis and validate root causes. • Partner with internal stakeholders, leadership, and external partners to provide situational awareness and actionable recommendations. • Support junior analysts through coaching, technical guidance, and knowledge sharing to build overall Incident Response capability and mature the threat detection posture. Requirements • Expert understanding of attack lifecycles, network telemetry, endpoint data, and adversarial tactics mapped to MITRE ATT&CK. • Proven ability to lead the full incident lifecycle, following NIST best practices from identification through post-incident recovery. • Ability to design and optimize automated response workflows in SOAR tools to reduce response time and analyst fatigue. • Comfortable integrating AI and machine learning tools into investigative processes to improve detection accuracy and reduce false positives. • Understands the business impact of identified threats and aligns response actions to minimize operational risk. • Proactively evaluates emerging technologies and integrates them into Incident Response operations. • Experience with SIEM platforms such as Microsoft Sentinel for event correlation and detection engineering. • Strong knowledge of SOAR technologies for orchestration and response automation. • Familiarity with endpoint detection and response (EDR) tools such as MDE, CrowdStrike and Sysinternals. • Working knowledge of AI-powered analysis and automation tools including Agentic AI and Co-pilot. • Understanding of key cybersecurity frameworks and standards: NIST Incident Response Framework, MITRE ATT&CK, and ISO 27001. • Experience with scripting languages including python and PowerShell. • Strong knowledge of Windows Active Directory Environment and cloud computing architectures. • Experience conducting forensic analysis, log correlation, and root cause investigations. • Strong communication skills to convey findings to technical and non-technical audiences. • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience). • 5+ years of experience in IR operations, intrusion detection, or incident response. • Experience developing detection rules, playbooks, and automation workflows. • Demonstrated experience leading complex investigations and coordinating cross-functional response efforts. • Adaptability • Analytical Thinking • Business Strategies • Coaching and Development • Cybersecurity Operations • Cyber Threat Intelligence • Data Loss Prevention (DLP) • Decision Making • Detail-Oriented • Digital Forensics • Governance Management • Incident Response Management • Insider Threat Mitigation • Leadership • Log Analysis • Malware Analysis • Management Process • Penetration Testing • People Leadership • Risk Management • Security Information and Event Management (SIEM) • Security Monitoring • Security Operations • SLA Management Nice-to-haves • Advanced certifications: GIAC (GCIH, GCFA etc.). • 5+ years of experience in Detection Engineering roles for large organizations. • Hands-on experience with cloud-native security tooling and hybrid SOC environments. • Ability to work collaboratively across teams; foster an environment where associates thrive and perform at their best. • Model ethical conduct, transparency, and accountability in every action; ensure compliance with cybersecurity and data privacy standards. • Demonstrate curiosity, adaptability, and a growth mindset. • Encourage innovation, learning, and continuous improvement across IR operations. Benefits • medical • dental • vision healthcare and other insurance benefits (for employee and family) • retirement benefits, including 401(k) • paid holidays • vacation • compassionate and sick days Apply tot his job
Apply Now →

Similar Jobs

Director Cyber and Information Security

Remote

Director, Cybersecurity (Global/Emerging Market Experience Required)

Remote

Senior Cybersecurity Engineer—Security Operations/Threat Management

Remote

Cyber Security Engineer | Redstone Federal Credit Union | Remote (United States)

Remote

cybersecurity engineer senior, Identity Lifecycle and Authentication Services (Remote, US)

Remote

Cybersecurity Lead Engineer (Remote)

Remote

[Remote] Cybersecurity Engineer - Training Lab Developer

Remote

[Remote] Cybersecurity Engineer - Zscaler (Contractor)

Remote

Cyber security engineer - Contract to Hire

Remote

IT Cybersecurity Engineer - Physical Controls

Remote

Experienced Evening Customer Chat Specialist for Dynamic Remote Support Team – No Prior Experience Required for Entry-Level Position in Customer Service and Support

Remote

Sr. Security Engineer, Embedded Software

Remote

Experienced Freelance Data Entry Operator for Blithequark Store - Career Growth Opportunities in Data Accuracy and Quality Assurance

Remote

Student Advisor, DNP; Remote

Remote

**Experienced Part-time Data Entry Specialist – Remote Work from Home Opportunity at blithequark**

Remote

**Customer Service Manager – Lead the Way in Exceptional Customer Experience**

Remote

**Experienced Remote-Live Chat Agent – Crisis Intervention and Support Specialist**

Remote

**Experienced Full Stack Data Entry Specialist – Remote Work Opportunity at blithequark**

Remote

SEPHORA – REMOTE 1099 CSR – CHAT/VOICE / $18/hr – Start 10/18- #MSP

Remote

[Hiring] Provider Customer Service Call and Chat Representative @Unite – Amazon Store

Remote
← Back