You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.
Verizon’s offered Cyber Security Incident Response Team (CSIRT) service will constitute of a designated CSIRT Lead Responder as a full-time resource, who will work as a contact and communications point between Verizon’s security services team and Customer’s security and IT staff as well as users and other important stakeholders. The CSIRT Lead Responder will also be responsible for operate the incident management process in accordance with the procedures designed in cooperation with Customer.
The CSIRT Lead will be an expert in the field of security incident response with strong leadership and organization skills. Successful candidates typically experience with strong focus on Incident Response as well as technical Certifications to reinforce their practical experience. The CSIRT Lead has strong coordination, communication and collaborations skills as well as a good technical and architectural understanding. On a day-to-day basis the CSIRT Lead will assist with identification and response to incidents as well as proactively propose improvements for how to reduce risk and potential future incidents. The CSIRT Lead will be expected to be the Incident Commander for any P1 incidents or those that require complex coordination and frequent reporting / updates.
Duties:
Work with senior management to develop and maintain CSIRT process and practice documents
Lead CSIRT service transition and serve as a trusted advisor to manage customer expectations. As the primary point of contact for your client, you will need to establish and maintain effective communication relationships.
Review incident response activities and documentation efforts of the support team and provide feedback as necessary.
Provide or arrange for necessary training for the support team on CSIRT methods and/or security tooling used in the client environment.
Receive and monitor incident information from Verizon managed security services and other sources.
Oversee creation of Threat Intel Reports for security threats that might impact the client environment or have interest to the client.
Review the collected incident data and confirm or reject incidents based on the analysis;
Classify and prioritize incidents based on established criteria;
Facilitate communication between stakeholders of the status of the incidents with weekly and/or monthly meetings and reports;
Coordinate at least annual Table Top Exercises for the team and client security team training needs.
Coordinate the containment effort based on the available information and established processes;
Make containment decisions and facilitate decision making by other parties using established escalation process;
Communicate with the affected users and stakeholders to organize the containment effort;
Verify the effectiveness of containment actions taken;
Identify the attack vector of used by incident and confirm take actions to confirm that similar incidents are prevented in the future;
Validate the effectiveness of the eradication actions;
Coordinate forensics and law enforcement activities with officials if necessary;
Coordinate the recovery actions; confirm that the recovery effort was successful; and confirm that all temporary containment efforts have been removed;
Update stakeholders on the status of the recovery effort;
Conduct a root cause analysis for Critical or High incidents;
Communicate the results of the root cause analysis to Customer and stakeholders to prevent similar incidents in the future;
Analyze the incident response effort, with feedback from Customer and third parties. Identify and analyze any mistakes as well as good decisions done during response process;
Use the results of the analysis as an input for improvements, such as incident response process changes or changes in security monitoring.
Bachelor’s degree or four or more years of work experience.
Four or more years of relevant work experience.
Relevant work experience in: a cybersecurity capacity, responding to cybersecurity incidents, triaging, and/or investigating cybersecurity incidents
Bachelor’s degree or Master’s degree in Computer Science, Cyber Security or related technical or business field.
Strong background in CSIRT and SIEM technologies
Splunk experience and certification
Proven background using various EDR tools like Carbon Black, Crowdstrike or Tanium
Strong communication skills and ability to engage with customers at both technical and executive levels.
Clear and concise written and oral communication, including the ability to product professional-level documentation.
Strong problem-solving and security analytics skills; able to identify gaps in processes and recommend improvements for mitigation.
Strong leadership skills and a proactive approach to customer issues with background leading a remote team
Ability to excel in high pressure environments.
SANS or other Security Certifications, such as GCIA, GCIH, GCFE, GREM, GPEN, CEH.
CISSP Certification.
CISM Certification.
ITIL Foundations training / Certification.
Significant experience with how to structure and operate an efficient Incident Response process.
Knowledge of common types of malware, their infection vectors, how identify them using network and host based tools, how to eradicate them and verify the success of eradication efforts.
Knowledge of current security threats and vulnerabilities, how to detect and mitigate them, ability to understand their possible consequences on the customer’s environment.
Understanding of modern technologies used to detect malware and vulnerabilities and protect assets.
Understanding of modern network and cloud technologies.
In this hybrid role, you'll have a defined work location that includes work from home and a minimum eight assigned office days per month that will be set by your manager.
40
Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to veteran status, disability or other legally protected characteristics.
Our benefits are designed to help you move forward in your career, and in areas of your life outside of Verizon. From health and wellness benefit options including: medical, dental, vision, short and long term disability, basic life insurance, supplemental life insurance, AD&D insurance, identity theft protection, pet insurance and group home & auto insurance. We also offer a matched 401(k) savings plan, stock incentive programs, up to 8 company paid holidays per year and up to 6 personal days per year, parental leave, adoption assistance and tuition assistance, plus other incentives, we’ve got you covered with our award-winning total rewards package. Depending on the role, employees have the opportunity to receive compensation in the form of premium pay such as overtime, shift differential, holiday pay, allowances, etc. Newly hired employees receive up to 15 days of vacation per year, which grows with additional service. For part-timers, your coverage will vary as you may be eligible for some of these benefits depending on your individual circumstances.
The salary will vary depending on your location and confirmed job-related skills and experience. This is an incentive based position with the potential to earn more. For part-time roles, your compensation will be adjusted to reflect your hours.
You want more out of a career. A place to share your ideas freely. We power and empower how people live, work and play by connecting them to what matters most. If that inspires you, start the next chapter of your career here.