Your opportunity
New Relic is searching for a Manager to support our growing Security Incident Response Team. This role will report to the Senior Manager of Security Incident Response and serve as a Technical manager to our growing team of highly skilled and passionate security practitioners.
You’ll help grow and develop the Security Incident Response program through effective communications, strategic planning, and business collaboration, as you help us improve our ability to detect and quickly address incidents across our multi-cloud product and enterprise environments.
You’ll frequently interact with security leadership, Product Engineering, IT infrastructure, application security as well as compliance.
This role requires you to work US hours.
This role requires you to work US hours.
- 11pm to 8am IST OR 10pm to 7am IST
What you'll do
- Drive the alert triage and security analysis for New Relic covering our product and crucial enterprise services
- Collaborate with our security engineering personnel to define playbooks, action on security events/incidents as well as debrief and implement IR improvements
- Support the development and execution of roadmap for automation and orchestration to help scale and mature our response activities
- Provide leadership and mentoring to our security engineers to help develop and advance our people professionally
- Effectively identify, create solution proposals for, and communicate cybersecurity shortcomings/risks to Director and Senior Director level leaders.
- Aid in the monitoring and detection strategies enterprise-wide.
- Aid in post-incident response follow-up actions to ensure we do not repeat mistakes from one incident to another, and we implement best practices as identified throughout a response and its follow-up.
- Provide leadership and mentorship to Cybersecurity personnel as needed to develop a world-class cybersecurity team.
- Work with other CDIR teams and other key stakeholders cross-functionally to establish and refine IR, Shift Left, etc. processes and procedures
- Ensure the Security Operations team and certain global partners are organized, trained, and equipped to resolve security operations issues
- Development of additional capabilities to proactively reduce overall cyber threat risk to the company.
- Development of Threat Hunt maturity capabilities by integrating Threat Intelligence into overall defense ecosystem and use of automated workflows
- Spearheading improvement of overall detection maturity to identify new or undetected cyber threats and reduce overall dwell period
- Managing night shift operations to monitor and assess emerging threats, campaigns and Threat Groups to prioritize actionable intelligence and proactively hunt for malicious Tactics, Techniques, and Procedures (TTPs)
This role requires
- Willingness to work in night shift
- 2+ years of team leadership experience including people management experience
- Bachelor's Degree or equivalent experience
- 3+ years experience working in areas such as, Detection and Incident Response, Detection Engineering, Digital Forensics, Penetration Testing, Threat Hunting
- Ability to summarize events and incidents effectively to both technical and non-technical audiences including executives and legal counsel
- Practical experience of using cyber security frameworks, such as the Cyber Kill Chain and MITRE ATT&CK to build intelligence-driven hypotheses/use cases for proactive Threat Hunting
Bonus points if you have
- Sophisticated understanding of attack scenarios that impact cloud environments (AWS, Azure, GCP) as well as PaaS and SaaS implementations
- Deep knowledge of MITRE ATT&CK and experience adopting this framework
- Proven experience serving as Incident Responder cum Team leader
- Proven experience working in a SaaS company