Associate Director, Incident Response, Cybersecurity Operations
Remote - United States, United States
Working with Us
Challenging. Meaningful. Life-changing. Those arenât words that are usually associated with a job. But working at Bristol Myers Squibb is anything but usual. Here, uniquely interesting work happens every day, in every department. From optimizing a production line to the latest breakthroughs in cell therapy, this is work that transforms the lives of patients, and the careers of those who do it. Youâll get the chance to grow and thrive through opportunities uncommon in scale and scope, alongside high-achieving teams rich in diversity. Take your career farther than you thought possible.
Bristol Myers Squibb recognizes the importance of balance and flexibility in our work environment. We offer a wide variety of competitive benefits, services and programs that provide our employees with the resources to pursue their goals, both at work and in their personal lives. Read more: careers.bms.com/working-with-us.
SUMMARY:
The Associate Director of Incident Response will be responsible for assisting and actioning Cyber Incident Response within the BMS Cyber Fusion Center (CFC). This role is responsible for responding to alerts and incidents within the BMS enterprise and to aid in providing technical guidance to team members. The ideal candidate will be highly technical, with an ability to quickly provide leadership level summaries while potentially dealing with multiple incidents. This role may also require the candidate to provide support as an incident commander, if the need arises.Â
Â
POSITION RESPONSIBILITIES:
- Investigate and lead incident response incidents and investigations, end-to-endÂ
- Leverage EDR tools to investigate and identify malicious activity to determine root causeÂ
- Supporting IR investigations by using malware, log, and network analysisÂ
- Conducting some threat hunting to support investigationsÂ
- Working in Cloud platforms to conduct investigationsÂ
- Working with threat intelligence to identify tools, tactics, and procedures (TTP) and indicators of compromise (IOC)Â
- Providing expert opinion and insight into cyber related matters affecting BMSÂ
- Creating comprehensive analysis reports and potential after action reports, as neededÂ
- Communicating concisely and effectively with internal BMS stakeholdersÂ
- Support CFC leadership on cyber related issuesÂ
- Assist development of SOPâs and other necessary documentation for the CFCÂ Â
Â
DESIRED EXPERIENCE:
- At least 5 years of hand on experience in Incident Response Â
- At least 3 years of experience with SIEM, such as Sentinel or Splunk Â
- After hours escalation and on-call responsibilities can be expectedÂ
- MITRE ATT&CK framework knowledgeÂ
- Prior blue team IR exposure and analysisÂ
- Demonstrated SIEM platform alert analysis experience.Â
- Expert-level knowledge of common âŚ
This job isn't fresh anymore!
Search Fresh JobsJob Profile
Competitive benefits Flexibility Work-life balance
Tasks- Communicate with stakeholders
- Investigate incidents
- Lead incident response
- Provide technical guidance
Bash Cell Therapy Clinical trials Cloud platforms Collaboration EDR tools Encryption Event analysis Firewalls IDS/IPS Incident Response Leadership Log Analysis MacOS Malware Analysis MITRE ATT&CK Network Analysis Networking Technology Operations Presentation Proxies Python Reimbursement SIEM Technical Writing Threat Hunting Threat Intelligence Windows
Experience5 years
TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9