Incident Response Manager

Remote
Full Time
Experienced
Incident Response Manager
Location: Asia (Japan, China or Australia)
Salary Range:  $150K – 160K USD

About Centric Software:

Centric Software stands at the forefront of innovation, delivering cutting-edge PLM solutions tailored specifically for the retail, fashion, footwear, luxury, and consumer goods industries. Our enterprise software applications are designed to meet the unique challenges of the fast-moving consumer goods market, empowering businesses to manage, optimize, and execute their critical processes with ease.

From concept to production, our software solutions streamline the journey of bringing products to life. We support our customers in effectively managing materials, sourcing, quality, and pricing, ensuring every step leads to a successful final catalog. With Centric Software, businesses can navigate the complexities of product development with confidence and agility.  www.centricsoftware.com


Job Summary:
We are seeking an experienced and highly skilled Incident Response Manager to join our security operations team. This individual will serve as a subject matter expert and lead incident response efforts to mitigate and manage security incidents across a global enterprise. The Incident Response Manager will play a critical role in protecting the organization from cyber threats by leading response efforts, managing the incident lifecycle, and ensuring swift remediation. Strong communication skills and a customer-focused presence are vital to this role, as the manager will be required to engage with senior stakeholders and provide expert advice during high-pressure situations.

Key Responsibilities:
  • Lead and Manage Incident Response (IR): Take charge of major security incidents, coordinating resources, teams, and communication to resolve security breaches in an effective and timely manner.
  • Incident Detection & Triage: Oversee the identification and triage of security events, ensuring proper classification and prioritization of incidents based on severity and potential impact.
  • Develop and Implement IR Strategies: Continuously improve and refine the incident response process, incorporating lessons learned from previous incidents and industry best practices.
  • Root Cause Analysis: Conduct thorough post-incident analysis to determine the root cause of security incidents and implement measures to prevent recurrence.
  • Digital Forensic Expertise: Hands-on experience with forensic tools and methodologies for collecting, preserving, analyzing, and reporting on digital evidence.
 
  • Collaboration & Communication: Maintain clear communication with both technical and non-technical stakeholders, ensuring senior leadership, clients, and partners are informed throughout the incident response process.
  • Incident Reporting & Documentation: Ensure that all incidents are documented accurately, and reports are generated for stakeholders, including detailed timelines, impact assessments, and lessons learned.
  • Training & Awareness: Lead training efforts for internal teams and key stakeholders on incident response procedures, cybersecurity awareness, and proactive measures to reduce the likelihood of security incidents.
  • Customer Engagement: Work directly with customers, especially in high-stakes situations, providing guidance, support, and updates regarding incident response and resolution.
  • Vendor & Tool Management: Oversee and manage third-party vendors and tools utilized during the incident response process to ensure efficiency and cost-effectiveness.
  • Compliance & Regulatory Requirements: Ensure that all incident response efforts comply with applicable legal, regulatory, and contractual obligations.
Skills & Qualifications:
  • Minimum of 7+ years with main focus being Incident Response.
  • Has the ability to hit the ground running.
  • Deep understanding of security incident response methodologies, threat intelligence, and common cyber-attack vectors (e.g., ransomware, phishing, DDoS, malware, etc.).
  • Strong verbal and written communication skills with the ability to articulate complex technical issues to non-technical stakeholders.
  • Proven ability to manage customer relationships, especially during critical incidents, with a focus on customer satisfaction and resolution.
  • Familiarity with security technologies and tools, including SIEM, IDS/IPS, firewalls, endpoint protection, and forensic analysis tools.
  • Ability to maintain composure and leadership under pressure, ensuring timely and effective incident resolution.
  • Certifications such as CISSP, CISM, CISA, or GIAC (GCIH, GCFA) are required.

Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.

 

Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.

Share

Apply for this position

Required*
Apply with
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity and/or Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.