Incident Response Manager Location: Asia (Japan, China or Australia) Salary Range: $150K – 160K USD
About Centric Software:
Centric Software stands at the forefront of innovation, delivering cutting-edge PLM solutions tailored specifically for the retail, fashion, footwear, luxury, and consumer goods industries. Our enterprise software applications are designed to meet the unique challenges of the fast-moving consumer goods market, empowering businesses to manage, optimize, and execute their critical processes with ease.
From concept to production, our software solutions streamline the journey of bringing products to life. We support our customers in effectively managing materials, sourcing, quality, and pricing, ensuring every step leads to a successful final catalog. With Centric Software, businesses can navigate the complexities of product development with confidence and agility. www.centricsoftware.com
Job Summary: We are seeking an experienced and highly skilled Incident Response Manager to join our security operations team. This individual will serve as a subject matter expert and lead incident response efforts to mitigate and manage security incidents across a global enterprise. The Incident Response Manager will play a critical role in protecting the organization from cyber threats by leading response efforts, managing the incident lifecycle, and ensuring swift remediation. Strong communication skills and a customer-focused presence are vital to this role, as the manager will be required to engage with senior stakeholders and provide expert advice during high-pressure situations.
Key Responsibilities:
Lead and Manage Incident Response (IR): Take charge of major security incidents, coordinating resources, teams, and communication to resolve security breaches in an effective and timely manner.
Incident Detection & Triage: Oversee the identification and triage of security events, ensuring proper classification and prioritization of incidents based on severity and potential impact.
Develop and Implement IR Strategies: Continuously improve and refine the incident response process, incorporating lessons learned from previous incidents and industry best practices.
Root Cause Analysis: Conduct thorough post-incident analysis to determine the root cause of security incidents and implement measures to prevent recurrence.
Digital Forensic Expertise:Hands-on experience with forensic tools and methodologies for collecting, preserving, analyzing, and reporting on digital evidence.
Collaboration & Communication: Maintain clear communication with both technical and non-technical stakeholders, ensuring senior leadership, clients, and partners are informed throughout the incident response process.
Incident Reporting & Documentation: Ensure that all incidents are documented accurately, and reports are generated for stakeholders, including detailed timelines, impact assessments, and lessons learned.
Training & Awareness: Lead training efforts for internal teams and key stakeholders on incident response procedures, cybersecurity awareness, and proactive measures to reduce the likelihood of security incidents.
Customer Engagement: Work directly with customers, especially in high-stakes situations, providing guidance, support, and updates regarding incident response and resolution.
Vendor & Tool Management: Oversee and manage third-party vendors and tools utilized during the incident response process to ensure efficiency and cost-effectiveness.
Compliance & Regulatory Requirements: Ensure that all incident response efforts comply with applicable legal, regulatory, and contractual obligations.
Skills & Qualifications:
Minimum of 7+ years with main focus being Incident Response.
Has the ability to hit the ground running.
Deep understanding of security incident response methodologies, threat intelligence, and common cyber-attack vectors (e.g., ransomware, phishing, DDoS, malware, etc.).
Strong verbal and written communication skills with the ability to articulate complex technical issues to non-technical stakeholders.
Proven ability to manage customer relationships, especially during critical incidents, with a focus on customer satisfaction and resolution.
Familiarity with security technologies and tools, including SIEM, IDS/IPS, firewalls, endpoint protection, and forensic analysis tools.
Ability to maintain composure and leadership under pressure, ensuring timely and effective incident resolution.
Certifications such as CISSP, CISM, CISA, or GIAC (GCIH, GCFA) are required.
Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.
Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.