"I can succeed as a Cyber Security Incident Response Team Manager at Capital Group."
We are seeking a highly technical and hands-on Incident Response Manager to lead our 24 / 7 global team of analysts responsible for monitoring, detecting, and responding to cybersecurity incidents. This role combines leadership, technical expertise, and operational excellence in a fast-paced environment. You will manage incident response activities, enforce playbooks and policies, and serve as a point of escalation during critical events.
The ideal candidate is a strong leader with advanced technical skills, coding ability, and experience in security operations and incident response. You will work closely with cybersecurity leadership, IT, and business stakeholders to ensure incidents are prioritized, investigated, and remediated effectively.
"I am the person Capital Group is looking for."
Lead and mentor a globally distributed team of security analysts and engineers responsible for initial detection, triage, containment, and advanced investigation of security incidents.
Serve as incident commander and escalation point for high-severity incidents, including ransomware, account compromise, phishing, and data leakage.
Architect and automate Integrate AI / ML-driven threat detection and behavioral analytics into IR processes. Design incident response workflows using SOAR platforms and custom scripting (Python, PowerShell, Bash, etc.) to improve mean time to respond (MTTR).
Implement and enforce IR playbooks, policies, and best practices aligned with NIST and MITRE ATT&CK frameworks.
Coordinate cross-functional response with IT, developers, legal, privacy, and business continuity teams.
Analyze and prioritize complex incidents, ensuring adherence to SLAs and regulatory / privacy requirements.
Continuously improve detection, response, and reporting processes through metrics, trends, KPIs, KRI's and post-incident reviews
Conduct tabletop exercises and oversee vulnerability and penetration testing assessments to identify gaps.
Stay current with emerging threats, attacker TTPs, and integrate threat intelligence into response strategies.
Foster a culture of learning and technical excellence, supporting team certifications and hands-on development.
Qualifications :
7+ years in cybersecurity (SOC and IR), including 3+ years in a leadership role.
Bachelor's degree in Cybersecurity, Computer Science, or related field preferred.
Certifications such as GCIH, GCFA, GCFE, CISSP, OSCP, or equivalent highly desirable.
Proven ability to lead distributed teams under pressure and in high-stakes environments.
Hands-on coding in Python (preferred), PowerShell, Bash, or similar languages.
Proven expertise with traditional and Next-Generation SIEM platforms such as Splunk, Sentinel, QRadar, Exabeam, and CrowdStrike Falcon.
Strong proficiency in SQL and query optimization across modern data lake platforms (e.g., Snowflake, Databricks, Azure Data Lake).
Familiarity with Cribl LogStream, data normalization, and enrichment strategies for high-fidelity alerting.
Advanced knowledge of attacker methods (escalation, lateral movement, TTPs).
Familiarity with cloud IR (AWS, Azure) and hybrid environments.
Strong understanding of forensic analysis, malware reverse engineering, and threat hunting.
Exceptional organizational, communication, and decision-making abilities.
Proven ability to foster team well-being, prevent burnout, and support professional growth.
Ability to remain calm under pressure and manage team well-being.
Experience in building dashboards, metrics, and reporting frameworks.
Southern California Base Salary Range : $173,211-$277,138
San Antonio Base Salary Range : $142,394-$227,830
New York Base Salary Range : $183,613-$293,781
In addition to a highly competitive base salary, per plan guidelines, restrictions and vesting requirements, you also will be eligible for an individual annual performance bonus, plus Capital's annual profitability bonus plus a retirement plan where Capital contributes 15% of your eligible earnings.
You can learn more about our compensation and benefits here .
We are an equal opportunity employer, which means we comply with all federal, state and local laws that prohibit discrimination when making all decisions about employment. As equal opportunity employers, our policies prohibit unlawful discrimination on the basis of race, religion, color, national origin, ancestry, sex (including gender and gender identity), pregnancy, childbirth and related medical conditions, age, physical or mental disability, medical condition, genetic information, marital status, sexual orientation, citizenship status, AIDS / HIV status, political activities or affiliations, military or veteran status, status as a victim of domestic violence, assault or stalking or any other characteristic protected by federal, state or local law.
Security Incident Response • Irvine, CA, United States