VP, Security Monitoring and Response

Thrive Logo

Thrive

πŸ“Remote - Worldwide

Summary

Join Thrive, a rapidly growing technology solutions provider, as the VP, Security Monitoring and Response. Lead and guide core security monitoring and incident response efforts, ensuring strategic security plans are implemented within the Security Operations Center (SOC) and Cybersecurity Incident Response Team (CIRT). Oversee 24x7 monitoring, threat detection, and incident handling. Manage and mentor SOC and CIRT teams, ensuring performance and alignment with security goals. Own critical security escalations, working directly with customers to resolve issues. Integrate threat intelligence to improve threat detection and develop better detection methods. This role is central to strengthening Thrive's ability to identify and react to security threats, safeguarding clients' digital assets and operational continuity.

Requirements

  • Bachelor's degree in Cybersecurity, Information Technology, or related discipline is preferred
  • At least 5 years of leadership experience managing cybersecurity teams, with a proven track record in leading SOC and incident response functions
  • Excellent communication and leadership skills
  • Deep understanding of incident response frameworks and best practices
  • Excellent communication skills, both written and verbal
  • Ability to translate complex security concepts and risks into business terms

Responsibilities

  • Oversee the implementation of the strategic initiatives for the Security Operations Center and the Cybersecurity Incident Response Team (CIRT)
  • Lead, mentor, and develop the SOC and CIRT teams ensuring their strategic alignment and operational effectiveness
  • Oversee the monitoring, analysis and triaging of security events
  • Ensure compliance to Service Level Agreement, process adherence and process improvement to achieve operational objectives
  • Ensure the 24x7 SOC operates effectively, focusing on security event monitoring, analysis, and initial triage
  • Own and manage critical security escalation processes, ensuring timely communication and resolution for customers
  • Oversee the incident response program, ensuring all security incidents are handled efficiently from detection to resolution
  • Provide strategic guidance for detection engineering, working with other teams to improve our ability to find threats
  • Define and track key metrics (KPIs) for the SOC and CIRT teams to measure performance and find areas for improvement
  • Report on the status of security operations and key incidents to senior leadership
  • Ensure relevant cyber threat intelligence (CTI) is integrated into daily security monitoring and incident response operations
  • Ability to adjust priorities and balance responsibilities in a fast-paced environment
  • Engage with customers as necessary to understand their needs and drive service improvement initiatives
  • Other duties as required

Preferred Qualifications

Relevant certifications such as CISSP, CISM, or similar are preferred

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Remote Jobs