salesforce.com
Senior Manager, Information Security
Washington D.C. Metro Area, US - Computer Software, Information Technology and Services, Internet
Responsibilities:
Salesforce - the leader in enterprise cloud computing and one of the top 10 places to work according to Fortune magazine - is seeking a senior manager to lead US operations for our Computer Security Incident Response team (CSIRT).
The CSIRT is responsible for 24x7x365 security monitoring and rapid incident response across all salesforce.com environments. We are the 'tip of the spear' and the last line of defense protecting company and customer data from our adversaries.
The Senior Manager is responsible for leading CSIRT operations during US coverage hours, including:
- Managing a team of high-performing security incident handlers, including performance management, career development, and mentoring.
- Ensuring that all operational issues that occur during local hours are assigned and handled by an in-region incident handler within established SLAs and with a high degree of quality.
- Leading significant CSIRT projects, focused on enhancements to detection and incident response capabilities and other improvements to core CSIRT workflow/process/documentation.
- Working effectively as part of a geographically distributed team.
Required Skills:
- 5+ years of prior specialized security operations experience consisting of either:
- Operational experience monitoring devices such as network and host-based intrusion detection systems, web application firewalls, database security monitoring systems, firewalls/routers/switches, proxy servers, antivirus systems, file integrity monitoring tools, and operating system logs.
- Operational experience responding to security incidents in a production environment, such as investigating and remediating possible endpoint malware infections and mitigating e-mail borne threats such as spam and phishing.
- 3+ years of management/leadership experience.
- Strong technical understanding of the information security threat landscape (attack vectors and tools, best practices for securing systems and networks, etc.).
- The ability to build strong relationships with peers both internal and external to your functional group, and with peers/professional organizations outside your company.
- The ability to recruit, train and retain highly qualified individual contributors.
- Strong verbal and written communication skills; ability to communicate effectively and clearly to both technical and non-technical audiences.
Desired Skills:
- Experience configuring security incident and event management tools (such as ARCSight, Symantec SIM, LogLogic), including creating event filtering and correlation rules and reports.
- System forensics/investigation skills, including analyzing system artifacts (file system, memory, running processes, network connections) for indicators of infection/compromise.
- Prior experience in a 24x7x365 operations environment.
- Relevant information security certifications, such as CISSP, SANS GCIA, SANS GCIH, SANS GPEN, SANS GFCA, Offensive Security OSCP.
No salary provided
Posted December 01, 2014 at 03:34AM from LinkedIn http://ift.tt/1pFksX1
via IFTTT
No comments:
Post a Comment