DescriptionFortive is seeking a seasoned Cyber Defense Principal to spearhead our Security Operations Center (SOC) capability; including Crisis Management Incident Response Threat Intelligence and Detection Engineering. The ideal candidate will be a hands-on technical expert who wants to split time between technical triage and tier-4 response with shaping the overall defensive capability globally. This role needs a strategic architect capable of designing and optimizing our cyber defense mechanisms to safeguard our infrastructure.
Responsibilities:
- Lead the operational and technical aspects of the Security Operations Center (SOC) and Threat Intelligence
- Architect and oversee the integration of SOC Detection Engineering and Threat Intelligence processes
- Design and manage SOC infrastructure ensuring scalability and robustness
- Manage and triage complex or escalated security incidents
- Develop and implement advanced detection and response strategies across diverse environments including cloud on-premises and OT.
- Conduct threat analysis and develop actionable intelligence to preemptively mitigate risks
- Collaborate with cross-functional teams to enhance incident response protocols and improve security posture
- Stay abreast of emerging threats technologies and best practices to continuously refine our cyber defense strategy
Experience:
- Experience overseeing a world class managed service
- Extensive experience in managing SOC operations and leading threat intelligence initiatives
- Deep expertise in incident triage and complex incident management
- Proven ability to design and implement SOC infrastructure and integrate detection engineering workflows
- Strong understanding of cloud security principles and technologies (AWS Azure GCP)
- Proficiency in threat intelligence platforms and methodologies
- Experience with advanced security tools and frameworks such as MITRE ATT&CK
- Solid understanding of automation and scripting for security operations (Python PowerShell etc.)
- Excellent communication and leadership skills with the ability to collaborate effectively across teams
- Commitment to staying current with the latest cybersecurity trends and technologies
- Experience with forensic data collection and analysis concepts and technologies
Preferred Qualifications:
- Exposure to Crowdstrike Falcon & LogScale Splunk Proofpoint Palo Alto Zscaler Microsoft Defender/Purview
- Certifications such as GIAC GRTP GDAT or similar
- Exposure to forensic collection and analysis tools (EnCase Magnet AXIOM FTK Imager or similar)
If you are a proactive and visionary leader with a passion for cyber defense we invite you to apply and drive our mission to fortify our organizations security posture.
Required Experience:
Staff IC