About the role:
We are seeking a Cyber Incident Response Manager to strengthen and scale Fevers global security posture across both cloud and corporate IT this role you will mature our end-to-end incident response lifecycle and elevate our security operations capabilities to protect a fast-moving high-growth global organization. You will lead the enhancement of detection engineering refine incident response processes and runbooks and extend security coverage into new operational areas.
Additionally you will help grow and empower a specialized team focused on reducing response and containment times while driving continuous improvements in detection logic automation and tooling.
What would you do at Fever
On your first month in Fever:
You will:
- Be fully integrated into the team. You will participate in planning and follow-up meetings with other areas.
- Have met the departments of Fever.
- Get familiar with Fevers technological structure and ecosystem (applications infrastructure architecture etc.)
- Gain a deep understanding of Fevers cloud infrastructure security stack and current IR processes.
After 3 months in Fever:
You will:
- Assess the current cyber incident response posture threat detections and monitoring capabilities.
- Conduct a maturity assessment of IR processes for our cloud service providers (e.g. AWS) and other critical platforms.
- Review existing runbooks and identify gaps or areas for rapid improvement.
- Lead cross-functional tabletop exercises with engineering data and operations teams.
On your 6th month in Fever:
You will:
- Build a prioritized action plan for strengthening transversal incident response across teams.
- Operate a mature measurable and scalable incident response process.
- Deliver improved detection logic and automation that reduces mean time to identify contain and mitigate incidents.
- Propose new detection strategies and execute improvements to threat intelligence and monitoring coverage.
- Optimize KPIs and expand reporting to ensure progress against security objectives.
Key responsibilities
- Strengthen and scale the incident response program.
- Design update and maintain IR processes playbooks and runbooks tailored to cloud and corporate IT environments.
- Enhance detection engineering capabilities by collaborating with infrastructure data and engineering teams.
- Lead response coordination efforts during incidents ensuring rapid containment eradication and recovery.
- Enhance monitoring and detection with integrated threat intelligence and advanced threat detection capabilities.
- Manage and mentor a specialized incident response team.
- Continuously assess and improve IR metrics KPIs dashboards and reporting methodologies.
- Conduct IR training simulations and preparedness exercises across the organization.
About you
Must have:
- Strong understanding of modern security tooling including SOAR platforms cloud-native detection services EDR solutions (e.g. CrowdStrike) SIEM platforms and automation technologies.
- Skilled in analyzing and correlating large-scale security telemetry across cloud SaaS and endpoint sources using languages and tools such as Python AWS Athena Google BigQuery etc.
- Ability to rapidly automate data handling detection logic and remediation workflows.
- Hands-on experience responding to security incidents in cloud environments.
- Ability to design document and maintain IR runbooks playbooks and tabletop exercises.
- 5 years of experience in cybersecurity with at least 23 years dedicated to leading an incident response process.
- Fluent in English (written and spoken).
- Analytical mindset and strong problem-solving skills.
- Excellent communication skills.
It would be a plus if you have:
- Bachelor or Masters Degree in Computer Science Information Security or another similar relevant degree (or equivalent experience in a technical security role).
- Professional certifications demonstrating technical IR expertise and cloud security proficiency such as GCIH GCIA GCFA GEIR AWS Security Specialty or similar industry-recognized credentials.
Benefits & Perks
- Opportunity to have a real impact in a high-growth global category leader
- 40% discount on all Fever events and experiences
- Position based in Madrid home office friendly.
- Relocation package for international candidates
- Responsibility from day one and professional and personal growth
- Great work environment with a young international team of talented people to work with!
- Health insurance and other benefits such as Flexible remuneration with a 100% tax exemption through Cobee.
- English Lessons
- Gympass Membership
- Possibility to receive in advance part of your salary by Payflow.
- Attractive compensation package consisting of base salary and the potential to earn a significant bonus for top performance.
Required Experience:
Manager
About the role:We are seeking a Cyber Incident Response Manager to strengthen and scale Fevers global security posture across both cloud and corporate IT this role you will mature our end-to-end incident response lifecycle and elevate our security operations capabilities to protect a fast-moving hi...
About the role:
We are seeking a Cyber Incident Response Manager to strengthen and scale Fevers global security posture across both cloud and corporate IT this role you will mature our end-to-end incident response lifecycle and elevate our security operations capabilities to protect a fast-moving high-growth global organization. You will lead the enhancement of detection engineering refine incident response processes and runbooks and extend security coverage into new operational areas.
Additionally you will help grow and empower a specialized team focused on reducing response and containment times while driving continuous improvements in detection logic automation and tooling.
What would you do at Fever
On your first month in Fever:
You will:
- Be fully integrated into the team. You will participate in planning and follow-up meetings with other areas.
- Have met the departments of Fever.
- Get familiar with Fevers technological structure and ecosystem (applications infrastructure architecture etc.)
- Gain a deep understanding of Fevers cloud infrastructure security stack and current IR processes.
After 3 months in Fever:
You will:
- Assess the current cyber incident response posture threat detections and monitoring capabilities.
- Conduct a maturity assessment of IR processes for our cloud service providers (e.g. AWS) and other critical platforms.
- Review existing runbooks and identify gaps or areas for rapid improvement.
- Lead cross-functional tabletop exercises with engineering data and operations teams.
On your 6th month in Fever:
You will:
- Build a prioritized action plan for strengthening transversal incident response across teams.
- Operate a mature measurable and scalable incident response process.
- Deliver improved detection logic and automation that reduces mean time to identify contain and mitigate incidents.
- Propose new detection strategies and execute improvements to threat intelligence and monitoring coverage.
- Optimize KPIs and expand reporting to ensure progress against security objectives.
Key responsibilities
- Strengthen and scale the incident response program.
- Design update and maintain IR processes playbooks and runbooks tailored to cloud and corporate IT environments.
- Enhance detection engineering capabilities by collaborating with infrastructure data and engineering teams.
- Lead response coordination efforts during incidents ensuring rapid containment eradication and recovery.
- Enhance monitoring and detection with integrated threat intelligence and advanced threat detection capabilities.
- Manage and mentor a specialized incident response team.
- Continuously assess and improve IR metrics KPIs dashboards and reporting methodologies.
- Conduct IR training simulations and preparedness exercises across the organization.
About you
Must have:
- Strong understanding of modern security tooling including SOAR platforms cloud-native detection services EDR solutions (e.g. CrowdStrike) SIEM platforms and automation technologies.
- Skilled in analyzing and correlating large-scale security telemetry across cloud SaaS and endpoint sources using languages and tools such as Python AWS Athena Google BigQuery etc.
- Ability to rapidly automate data handling detection logic and remediation workflows.
- Hands-on experience responding to security incidents in cloud environments.
- Ability to design document and maintain IR runbooks playbooks and tabletop exercises.
- 5 years of experience in cybersecurity with at least 23 years dedicated to leading an incident response process.
- Fluent in English (written and spoken).
- Analytical mindset and strong problem-solving skills.
- Excellent communication skills.
It would be a plus if you have:
- Bachelor or Masters Degree in Computer Science Information Security or another similar relevant degree (or equivalent experience in a technical security role).
- Professional certifications demonstrating technical IR expertise and cloud security proficiency such as GCIH GCIA GCFA GEIR AWS Security Specialty or similar industry-recognized credentials.
Benefits & Perks
- Opportunity to have a real impact in a high-growth global category leader
- 40% discount on all Fever events and experiences
- Position based in Madrid home office friendly.
- Relocation package for international candidates
- Responsibility from day one and professional and personal growth
- Great work environment with a young international team of talented people to work with!
- Health insurance and other benefits such as Flexible remuneration with a 100% tax exemption through Cobee.
- English Lessons
- Gympass Membership
- Possibility to receive in advance part of your salary by Payflow.
- Attractive compensation package consisting of base salary and the potential to earn a significant bonus for top performance.
Required Experience:
Manager
View more
View less