Hispanic Alliance for Career Enhancement
Associate Director, Cybersecurity Operations
Hispanic Alliance for Career Enhancement, Rahway, New Jersey, us, 07065
Job Description
The ideal candidate for this role will be an experienced incident response analyst with extensive detection development experience across various enterprise technologies. This individual will be responsible for designing, developing and enhancing threat detection capabilities across the organization’s detection platforms while providing incident response experience during critical incidents and providing mentorship to junior analysts. The primary focus for this role will be the creation and optimization of threat detection use cases, leveraging advanced tools and techniques to identify and mitigate cyber threats in real time through collaboration with cross‑functional teams to ensure that the threat detection solutions align with the organization’s security strategy. This position will consider remote work approval for the right candidate.
Essential Responsibilities
Design and implement advanced detection architectures across the organization's security landscape, utilizing SIEM, EDR, XDR and cloud security platforms.
Lead the development and refinement of complex, high‑fidelity detection use cases, custom correlation rules, and detection models tailored to the organization's unique risk profile and threat landscape.
Continuously enhance and optimize detection techniques, reducing alert fatigue and improving detection accuracy.
Identify and develop improvement initiatives within the Detection and Response team, implementing best practices and optimizing processes to enhance security capabilities.
Lead investigations into critical incidents, coordinate containment and eradication activities, and ensure recovery aligns with NIST incident response framework principles.
Leverage SOAR platforms to automate triage, enrichment, and response workflows for improved Incident Response efficiency.
Utilize AI‑based tools such as Agentic AI and Co‑pilot to enhance investigation speed, threat hunting, and reporting accuracy.
Leverage MDR capabilities to enhance detection and response workflows and streamline investigation prioritization.
Use endpoint protection and diagnostic tools such as Microsoft Defender for Endpoint (MDE) and CrowdStrike to conduct forensic analysis and validate root causes.
Partner with internal stakeholders, leadership, and external partners to provide situational awareness and actionable recommendations.
Support junior analysts through coaching, technical guidance, and knowledge sharing to build overall Incident Response capability and mature the threat detection posture.
Core Competencies
Expert understanding of attack lifecycles, network telemetry, endpoint data, and adversarial tactics mapped to MITRE ATT&CK.
Proven ability to lead the full incident lifecycle, following NIST best practices from identification through post‑incident recovery.
Ability to design and optimize automated response workflows in SOAR tools to reduce response time and analyst fatigue.
Comfortable integrating AI and machine learning tools into investigative processes to improve detection accuracy and reduce false positives.
Understands the business impact of identified threats and aligns response actions to minimize operational risk.
Proactively evaluates emerging technologies and integrates them into Incident Response operations.
Technical Knowledge & Skills
Experience with SIEM platforms such as Microsoft Sentinel for event correlation and detection engineering.
Strong knowledge of SOAR technologies for orchestration and response automation.
Familiarity with endpoint detection and response (EDR) tools such as MDE, CrowdStrike and Sysinternals.
Working knowledge of AI‑powered analysis and automation tools including Agentic AI and Co‑pilot.
Understanding of key cybersecurity frameworks and standards: NIST Incident Response Framework, MITRE ATT&CK, and ISO 27001.
Experience with scripting languages including python and PowerShell.
Strong knowledge of Windows Active Directory Environment and cloud computing architectures.
Experience conducting forensic analysis, log correlation, and root cause investigations.
Strong communication skills to convey findings to technical and non‑technical audiences.
Minimum Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
5+ years of experience in IR operations, intrusion detection, or incident response.
Experience developing detection rules, playbooks, and automation workflows.
Demonstrated experience leading complex investigations and coordinating cross‑functional response efforts.
Preferred Qualifications
Advanced certifications: GIAC (GCIH, GCFA, etc.).
5+ years of experience in Detection Engineering roles for large organizations.
Hands‑on experience with cloud‑native security tooling and hybrid SOC environments.
Leadership Expectations
Ability to work collaboratively across teams; foster an environment where associates thrive and perform at their best.
Model ethical conduct, transparency, and accountability in every action; ensure compliance with cybersecurity and data privacy standards.
Demonstrate curiosity, adaptability, and a growth mindset. Encourage innovation, learning, and continuous improvement across IR operations.
Required Skills Adaptability, Analytical Thinking, Business Strategies, Coaching and Development, Cybersecurity Operations, Cyber Threat Intelligence, Data Loss Prevention (DLP), Decision Making, Detail‑Oriented, Digital Forensics, Governance Management, Incident Response Management, Insider Threat Mitigation, Leadership, Log Analysis, Malware Analysis, Management Process, Penetration Testing, People Leadership, Risk Management, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, SLA Management, and more.
Preferred Skills Incident Response.
Equal Employment Opportunity Statement As an Equal Employment Opportunity Employer, we provide equal opportunities to all employees and applicants for employment and prohibit discrimination on the basis of race, color, age, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or other applicable legally protected characteristics. As a federal contractor, we comply with all affirmative action requirements for protected veterans and individuals with disabilities. For more information about personal rights under U.S. Equal Opportunity Employment laws, visit EEOC Know Your Rights, EEOC GINA Supplement. We are proud to be a company that embraces the value of bringing together talented, and committed people with diverse experiences, perspectives, skills and backgrounds. The fastest way to breakthrough innovation is when people with diverse ideas, broad experiences, backgrounds, and skills come together in an inclusive environment. We encourage our colleagues to respectfully challenge one another’s thinking and approach problems collectively.
#J-18808-Ljbffr
Essential Responsibilities
Design and implement advanced detection architectures across the organization's security landscape, utilizing SIEM, EDR, XDR and cloud security platforms.
Lead the development and refinement of complex, high‑fidelity detection use cases, custom correlation rules, and detection models tailored to the organization's unique risk profile and threat landscape.
Continuously enhance and optimize detection techniques, reducing alert fatigue and improving detection accuracy.
Identify and develop improvement initiatives within the Detection and Response team, implementing best practices and optimizing processes to enhance security capabilities.
Lead investigations into critical incidents, coordinate containment and eradication activities, and ensure recovery aligns with NIST incident response framework principles.
Leverage SOAR platforms to automate triage, enrichment, and response workflows for improved Incident Response efficiency.
Utilize AI‑based tools such as Agentic AI and Co‑pilot to enhance investigation speed, threat hunting, and reporting accuracy.
Leverage MDR capabilities to enhance detection and response workflows and streamline investigation prioritization.
Use endpoint protection and diagnostic tools such as Microsoft Defender for Endpoint (MDE) and CrowdStrike to conduct forensic analysis and validate root causes.
Partner with internal stakeholders, leadership, and external partners to provide situational awareness and actionable recommendations.
Support junior analysts through coaching, technical guidance, and knowledge sharing to build overall Incident Response capability and mature the threat detection posture.
Core Competencies
Expert understanding of attack lifecycles, network telemetry, endpoint data, and adversarial tactics mapped to MITRE ATT&CK.
Proven ability to lead the full incident lifecycle, following NIST best practices from identification through post‑incident recovery.
Ability to design and optimize automated response workflows in SOAR tools to reduce response time and analyst fatigue.
Comfortable integrating AI and machine learning tools into investigative processes to improve detection accuracy and reduce false positives.
Understands the business impact of identified threats and aligns response actions to minimize operational risk.
Proactively evaluates emerging technologies and integrates them into Incident Response operations.
Technical Knowledge & Skills
Experience with SIEM platforms such as Microsoft Sentinel for event correlation and detection engineering.
Strong knowledge of SOAR technologies for orchestration and response automation.
Familiarity with endpoint detection and response (EDR) tools such as MDE, CrowdStrike and Sysinternals.
Working knowledge of AI‑powered analysis and automation tools including Agentic AI and Co‑pilot.
Understanding of key cybersecurity frameworks and standards: NIST Incident Response Framework, MITRE ATT&CK, and ISO 27001.
Experience with scripting languages including python and PowerShell.
Strong knowledge of Windows Active Directory Environment and cloud computing architectures.
Experience conducting forensic analysis, log correlation, and root cause investigations.
Strong communication skills to convey findings to technical and non‑technical audiences.
Minimum Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
5+ years of experience in IR operations, intrusion detection, or incident response.
Experience developing detection rules, playbooks, and automation workflows.
Demonstrated experience leading complex investigations and coordinating cross‑functional response efforts.
Preferred Qualifications
Advanced certifications: GIAC (GCIH, GCFA, etc.).
5+ years of experience in Detection Engineering roles for large organizations.
Hands‑on experience with cloud‑native security tooling and hybrid SOC environments.
Leadership Expectations
Ability to work collaboratively across teams; foster an environment where associates thrive and perform at their best.
Model ethical conduct, transparency, and accountability in every action; ensure compliance with cybersecurity and data privacy standards.
Demonstrate curiosity, adaptability, and a growth mindset. Encourage innovation, learning, and continuous improvement across IR operations.
Required Skills Adaptability, Analytical Thinking, Business Strategies, Coaching and Development, Cybersecurity Operations, Cyber Threat Intelligence, Data Loss Prevention (DLP), Decision Making, Detail‑Oriented, Digital Forensics, Governance Management, Incident Response Management, Insider Threat Mitigation, Leadership, Log Analysis, Malware Analysis, Management Process, Penetration Testing, People Leadership, Risk Management, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, SLA Management, and more.
Preferred Skills Incident Response.
Equal Employment Opportunity Statement As an Equal Employment Opportunity Employer, we provide equal opportunities to all employees and applicants for employment and prohibit discrimination on the basis of race, color, age, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or other applicable legally protected characteristics. As a federal contractor, we comply with all affirmative action requirements for protected veterans and individuals with disabilities. For more information about personal rights under U.S. Equal Opportunity Employment laws, visit EEOC Know Your Rights, EEOC GINA Supplement. We are proud to be a company that embraces the value of bringing together talented, and committed people with diverse experiences, perspectives, skills and backgrounds. The fastest way to breakthrough innovation is when people with diverse ideas, broad experiences, backgrounds, and skills come together in an inclusive environment. We encourage our colleagues to respectfully challenge one another’s thinking and approach problems collectively.
#J-18808-Ljbffr