Guardian Life
Head of Cyber Incident Response & Cyber Threat Mitigation Services
Guardian Life, Holmdel, New Jersey, United States
Position Overview
Are you interested in leading a team responsible for cyber incident response and threat mitigation? We seek a candidate with strong analytical, leadership, and communication skills, and a curiosity for threat reduction efforts.
The ideal candidate is a collaborative self-starter with technical expertise, knowledge of security attack methods (e.g., MITRE), and the ability to inspire and develop talent. They will partner across the organization to drive incident identification, containment, investigation, response, and recovery, embodying Guardian’s principles of growth, operational excellence, customer focus, and change leadership.
Qualifications:
7+ years of broad and deep technology experience, including public clouds
3+ years of leadership experience in a security role, preferably with incident response
Experience with incident response methodologies and evidence handling
Strong communication skills, both written and oral
Experience collaborating across functions such as legal, HR, communications, and IT
Analytical mindset and curiosity
Knowledge of threat hunting, risk mitigation, and security frameworks (e.g., NIST CSF, MITRE)
Understanding of malware analysis, attack types, vulnerabilities, and insider threat concepts
Experience with financial services or regulated environments and US privacy laws
Ability to process and translate cyber threat intelligence into mitigation strategies
Proven leadership of diverse, high-performing teams
Knowledge of SIEM tools (preferably Splunk), logging, monitoring, and UBA concepts
Relevant degrees or certifications, and a commitment to continuous learning
Responsibilities:
Lead a team of cybersecurity incident response and threat mitigation professionals
Oversee planning, design, and operation of Guardian’s incident response and threat mitigation efforts
Manage the Corporate Incident Response Team and coordinate actions across teams
Develop and maintain incident response plans, playbooks, and communication protocols
Coordinate with business continuity/disaster recovery teams for large events
Lead triage and investigation of security incidents from the SOC
Manage third-party incident responders and coordinate exercises
Ensure quality and timely incident documentation and reporting
Drive user behavior analytics and improve logging/monitoring processes
Identify gaps and opportunities in security processes
Facilitate cross-departmental collaboration on security issues
Communicate effectively across organizational levels
Provide technical guidance on security controls and risk mitigation
Contribute to cybersecurity strategy, vendor management, and talent development
Support data loss prevention initiatives
Mentor staff and support their career growth
Recommend security technology improvements and respond to audit requests
Location & Travel:
Three days a week at a Guardian office in Holmdel, NJ, Bethlehem, PA, or New York, NY
Approximately 20% travel to other Guardian locations
Reporting:
Reports to Guardian’s Chief Information Security Officer.
Salary Range:
$148,940 - $244,685, commensurate with experience and qualifications. Additional incentives may apply.
Our Promise & Benefits:
Guardian offers support, flexibility, and development opportunities, including a diverse and inclusive environment, with benefits outlined at
our website . Interns are not eligible for most benefits.
Equal Opportunity & Accommodations:
Guardian is committed to equal employment opportunity and providing reasonable accommodations for individuals with disabilities. Contact
applicant_accommodation@glic.com
for assistance.
Current employees should apply through the internal Jobs Hub in Workday.
#J-18808-Ljbffr
Are you interested in leading a team responsible for cyber incident response and threat mitigation? We seek a candidate with strong analytical, leadership, and communication skills, and a curiosity for threat reduction efforts.
The ideal candidate is a collaborative self-starter with technical expertise, knowledge of security attack methods (e.g., MITRE), and the ability to inspire and develop talent. They will partner across the organization to drive incident identification, containment, investigation, response, and recovery, embodying Guardian’s principles of growth, operational excellence, customer focus, and change leadership.
Qualifications:
7+ years of broad and deep technology experience, including public clouds
3+ years of leadership experience in a security role, preferably with incident response
Experience with incident response methodologies and evidence handling
Strong communication skills, both written and oral
Experience collaborating across functions such as legal, HR, communications, and IT
Analytical mindset and curiosity
Knowledge of threat hunting, risk mitigation, and security frameworks (e.g., NIST CSF, MITRE)
Understanding of malware analysis, attack types, vulnerabilities, and insider threat concepts
Experience with financial services or regulated environments and US privacy laws
Ability to process and translate cyber threat intelligence into mitigation strategies
Proven leadership of diverse, high-performing teams
Knowledge of SIEM tools (preferably Splunk), logging, monitoring, and UBA concepts
Relevant degrees or certifications, and a commitment to continuous learning
Responsibilities:
Lead a team of cybersecurity incident response and threat mitigation professionals
Oversee planning, design, and operation of Guardian’s incident response and threat mitigation efforts
Manage the Corporate Incident Response Team and coordinate actions across teams
Develop and maintain incident response plans, playbooks, and communication protocols
Coordinate with business continuity/disaster recovery teams for large events
Lead triage and investigation of security incidents from the SOC
Manage third-party incident responders and coordinate exercises
Ensure quality and timely incident documentation and reporting
Drive user behavior analytics and improve logging/monitoring processes
Identify gaps and opportunities in security processes
Facilitate cross-departmental collaboration on security issues
Communicate effectively across organizational levels
Provide technical guidance on security controls and risk mitigation
Contribute to cybersecurity strategy, vendor management, and talent development
Support data loss prevention initiatives
Mentor staff and support their career growth
Recommend security technology improvements and respond to audit requests
Location & Travel:
Three days a week at a Guardian office in Holmdel, NJ, Bethlehem, PA, or New York, NY
Approximately 20% travel to other Guardian locations
Reporting:
Reports to Guardian’s Chief Information Security Officer.
Salary Range:
$148,940 - $244,685, commensurate with experience and qualifications. Additional incentives may apply.
Our Promise & Benefits:
Guardian offers support, flexibility, and development opportunities, including a diverse and inclusive environment, with benefits outlined at
our website . Interns are not eligible for most benefits.
Equal Opportunity & Accommodations:
Guardian is committed to equal employment opportunity and providing reasonable accommodations for individuals with disabilities. Contact
applicant_accommodation@glic.com
for assistance.
Current employees should apply through the internal Jobs Hub in Workday.
#J-18808-Ljbffr