This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Cyber Incident Response Director will play a key role in building and leading the Security Operations Center (SOC) in Pune, India. This role is responsible for managing day-to-day incident response operations, coordinating investigations, and driving continuous improvements to detection and response capabilities. The Director will collaborate with global cyber defense teams to ensure timely containment, investigation, and remediation of security incidents. This position requires strong technical expertise in incident response, SOC operations, and security tooling, combined with leadership skills to grow and develop a high-performing team in India.
Job Responsibility:
Build, lead and manage the SOC team in Pune, including hiring, training, mentoring, and performance management of analysts and responders
Oversee daily incident detection, analysis, containment, eradication, and recovery efforts
Serve as the escalation point for high-priority or complex cyber incidents, ensuring timely response and communication to global stakeholders
Develop and maintain incident response playbooks, runbooks, and standard operating procedures
Partner with global SOC teams to align processes, technology, and reporting standards
Collaborate with threat intelligence, vulnerability management, forensics, and insider threat teams to drive a unified defense strategy
Manage relationships with key stakeholders in IT, Legal, Compliance, and Corporate Security during incident investigations
Provide executive-level reporting and updates on incident trends, SOC performance metrics, and operational risks
Ensure incident response activities comply with global regulatory and organizational requirements
Drive continuous improvement of detection rules, automation, and response workflows in the SOC
Requirements:
Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related discipline required
Master’s degree preferred
10–15 years of progressive experience in cybersecurity
at least 5 years focused on SOC operations or incident response
Minimum of 5 years in a people management role, leading incident response or SOC analyst teams
Hands-on experience with SIEM, EDR, SOAR, and forensic tools (e.g., Splunk, CrowdStrike, Microsoft Defender, etc)
Proven experience responding to advanced threats, ransomware, phishing campaigns, and insider incidents
Demonstrated success in building or scaling SOC teams in a global enterprise environment
Strong communication skills, with the ability to brief technical and non-technical stakeholders during incidents
Strong knowledge of incident response methodology, SOC operations, and security frameworks (e.g., NIST, MITRE ATT&CK)
Familiarity with global privacy and compliance requirements relevant to incident handling
Nice to have:
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Forensic Analyst (GCFA)
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)