Manager - Cyber Incident Response
Austin, TX  / Santa Clara, CA  / Washington, DC 
Share
Posted 15 days ago
Job Description

About Marvell

Marvell's semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities.

At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead.

Your Team, Your Impact

The CIRT Manager will be responsible for leading and managing Marvell's Cyber Incident Response Team to detect, respond to, and recover from cyber security incidents effectively. This role will involve developing and implementing incident response plans, coordinating incident response activities, and leading investigations into security incidents.

The ideal candidate will be a strong leader and have proven background in all aspects cyber security incident response, with a focus on driving results and mitigating cyber security risks. Candidate must have 10+ years of proven track record of building high-performing teams and driving results in complex environments.

What You Can Expect

  • Lead, recruit, mentor and manage highly adaptable and skilled Cyber Incident Response Team
  • Develop and maintain incident response plans, procedures, and playbooks to effectively respond to cyber security incidents.
  • Coordinate and oversee incident response activities, including detection, containment, eradication, and recovery efforts.
  • Serve in a role of Incident Commander as a primary point of contact for cyber security incidents, coordinating communication and collaboration with internal teams and external stakeholders.
  • Lead investigations into security incidents to determine the root cause, scope, and impact of the incident.
  • Collaborate with internal teams and external partners to gather and analyze threat intelligence and indicators of compromise (IOCs) to enhance incident detection and response capabilities.
  • Develop and maintain relationships with relevant law enforcement agencies, government agencies, and industry partners to facilitate information sharing and collaboration on cyber threats and incidents.
  • Provide leadership and guidance during crisis situations, including coordinating cross-functional teams and communicating with senior leadership and stakeholders.
  • Conduct post-incident analysis and lessons learned reviews to identify areas for improvement and implement corrective actions to prevent future incidents.
  • Stay current on emerging cyber threats, attack techniques, and trends, and incorporate relevant insights into incident response strategies and procedures.
  • Prepare and deliver incident response reports, presentations, and other communications to senior leadership and stakeholders.

What We're Looking For

  • Proven experience (8+ years) in incident response, with a focus on managing CIRT teams and leading incident response efforts.
  • Strong leadership, communication, and interpersonal skills.
  • Strong understanding of cybersecurity principles, technologies, and attack vectors.
  • Experience with security incident and event management (SIEM) tools, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR) solutions and forensic analysis tools.
  • Experience with incident response tools and technologies, such as SIEM, EDR, and forensic analysis tools.
  • Knowledge of incident response frameworks and best practices, such as NIST SP 800-61, ISO 27035, Incident Command System (ICS), and SANS incident handling process.
  • Familiarity with MITRE ATT&CK framework is a must
  • Strong analytical and problem-solving abilities, with the ability to analyze complex security incidents and identify effective response strategies.
  • Ability to work effectively in a fast-paced, dynamic environment and manage competing priorities.
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field; Master's degree preferred.
  • CISSP, CISM, CEH, GIACs or similar certifications is required

#LI-JS22

Expected Base Pay Range (USD)

123,300 - 182,480, $ per annum

The successful candidate's starting base pay will be determined based on job-related skills, experience, qualifications, work location and market conditions. The expected base pay range for this role may be modified based on market conditions.

Additional Compensation and Benefit Elements

At Marvell, we offer a total compensation package with a base, bonus and equity.Health and financial wellbeing are part of the package. That means flexible time off, 401k, plus a year-end shutdown, floating holidays, paid time off to volunteer. Have a question about our benefits packages - health or financial? Ask your recruiter during the interview process.

This role is eligible for our hybrid work model in which you will be able to split time between working from home and on-site in a Marvell office.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.

Any applicant who requires a reasonable accommodation during the selection process should contact Marvell HR Helpdesk at .

 

Job Summary
Start Date
As soon as possible
Employment Term and Type
Regular, Full Time
Required Education
Bachelor's Degree
Required Experience
8+ years
Email this Job to Yourself or a Friend
Indicates required fields