Назад
Company hidden
2 дня назад

Manager, IR / SOC (Incident Response & Security Operations Center) (Cybersecurity)

170 000 - 190 000$
Формат работы
hybrid
Тип работы
fulltime
Грейд
lead
Английский
b2
Страна
Canada
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Manager, IR / SOC (Cybersecurity): Lead detection engineering, SOC operations, and incident response across global dating platforms with an accent on AI-driven triage, automation, and threat detection. Focus on developing detections-as-code frameworks, managing full incident lifecycles, and integrating threat intelligence in multi-cloud environments.

Location: Hybrid in Vancouver, British Columbia (Canada). Salary may be adjusted for other locations if authorization granted to work outside listed location.

Salary: $170,000 - $190,000 a year

Company

Leading provider of dating products including Tinder, Hinge, Match, OkCupid with hundreds of millions of users worldwide.

What you will do

  • Lead and develop SOC analysts, detection engineers, and incident responders with 24/7 coverage across time zones.
  • Develop detection engineering framework using detections-as-code via GitOps/CI/CD pipelines.
  • Drive AI Agentic SOC adoption, evaluating and implementing AI-driven triage and investigation tools.
  • Manage full incident lifecycle, partnering with Legal, Communications, Privacy, and Engineering teams.
  • Build detection content across SIEM, integrating logs from all hirify.global brands.
  • Establish SOC metrics, SLAs, and dashboards; coordinate IR exercises and partner with Red Team.

Requirements

  • 5+ years in security operations, incident response, detection engineering, or threat hunting; 2+ years in team leadership.
  • Experience building and operating modern SOC in cloud-native (AWS, GCP), hybrid, and datacenter environments.
  • Hands-on with SIEM platforms, SOAR tools, and detections-as-code methodologies.
  • Strong understanding of AI/ML in security operations, full incident lifecycle management, MITRE ATT&CK, forensics.
  • Experience with cloud security monitoring (CloudTrail, GuardDuty), identity (Okta), and coordinating with external teams.
  • Polished communication skills for incidents and reports to technical/executive audiences.

Nice to have

  • Python-based detections and log analysis in cloud-native SIEM.
  • Background in consumer internet/dating or high-scale B2C platforms.
  • Familiarity with Cloudflare, CrowdStrike, SaaS security monitoring.
  • Experience building Blue Team volunteer or cross-functional response teams.

Culture & Benefits

  • Medical, mental health, wellness benefits.
  • Competitive compensation, 100% 401k match up to 10% ($10k cap), employee stock purchase.
  • Generous PTO, 14 paid holidays.
  • Annual training allowance, ERG opportunities.
  • 20 weeks paid parental leave, fertility/adoption resources, pet insurance.
  • Company gatherings for connection and belonging.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →