Назад
Company hidden
6 часов назад

Security IR Director (Web3)

Тип работы
fulltime
Грейд
director
Английский
b2
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Security IR Director (Web3/Cybersecurity): Leading the company's response to large-scale, high-impact cyber incidents with an accent on cross-company crisis coordination and executive decision support. Focus on driving rapid containment, orchestration of crisis management teams, and continuous improvement of the incident response framework.

Company

hirify.global provides a secure platform and network for companies to manage digital assets, trusted by major financial institutions and Web3 companies globally.

What you will do

  • Serve as Incident Commander for high-severity events, including breaches, supply-chain attacks, and insider threats.
  • Coordinate company-wide response efforts across technical, legal, communications, and executive stakeholders.
  • Orchestrate crisis management teams to ensure clear ownership and execution under extreme pressure.
  • Drive containment, eradication, and recovery while balancing business continuity and regulatory obligations.
  • Own and continuously improve the incident response framework, including severity definitions and escalation paths.
  • Design and run executive-level simulations and tabletop exercises to enhance organizational readiness.

Requirements

  • 10+ years in cybersecurity with extensive experience in incident response management.
  • Proven track record of leading large-scale, cross-company cyber incidents with board-level visibility.
  • Demonstrated experience acting as Incident Commander for at least 15 major security events in the last 5 years.
  • Deep understanding of Cloud/SaaS architectures, identity, and infrastructure security.
  • Proficiency with SIEM, EDR, and cloud-native detection and response technologies.
  • Ability to translate complex technical facts into business impact and risk-based decisions for executive leadership.

Nice to have

  • Previous experience at elite IR teams such as Mandiant, Sygnia, CrowdStrike, or Unit 42.
  • Experience in crypto, fintech, custody, payments, or other highly regulated environments.
  • Hands-on background in forensics, threat intelligence, or security engineering.
  • Practical application of NIST, ISO 27035, or similar incident response frameworks.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →