- Company Name
- Canadian Tire Corporation
- Job Title
- Manager, Cyber Incident Response Team
- Job Description
-
**Job Title:** Manager, Cyber Incident Response Team
**Role Summary:**
Leads and manages the Cyber Incident Response Team (CIRT) within a fast‑paced Cyber Threat Management function. Responsible for overseeing crisis response, developing and maintaining incident response playbooks, threat detection rules, and forensic investigation processes while mentoring team members and coordinating with IT, business units, and senior leadership.
**Expectations:**
- 5+ years experience in SOC/CIRT operations, with at least 2 years in a managerial role.
- Proven ability to manage on‑call rotations and respond to high‑severity incidents.
- Deep knowledge of AI‑enabled threat tactics and ability to detect AI‑generated attacks.
- Strong communication skills for stakeholder briefings and senior‑level reporting.
- Ability to prioritize competing demands, drive results, and foster team development.
**Key Responsibilities:**
- Direct crisis response activities, including analysis, mitigation, and post‑incident learning.
- Mentor, coach, and evaluate incident responders; define clear performance expectations.
- Oversee daily monitoring, detection, and response operations across the environment.
- Create, update, and test incident response playbooks, tabletop exercises, and training programs.
- Serve as escalation point for forensic, log, cloud, and root‑cause investigations.
- Participate in on‑call rotation as incident manager or responder for major incidents.
- Design and implement threat detection rules, correlations, and early‑warning capabilities.
- Track incident trends, operational metrics, and program maturity; produce regular reports.
- Communicate incident status and findings to stakeholders at all levels; present recommendations to senior leadership.
**Required Skills:**
- SOC/CIRT leadership and incident management expertise.
- Proficiency with NIST, MITRE ATT&CK, Cyber Kill‑Chain, SANS, CAPEC frameworks.
- Hands‑on experience with threat detection, SIEM, ticketing, and case management tools.
- Ability to identify AI‑driven attack indicators (synthetic phishing, automated credential‑stuffing, AI‑assisted obfuscation).
- Strong analytical, problem‑solving, and logical reasoning abilities.
- Excellent written and verbal communication for technical and executive audiences.
- Capacity to develop training material and conduct tabletop exercises.
- Commitment to continuous learning of emerging threat vectors.
**Required Education & Certifications:**
- Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
- Industry certifications strongly preferred: CISSP, GIAC (e.g., GCIH, GCFA), EC‑Council (e.g., CEH), or comparable credentials.