The world isn’t standing still, and neither is Allstate.
We’re moving quickly, looking across our businesses and brands and taking bold steps to better serve customers’ evolving needs.
That’s why now is an exciting time to join our team.
You’ll have opportunities to take risks, challenge the status quo and shape the future for the greater good.
You’ll do all this in an environment of excellence and the highest ethical standards – a place where values such as integrity, inclusive diversity and accountability are paramount.
We empower every employee to lead, drive change and give back where they work and live.
Our people are our greatest strength, and we work as one team in service of our customers and communities.
Everything we do at Allstate is driven by a shared purpose: to protect people from life’s uncertainties so they can realize their hopes and dreams.
For more than 89 years we’ve thrived by staying a step ahead of whatever’s coming next – to give customers peace of mind no matter what changes they face.
We acted with conviction to advocate for seat belts, air bags and graduated driving laws.
We help give survivors of domestic violence a voice through financial empowerment.
We’ve been an industry leader in pricing sophistication, telematics, digital photo claims and, more recently, device and identity protection.
We are the Good Hands.
We don’t follow the trends.
We set them.
Job Summary
The Incident Handling Manager of the Global Security Fusion Center (GSFC) will oversee the operations of Incident Handling such as incident response, threat detection and mitigation efforts.
This individual will effectively run the operations by coordinating with different service areas across GSFC and maintain the overall security posture of the organization.
This leadership role will effectively communicate with stakeholders and senior leadership team especially during a major incident.
This individual serves as an incident manager during major incidents and supports the investigations carried out by the team.
The Incident Handling Manager mentors the Lead analysts and other analysts of the team and reviews the performance of the individuals.
This Manager role also leads teams in the development and evaluation of programs, processes and procedures to mitigate cybersecurity risk, ensuring protection of company information and assets, and understanding and applying pertinent industry and government regulations, contracts, and requirements.
Key Responsibilities
Lead and manage Security Operations Center across different regions and shifts with primary responsibilities in security event monitoring, management, and response. Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives.
Review policies and highlight the challenges in managing SLAs. Review standard operating procedures to ensure SOC continues to effectively meet operational requirements. Provide team & vendor management, evaluate overall use of resources, and initiate corrective action where required for SOC. Create reports, dashboards, and metrics and present to Sr. Mgmt. Evaluate existing technical capabilities and systems and identify opportunities for improvement. Oversee training and exercises to ensure SOC team proficiency.
Conduct after action reviews to identify lessons learned and best practices. Work closely Security Leadership to identify and implement process changes, improvements, and efficiencies to ensure solid security practices. Develop communication channels with technology owners and business to evangelize the evolving threat landscape. Job Qualifications
Ideal candidate will have 10+ years incident handling and incident response experience.
Technical knowledge of network security, operating system security, vulnerability management, common attacker techniques and exploits, encryption, and SIEM.
Know how to lead investigations and direct incident handlers and question the investigative process being followed.
Possess experience in writing both technical incident investigation reports as well as reports for senior leadership.
Ability to manage multiple initiatives at once in addition to day-to-day operations.
Experience in managing teams of 8 or more people and providing mentorship.
Advanced incident investigation and response experience. Advanced log parsing and analysis skill sets. Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc.). Moderate knowledge of Windows, Unix/Linux, and Mac operating systems. Moderate knowledge of SIEM technologies and use case design. Moderate knowledge of malware operations and indicators. Moderate knowledge of network defenses such as firewalls, IDS/IPS, Packet Capture, Proxies. Moderate experience with scripting. Moderate knowledge of forensic techniques. Moderate knowledge of audit requirements (PCI, HIPPA, SOX, etc.). Education and Certifications
Bachelor’s Degree preferred, but not required.
May also have advanced degree. Certifications from the list below preferred, but not required: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) Certified Incident Handler (GCIH) Certified Intrusion Analyst (GIAC) Certified Ethical hacker (CEH) Certified Expert penetration tester (CEPT) Functional Skills
Advanced understanding of information security technology. Ability to influence others and achieve results. Ability to think strategically, conceptually, analytically and creatively. Advanced time management skills including ability to manage multiple projects, prioritize and organize, and create alignment and buy in from clients and direct reports. Demonstrated clear, concise and effective oral and written communication skills. Ability to establish, manage and leverage relationships with internal and external partners. Ability to analyze data and apply it to complex problem resolution. Advanced understanding of security trends in the industry. Advanced understanding of expense and resource management processes as they relate to project resources and expenses, ability to make appropriate sourcing decisions based on project resource needs, demonstrate understanding of area's budget and its relationship to department level information and external customers, and assist in explaining impact of project expenses on the area's overall expense plan. Possess a mastery level of thriving in change by setting an example, providing leadership, and coaching peers and team members, during changes that may disrupt productivity. Handle ambiguity and uncertainty with maturity, adapt management style to current situations and people needs, and demonstrate the ability to make decisions under time pressures and with limited information.