Director Ransomware Incident Response
at Conversant Group
Remote, Scotland, United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 17 Dec, 2024 | Not Specified | 19 Sep, 2024 | 7 year(s) or above | Information Technology,Microsoft Exchange,Security Controls,Teams,Operations,It Infrastructure,Operating Systems,Communication Skills | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Conversant Group is an IT infrastructure and security consulting company founded in 2009 and based in Chattanooga, TN. We are the world’s first Civilian Cybersecurity Force, dedicated to defeating cyber terrorists. To do so, Conversant Group is organized into three battalions: Athena7 which provides infrastructure assessment, strategy and remediation, Grypho5 which offers ongoing managed protection, and Fenix24 which provides rapid restoration in case of a cyberattack.
ABOUT THE JOB
Conversant Group and its sister company Fenix24 are raising the bar for post-incident disaster recovery and restoration with a fast, thorough and professional operation. Our battle-tested professionals execute the most intelligent and strategic recovery playbook for minimal cost of incident response and business interruption. We provide the army victims of threat actors/cyber terrorists to fully restore IT operations.
We have a rapidly growing practice going toe-to-toe with the world’s biggest threat actors as we help companies restore operations following a ransomware attack in partnership with some of the industries biggest IR firms. Fenix24 offers the fastest, most professional restoration post a ransomware attack on the planet and we are looking for a highly visible and key leader (what we call Technical Captain but it’s a Director Level position) to lead battalions of engineers and project managers to save companies and jobs from cybercriminals.
The Director of Ransomware Incident Response will provide leadership, management, and operational oversight to help guide the operations and speed of recovery for victims of ransomware attacks. We are looking for someone deeply technical, passionate about joining our mission of saving jobs/companies, experienced in leading engineering/infrastructure teams, and someone with the communication skills to inspire their team members.
We consider ourselves a defensive army, we engage rapidly, move forward with precision and efficiency, and hold ourselves and our technical leaders to the highest standards.
QUALIFICATIONS
- At least 10 years in IT infrastructure engineering an leadership.
- Recent experience in leading engineering teams in complex, high stakes engagements.
- Managed Services experience and/or incident response restoration both pluses (not required).
- Deep technical acumen and ability to organize/execute complex missions.
- 7+ Years of relevant IT infrastructure engineering experience including endpoint security controls, perimeter firewalls, Microsoft Exchange and Office 365, and Windows Server operating systems.
- Ability to respond to inquiries and work beyond normal business hours, provide management to engineering teams of up to 24 in team size.
- Excellent analytical, organization, and problem-solving skills.
- Demonstrated ability to plan, organize, train, evaluate and direct work of less experienced staff.
- Demonstrated strong written and oral communication skills, including strong relationship building skills.
- Ability to form relationships across all levels of the company while modeling Conversant’s culture and values.
- Bachelors or Associate degree in Information Technology, Business, Operations, or relevant field experience strongly preferred.
How To Apply:
Incase you would like to apply to this job directly from the source, please click here
Responsibilities:
- Help lead engagement scoping, engaging with victims of ransomware and forensic partners in the eco-system, as well as internal subject matter experts to understand inbound opportunities and help engage the appropriate engineering team members to address the requirements.
- Manage workload distribution and team member utilization across multiple incident response engagements.
- Provide hands-on executive leadership to teams of engineers (we call them cells, led by cell majors) who are executing the mission to minimize the enormous impact of a ransomware attack.
- Drive the development, training and updating of runbooks across a wide range of infrastructure and applications for delivery of both cloud restorations and on-premises.
- Build, manage, and continually evolve team structure to maximize scale, knowledge, opportunity, delivery excellence to customers, and profitability to Fenix24.
- Support operational teams to ensure we are driving high levels of customer satisfaction and value, team member engagement, retention, growth, and profitability.
- Function as a client and counsel escalation point to address any roadblocks, communication, or other issues as they arise.
- Participate and partner with sales by engaging with clients in pursuit of opportunities.
REQUIREMENT SUMMARY
Min:7.0Max:10.0 year(s)
Information Technology/IT
IT Software - Other
Software Engineering
Graduate
Business, Information Technology, Operations, Relevant Field, Technology
Proficient
1
Remote, United Kingdom