
Cybersecurity Operations & Incident Response Manager at Jobgether. This position is posted by Jobgether on behalf of Coastal Community Bank. We are currently looking for a Cybersecurity Operations & Incident Response Manager in United States.. In this role, you will be responsible for building and leading a 24/7 security operations capability that protects a complex hybrid environment, spanning legacy on-premises systems, cloud services, and custom-developed APIs. You will oversee monitoring, detection, incident response, and vulnerability management, while ensuring alignment with regulatory expectations and industry standards. The role requires both deep technical expertise and strong leadership, particularly in high-stakes security incidents. You will manage partnerships with third-party SOC providers, guide a high-performing security team, and contribute to shaping a resilient cybersecurity culture. This is an opportunity to make a direct impact by safeguarding critical systems and enabling business innovation in a fast-moving environment.. Accountabilities:. . Lead and develop a lean, automation-driven Security and Threat Operations team, including hiring, coaching, and career growth.. . Establish operational rhythms, incident response protocols, and performance metrics to ensure rapid detection, response, and recovery.. . Design and manage SIEM/SOAR strategy, log onboarding, and detection content across infrastructure, cloud, endpoints, SaaS, and custom systems.. . Act as incident response commander during critical events, ensuring effective coordination, documentation, and post-incident improvements.. . Oversee vulnerability management lifecycle, prioritizing remediation with risk-based scoring and exploit intelligence.. . Build and mature threat hunting and purple team capabilities to continuously improve defense readiness.. . Govern relationships with third-party SOC/MSSP providers, ensuring quality, compliance, and alignment with business needs.. . Partner with compliance, legal, and IT stakeholders to meet regulatory, audit, and reporting obligations.. . . 8+ years in Security Operations, Incident Response, Detection Engineering, or Threat Hunting, with at least 3 years of leadership experience.. . Strong expertise in hybrid environments including on-prem AD, Entra ID, Okta, Azure, Microsoft 365, and containerized workloads/APIs.. . Hands-on experience with SIEM/SOAR, EDR, log pipelines, and detection engineering.. . Proven track record leading major security incidents with strong forensic and communication skills.. . Deep knowledge of vulnerability management, MITRE ATT&CK, and purple teaming.. . Experience managing third-party SOC/MSSP providers with measurable improvements to operations.. . Excellent communication and stakeholder management skills, with ability to translate risks into business language.. . Familiarity with scripting or automation tools (Python, TypeScript, etc.) to enhance security processes.. . Bachelor’s degree in Information Security, Computer Science, or related field, or equivalent experience.. . Previous experience in regulated industries (finance, healthcare, etc.) strongly preferred.. Company Location: United States.