Incident Response Manager – Security Operations

US MI Remote, United States

Zoetis

Zoetis is the largest global animal health company committed to nurturing the world and humankind by advancing care for animals. Learn more.

View all jobs at Zoetis

Apply now Apply later

Position Summary:

 Zoetis is seeking an Incident Response Manager to lead and enhance the organization’s incident response program. This role is critical in ensuring the rapid identification, containment, and resolution of security incidents while continuously improving response processes and playbooks. The Incident Response Manager will be responsible for overseeing technical investigations, developing new capabilities, and integrating automation into response efforts. This position requires strong communication, interpersonal skills, and the ability to work under pressure and with strict deadlines.

The ideal candidate must have expertise in cybersecurity, network administration, and communication systems to mitigate threats effectively in highly dynamic and sensitive environments. A key aspect of this role involves translating complex technical details into clear, well-structured communication that is easily understood by non-technical stakeholders. This individual should possess exceptional formal written communication skills, ensuring that incident reports, executive summaries, and technical documentation are precise and accessible to diverse audiences.

Additionally, the Incident Response Manager should be adept at scripting and developing customized solutions that integrate disparate security tools into a cohesive, automated security ecosystem. This will significantly enhance operational response and resilience. Candidates must demonstrate a deep understanding of cybersecurity, various threat vectors, and a proactive approach to problem-solving. Strong leadership, collaboration, and decision-making skills are essential to successfully manage incidents and drive continuous security improvements.

Responsibilities:

Incident Response Leadership & Investigations:

  • Lead end-to-end incident response activities, including identification, containment, eradication, recovery, and post-incident analysis.
  • Serve as a point of contact for high-priority incidents, ensuring timely and effective communication with leads and stakeholders.
  • Coordinate technical investigations to determine the root cause of security incidents and implement corrective actions.
  • Develop and refine incident response processes and playbooks to enhance organizational resilience.
  • Continued review and improvement of overall incident response readiness.

Communication & Stakeholder Engagement:

  • Effectively communicate technical findings and security incidents in a clear and structured manner to both technical and non-technical stakeholders.
  • Draft detailed incident reports, executive summaries, and formal technical documentation.
  • Collaborate with cross-functional teams, including IT, legal, compliance, and executive leadership, to ensure cohesive incident response efforts.
  • Maintain strong interpersonal relationships to drive engagement and cooperation across departments.

Security Operations & Automation:

  • Coordinate the development and implementation of automation strategies to streamline incident response processes and improve operational efficiency.
  • Take part in the analysis and enhancement of security automation techniques to proactively address emerging threats.
  • Monitor key performance indicators to assess and improve the effectiveness of incident response procedures.

Continuous Improvement & Innovation:

  • Stay informed of the latest cybersecurity trends, threat intelligence, and best practices.
  • Collaborate with internal teams to develop innovative approaches to incident response and threat mitigation.
  • Regularly review and update security policies, procedures, and runbooks to reflect evolving threats and organizational needs.
  • This role requires a combination of technical expertise, strategic thinking, and strong communication skills to ensure effective incident management and continuous improvement in cybersecurity resilience.

Education:

  • Preferred Degree – Bachelor’s degree in Cyber Security, Computer Science, or Information Systems, or related field
  • Preferred Certifications – CISSP, CISM, CCNA, Network+, Security+, or similar


Experience:

  • Minimum of 5 years of experience in the field, coordinating large projects across different teams end-to-end
  • Experience in Incident Response industry standard policies (ex. NIST 800-61)
  • Strong familiarity with attack vectors, exploits, and countermeasures
  • Experience working with security frameworks such as MITRE ATT&CK, NIST, and CIS
  • Hands-on experience leading incident response investigations and technical root cause analyses
  • Expertise in developing and implementing security policies, procedures, and playbooks aligned with industry best practices
  • Ability to effectively collaborate with cross-functional teams to drive security initiatives and improvements
  • Experience in analyzing and mitigating advanced persistent threats (APTs) and zero-day vulnerabilities
  • Strong understanding of digital forensics, malware analysis, and threat intelligence methodologies
  • Knowledge of endpoint detection and response (EDR) tools, SIEM platforms, and threat-hunting techniques

Knowledge, Skills, Ability Requirements:

  • Highly developed communication and interpersonal skills with the ability to influence through personal credibility, integrity and professionalism
  • Strong proficiency in project management
  • Excellent written and verbal communication skills
  • Relentless dedication to customer satisfaction/excellence
  • Strategic and analytical thinking
  • Ability to multitask and work in fast-paced environment
  • Ability to foster collaborative decision making
  • Capable of working both independently and as a team member

Travel Requirements: 5%-10%

The following base pay range reflects the anticipated base pay for this position if a selected candidate were to
be located in Colorado. Base pay may vary based on location and other factors.

Base Pay Range: $91,000 - $131,000

The following base pay range reflects the anticipated base pay for this position if a selected candidate were to be located in California, NJ Remote, NY Remote, or Washington. Base pay may vary based on location and
other factors.

Base Pay Range: $103,000 - $148,000

This position is eligible for short-term incentive compensation. The position is also eligible for long-term incentive.

We offer a competitive and comprehensive benefits package, which includes healthcare, dental coverage, and

retirement savings benefits along with paid holidays, vacation and disability insurance.

Full time

Regular

Colleague

Any unsolicited resumes sent to Zoetis from a third party, such as an Agency recruiter, including unsolicited resumes sent to a Zoetis mailing address, fax machine or email address, directly to Zoetis employees, or to Zoetis resume database will be considered Zoetis property. Zoetis will NOT pay a fee for any placement resulting from the receipt of an unsolicited resume.

Zoetis will consider any candidate for whom an Agency has submitted an unsolicited resume to have been referred by the Agency free of any charges or fees. This includes any Agency that is an approved/engaged vendor but does not have the appropriate approvals to be engaged on a search.

Zoetis is committed to equal opportunity in the terms and conditions of employment for all employees and job applicants without regard to race, color, religion, sex, sexual orientation, age, gender identity or gender expression, national origin, disability or veteran status or any other protected classification. Disabled individuals are given an equal opportunity to use our online application system. We offer reasonable accommodations as an alternative if requested by an individual with a disability. Please contact Zoetis Colleague Services at zoetiscolleagueservices@zoetis.com to request an accommodation. Zoetis also complies with all applicable national, state and local laws governing nondiscrimination in employment as well as employment eligibility verification requirements of the Immigration and Nationality Act. All applicants must possess or obtain authorization to work in the US for Zoetis. Zoetis retains sole and exclusive discretion to pursue sponsorship for the acquisition or maintenance of nonimmigrant status and employment eligibility, considering factors such as availability of qualified US workers. Individuals requiring sponsorship must disclose this fact. Please note that Zoetis seeks information related to job applications from candidates for jobs in the U.S. solely via the following: (1) our company website at www.Zoetis.com/careers site, or (2) via email to/from addresses using only the Zoetis domain of “@zoetis.com”. In addition, Zoetis does not use Google Hangout for any recruitment related activities. Any solicitation or request for information related to job applications with Zoetis via any other means and/or utilizing email addresses with any other domain should be disregarded. In addition, Zoetis will never ask candidates to make any type of personal financial investment related to gaining employment with Zoetis.
Apply now Apply later
Job stats:  1  1  0

Tags: Automation CISM CISSP Compliance Computer Science EDR Exploits Forensics Incident response Malware MITRE ATT&CK NIST Scripting SIEM Threat intelligence Vulnerabilities Zero-day

Perks/benefits: Career development Competitive pay Insurance

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.