Overview Come join us at Con Edison as a Systems Manager - Cyber Security Manager! We are seeking a highly skilled and motivated individual to join our growing team. In this role, you will be leading cyber response efforts across both OT and IT environments. You will oversee enterprise-wide forensic collections, manage large-scale response efforts, develop and mentor a high-performing team, and present findings to senior leadership to drive strategic decision-making.
Responsibilities
Core Responsibilities
- Lead enterprise forensic collections across IT and OT environments, preserving digital evidence according to industry best practices.
- Analyze data and digital artifacts across mobile, embedded, desktop, and server platforms to uncover indicators of compromise, attack vectors, and root causes.
- Perform detailed network analysis and malware reverse engineering (static and dynamic) using open-source and commercial tools.
- Provide actionable recommendations for incident response plans, post-incident reviews, and overall cyber-defense strategy.
- Present findings and strategic guidance to executive stakeholders in clear, concise language.
- Continuously assess and enhance forensic processes, tools, and methodologies.
- Build and lead a high-performing incident response and forensics team through mentorship and training; serve as technical SME and primary escalation point.
- Collaborate with Red Team, vulnerability management, CSOC, and other security units to strengthen detection, response, and mitigation efforts.
- Conduct open-source and social-media research to support investigations.
- Research emerging cybersecurity technologies and partner with SMEs to drive adoption.
Qualifications
Required Education/Experience
- Master's Degree and a minimum of (6) years of Digital Forensics, Incident Response, or other related DFIR experience
- Bachelor's Degree and a minimum of (8) years of Digital Forensics, Incident Response, or other related DFIR experience
Relevant Work Experience
- Previous Digital Forensics/Incident Response experience, required.
- Proficient in using known commercial and/or open source, incident response and forensic software, preferred.
- Understanding of industry standard policies, processes, and procedures, preferred.
- Understanding of chain of custody, preferred.
- Previous experience creating timelines and completing a root cause analysis, preferred.
- Proficiency in collecting, analyzing the evidence collected and creating reports based on the findings to different stakeholders: (Technical, Executive, etc.), preferred.
- Knowledge of current and evolving cyber threat landscape, preferred.
- Understanding of OT systems, protocols, and industrial control systems (ICS), preferred.
- Ability to remain agile and work in a fast-paced environment, preferred.
- Highly organized and detail oriented, preferred.
- Demonstrated analytical and impact analysis skills, preferred.
- Ability to handle multiple priorities effectively, preferred.
- Strong ethical standards and commitment to maintain confidentiality, preferred.
Skills and Abilities
- Strong verbal communication and listening skills
- Demonstrated written communication skills
- Demonstrated analytical skills
- Must be proficient in Microsoft Office including Word, Excel, Outlook and PowerPoint, etc.
Licenses and Certifications
- Driver's License Required
- Other: Relevant DFIR certifications such as GCIH, GCIA, GCFE, EnCE, GREM, CFCE or similar. Preferred
Additional Physical Demands
- The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays.
- Must be able and willing to travel within Company service territory, as needed.
- Must be available 24/7, on call, and/or participate in off-hour emergency response activities as required
|