- Serve as the Incident Commander, leading the full lifecycle of cybersecurity incident investigations and response efforts.
- Coordinate cross-functional communication during high-severity incidents, ensuring rapid containment and clarity across teams.
- Present concise, accurate written and oral reports to executive and operational leadership.
- Analyze compromised or potentially compromised systems using advanced forensic tools and methodologies.
- Conduct complex forensic investigations into system breaches, data leaks, and architectural weaknesses.
- Coordinate evidence and data collection to ensure thorough and reliable incident documentation.
- Prepare detailed security incident reports that transform technical findings into actionable insights for decision-makers.
- Document investigation steps, timelines, technical observations, and remediation impacts with precision and clarity.
- Maintain current knowledge of attacker TTPs, advanced persistent threats, emerging tools, and incident response best practices.
- Apply threat intelligence insights to strengthen investigative techniques and enhance incident detection capabilities.
- Provide expert technical guidance to teams on incident monitoring, triage, response workflows, threat and vulnerability management, and security analysis.
- Mentor team members and support growth in incident response competencies across the organization.
- Identify and drive opportunities to improve incident management efficiency and response workflows at scale.
- Champion the integration of automation and AI-driven tools to accelerate detection, triage, and resolution.
- Contribute to the long-term strategic direction of the company's cybersecurity and incident response programs.
- EDR Experience- CrowdStrike and/or SentinelOne with experience investigating and analyzing malware and other malicious activity.
- Experience with forensics tools such as FTK, EnCase, Autopsy to collect and analyze file system artifacts, process history, application artifacts, memory collection and analysis for physical and cloud systems (Windows, Mac, Linux).
- 4 or more years of experience in an analytical role of either forensics analyst (Linux, Windows, or MacOS), threat analyst, incident response, SOC analyst, or security engineer/ consultant.
- Experience with cloud environments such as: Azure, AWS, GCP – knowing how to collect and analyze logs from Guard Duty/ Defender and CloudTrail, etc.
- Familiarity with the MITRE ATT&CK or related frameworks.
- Experience developing and managing incident response programs with focus on efficiency through AI development.
- Strong communication skills with confidence leading Incident Response calls with different stakeholders; followed by producing detailed incident reports.
- Proficient insocial engineering, phishing, and related fraud schemes.
- Strong general knowledge of security concepts and expertise in network and web application security issue s.
- Experience with a scripting language such as Python, Bash, PowerShell, or other scripting language in an incident handling environment.
-
About the job · Protecting Organizational Assets Through Proactive Cybersecurity Leadership. The Information Security Incident Manager is responsible for leading the organization's response to cyber incidents, overseeing vulnerability assessments, analyzing threat intelligence, a ...
Mexico City Metropolitan Areahace 4 horas
-
Acceleration Center - Managed Services - OnePOC Command Center Manager · Location: Mexico City Onsite - Monday to Friday · The OnePOC Command Center Engineer is responsible for monitoring, managing, and troubleshooting network systems within the One Point of Contact (OnePOC) Comm ...
Mexico City Metropolitan Area $300,000 - $650,000 (MXN) por añohace 4 horas
-
The HSE Manager will be responsible for designing, executing, and overseeing all health, safety, and environmental initiatives to ensure compliance with regulations and to maintain a safe, healthy workplace. This role will operate across two manufacturing plants located in the St ...
Mexico City Metropolitan Area $450,000 - $900,000 (MXN) por añohace 4 horas
-
Stefanini es una compañía líder presente en más de 41 países, con más de 38 años en el mercado mundial. · Somos especialistas en consultoría tech global, con 7 unidades especializadas: Cyber, Technology, Operations, Data & Analitycs, Marketing, Manufacturing, Financial Tech, con ...
Mexico City Metropolitan Areahace 4 horas
-
Job Description – SAP TMS Maintenance and Monitoring Engineer Junior · Department: SAP TMS / SAP Basis Run Team · Location: Remote · Employment Type: Full‑time / Permanent · Shift · Position Summary · The SAP TMS Maintenance and Monitoring Engineer will be part of the team former ...
Mexico City Metropolitan Areahace 4 horas
-
Boost Your Cybersecurity Career with PwC · Are you a passionate professional in Identity and Access Management (IAM) looking to join a global elite team solving the most critical business and data protection challenges? This is your chance · PwC Cyber Managed Services & Advisory ...
Mexico City Metropolitan Areahace 4 horas
-
Member of a team responsible for the overall support and operation of network environments across technologies in México. Candidate will plan, maintain, upgrade, and continuously monitor and improve the operating environment. · Required Job Skills: · English B1 or plus (must have ...
Mexico City Metropolitan Area $360,000 - $720,000 (MXN) por añohace 4 horas
-
We are · At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron's progressive technologies and optimization strategi ...
Mexico City Metropolitan Areahace 4 horas
-
ABOUT US · Datacultr is a global Digital Operating System for Risk Management and Debt Recovery, we drive Collection Efficiencies, Reduce Delinquencies and Non-Performing Loans (NPL's). Datacultr is a Digital-Only provider of Consumer Engagement, Recovery and Collection Solutions ...
Mexico City Metropolitan Area $420,000 - $900,000 (MXN) por añohace 4 horas
Incident Manager - Mexico City Metropolitan Area - Publicis Re:Sources

hace 4 horas
Descripción
Incident Manager (Forensics) Senior Associate
Overview
The Senior Associate, Information Security - Forensics is part of a global team and is responsible for incident response of cyber security incidents that are associated with our businesses, clients, and vendors; is technically skilled and ensures incident containment, remediation, and closure. This individual will be expected to work closely with the legal, data privacy, business, and client teams. They should be comfortable with interacting with senior executives, including C-level staff.
Responsibilities:
Incident Leadership
Forensic Analysis & Investigation
Reporting & Documentation
Threat Intelligence & Continuous Learning
Technical Guidance & Support
Process Optimization & Strategic Direction
Qualifications:
-
Information Security Incident
Walmart de México y Centroamérica- Mexico City Metropolitan Area
-
Acceleration Center
PwC Acceleration Centers- Mexico City Metropolitan Area
-
HSE Manager
confidential- Mexico City Metropolitan Area
-
Delivery Service Manager
Stefanini LATAM- Mexico City Metropolitan Area
-
Linux OS Admin Jr
Syntax México- Mexico City Metropolitan Area
-
Consultor de Ciberseguridad IAM
PwC Acceleration Centers- Mexico City Metropolitan Area
-
Network Engineer
Black Box- Mexico City Metropolitan Area
-
Java Operations Support
Synechron- Mexico City Metropolitan Area
-
Customer Success Manager
Datacultr- Mexico City Metropolitan Area