Opens analogdevices.wd1.myworkdayjobs.com in a new tab
What You'll Do
- Own incident communications: run executive updates and stakeholder calls per ADIs Comms & Escalation Matrix; produce concise executive summaries and impact assessments.
- Stand up and run the Incident Action Group (IAG); set strategy, assign workstreams, and steer decisions at pace.
- Operate within the incident case management platform to ensure real‑time logging, status, actions and decisions are captured and auditable.
- Orchestrate SOC, IR retainer, legal and engineering to deliver containment, focused monitoring, and durable remediation.
- Operate to NIST‑aligned IR practices and ADI governance; align evidence and timelines to other applicable obligations (e.g., sectoral regulators).
- When appropriate, maintain legal privilege throughout investigations using ADI’s privilege guidance and approved channels.
- Partner with SOC and Threat Intel to apply MITRE ATT\&CK mapping, enable proactive detection, and reduce dwell time.
- Drive post‑incident reviews (PIRs), root‑cause analysis and action plans; track MTTD/MTTR, severity distributions and regulatory timelines.
- Be a pivotal part of tabletops and simulations; evolve playbooks to reflect new tactics, cloud patterns and control gaps.
- Essential experience 5+ years leading cyber incidents and complex intrusions (SOC/IR/major incident command) in global enterprise environments.
- Mastery of incident lifecycle execution (SANS six steps), evidence handling, and cross‑functional coordination.
- Strong grasp of SIEM/EDR (e.g., Microsoft Sentinel, Defender, Splunk) and cloud incident patterns (Azure/AWS).
- Clear, executive‑level communication—translating technical impact into business risk and decisions.
- Nice‑to‑have certifications GCIH, GCFA/GCFR, GCTI, CISSP, CCSP, CISM; UK CREST credentials welcome but not essential Why Join Us? Work with cutting-edge security tools and technologies in a dynamic, innovative environment.
- Play a meaningful role in shaping and strengthening the security posture of a global enterprise.
- Competitive salary, benefits, and continuous professional development opportunities.
- A collaborative culture that values integrity, innovation, and work-life balance.
- For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S.
- Department of Commerce - Bureau of Industry and Security and/or the U.S.
- Department of State - Directorate of Defense Trade Controls.
- As such, applicants for this position – except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) – may have to go through an export licensing review process.
- We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.
- Job Req Type: Experienced Required Travel: Yes, 10% of the time Shift Type: 1st Shift/Days
Sourced directly from Analog Devices’s career page
Your application goes straight to Analog Devices.
Opens analogdevices.wd1.myworkdayjobs.com in a new tab
Specialisation
Open roles at Analog Devices
938 positions
Job ID
/job/United-Kingdom-Edinburgh-SC-Freer/Cyber-Incident-Manager_R261049
Get matched to roles like this
Upload your resume once. We’ll notify you when matching roles open up.
Join talent pool — freeSimilar Other roles
Samsung Semiconductor
Staff Technical Program Manager
San Jose, California, United States|Other
Samsung Semiconductor
Associate, Executive Administration
San Jose, California, United States|Other
Micron Technology
STAFF ENGINEER GFAC SASIA - ELECTRICAL
Fab 10A, Singapore|Other
Micron Technology
TEST HBM DATA ANALYST
Taichung - MTB, Taiwan|Other