Back to all jobs
Citi logo

SOC Digital Forensic and Incident Response- Senior Vice President

Citi

Irving, Texas, U.S.
Hybrid
Posted Sep 07, 2025
Hybrid

Compensation

Loading salary analysis...

About the role

Citi's Security Operations Center (SOC) Incident Response Team seeks a highly skilled and experienced incident response hands-on practitioner to support and execute critical efforts aimed at protecting Citi infrastructure, assets, clients, and stakeholders.

Responsibilities

  • Lead and/or support in-depth triage and investigations of BAU, and urgent cyber incidents in traditional, and hybrid environments.
  • Perform hands-on incident response functions including but not limited to host-based analytical functions (e.g. digital forensics, metadata, malware analysis, etc.)
  • Serve as the SOC incident response regional contact in major cyber events and security incidents.
  • Provide security expertise to the SOC IR team, leveraging industry standards as appropriate.
  • Train and coach junior colleagues on relevant best practices.
  • Partner with SOC Incident Response management on all program governance activities, including the development and/or maintenance of standards, procedures, metrics, reporting and training.

Requirements

  • Bachelor's and Master's degree in a technically rigorous domain such as Computer Science, Information Security/Technology, Engineering, Digital Forensics, etc.
  • 13+ years of professional experience in cybersecurity and/or information security, or demonstrated equivalent capability.
  • 8+ years hands-on working in cyber incident response and investigations in medium to large organizations with cloud and forensics components.
  • Incident response and hands-on technical experience in a global financial institution.
  • Experience with performing and managing tasks of 24x7 Incident Response services.
  • Experience with creation, leading the development, implementation, and management of incident response plans and response activities.
  • Proven leadership, communication, issue resolution and performance management skills.
  • Experience in Cloud Forensics/IR
  • Hands-on Dev/Sec/Ops experience with cloud environments and underlying storage, compute and monitoring services
  • Prior experience with cloud common services
  • Hands-on experience with forensic investigations or large scale incident response in cloud environments.
  • Hands-on experience with containerization methods and tools (e.g. Docker, Kubernetes) including incident response and digital forensics.
  • Certifications (e.g. GIAC, AWS, etc.) in cloud or demonstrated equivalent capability.
  • Experience in Incident Response
  • Hands-on experience with interpreting and pivoting through large data sets.
  • Current hands-on experience in digital forensics (e.g. computer, network, mobile device forensics, and forensic data analysis, etc.)
  • Activities include but not limited to: Memory collection and analysis from various platforms
  • Evidence preservation, and chain of custody following industry best practices.
  • Familiarity with malware analysis and Reverse Engineering of samples (e.g. static, dynamic, de-obfuscation, unpacking)
  • In-depth File system knowledge and understanding.
  • In-depth experience with timeline analysis.
  • In-depth experience with Registry, event, and other log file and artifact analysis.
  • Hands-on experience with a DFIR toolset and related scripting
  • Current expertise with an EDR system
  • More than one GIAC (e.g. GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.) or other digital forensic and/or incident response certifications.
  • Experience in the following operating systems: Windows Operating Systems / UNIX / Mac OS X, specifically in system administration, command line use, and file system knowledge.
  • Experience in Basic Scripting and Automation
  • Proficient in basic scripting and automation of tasks (e.g. C/C++, Powershell, JavaScript, Python, bash, etc.)
  • Working knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection/prevention systems, encryption, load balancing, and other network protocols.
  • Working knowledge of relational database systems and concepts (SQL Server, PostgreSQL, etc.)
  • Working knowledge of virtualization products (e.g. VMware Workstation)

Benefits

  • 401k matching
  • Health insurance
  • Wellness programs

About the Company

Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law.

Job Details

Salary Range

$156,160 - $234,240/yearly

Location

Irving, Texas, U.S.

Employment Type

Hybrid

Original Posting

View on company website
Create resume for this position