Halcyon Logo

Halcyon

Director, Ransomware Detect & Respond

Reposted 10 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in USA
150K-180K
Senior level
Remote
Hiring Remotely in USA
150K-180K
Senior level
The Director of Ransomware Detect & Respond will lead a 24/7 Security Operations Center, develop SOPs, mentor analysts, and oversee customer monitoring for ransomware threats.
The summary above was generated by AI

What we do:
Halcyon is the industry’s first dedicated, adaptive security platform that combines multiple proprietary advanced prevention engines along with AI models focused specifically on stopping ransomware.

Who we are:
Halcyon was formed in 2021 by a team of cyber industry veterans after battling the scourge of ransomware (and advanced threats) for years at some of the largest global security vendors. Comprised of leaders from Cylance (now Blackberry), Accuvant (now Optiv), Fireye and ISS X-Force (now IBM), Halcyon is focused on building products and solutions for mid-market and enterprise customers.

As a remote-native, completely distributed global team, we recognize great talent can exist anywhere. We invite you to apply to a job you’re interested in and we'll work a plan to meet your needs.

The Role:
Halcyon is seeking an experienced Director, Ransomware Detect & Respond (RDR) to build, lead, and manage our 24/7/365 Security Operations Center. You will own all aspects of continuous monitoring of our anti-ransomware platform, ensuring real-time visibility into ransomware threats and guiding customers through detection and mitigation. This role requires a strategic thinker who can establish scalable processes, build a high-performing team of SOC analysts, and collaborate closely with product, engineering, and support functions to keep customers safe.

Responsibilities:

  • SOC Strategy & Operations

    • Architect and implement a world-class, round-the-clock operations center focused exclusively on ransomware monitoring, detection, and customer support.

    • Develop and maintain standard operating procedures (SOPs), runbooks, and escalation playbooks that ensure consistent, high-quality triage of alerts and customer engagements.

    • Define and track key performance indicators (SLAs, MTTR, detection coverage, alert accuracy) to measure SOC effectiveness and drive continuous improvement.

  • Team Leadership & Development

    • Recruit, mentor, and manage a team of SOC analysts—creating clear career paths, training programs, and certification goals.

    • Foster a culture of accountability, collaboration, and continuous learning within the RDR team, ensuring analysts understand evolving ransomware tactics and our product’s telemetry.

    • Conduct regular exercises (e.g., tabletop drills, alert-handling simulations) to validate readiness and refine processes.

  • Detection Engineering Coordination

    • Partner with RISE (Research, Intelligence, Services, Engineering) to ensure that the latest threat intelligence and telemetry are integrated into our monitoring platform.

    • Work closely with Product and Engineering to validate that endpoint, cloud, and network telemetry feed into the SOC’s analytics system and that alert thresholds are appropriately tuned.

    • Collaborate with domain experts to translate new ransomware trends into actionable alert rules and automated workflows.

  • Customer Monitoring & Support

    • Oversee real-time monitoring of customer environments—identifying suspicious activity and guiding customers through initial investigation steps.

    • Serve as the primary escalation point for high-severity customer alerts: coordinate with Support, Engineering, and RISE to advise on containment, remediation, and recovery actions.

    • Maintain a customer-facing incident log that captures timelines, root-cause analyses, and lessons learned—feeding insights back to Product for feature improvements.

  • Risk Management & Compliance

    • Ensure SOC processes align with relevant security frameworks (NIST CSF, ISO 27001) and support customer compliance needs.

    • Coordinate periodic reviews of detection controls (e.g., tuning alert thresholds, reviewing false-positive/false-negative rates) to maintain optimal coverage.

    • Manage relationships with external vendors for threat intelligence feeds, monitoring tools, and log aggregation services.

Skills and Qualifications:

  • 8+ years of hands-on experience in SOC leadership, security monitoring, or managed detection operations—ideally within a cybersecurity product organization.

  • Demonstrated track record of building and scaling a 24/7/365 SOC, including staffing, process design, and performance measurement.

  • Deep understanding of ransomware threat actor TTPs, attack chains, and typical enterprise telemetry (endpoint, network, cloud).

  • Proven ability to translate threat intelligence into effective monitoring rules, dashboards, and alerting strategies.

  • Strong leadership and people-management skills: coaching analysts, driving accountability, and fostering collaboration under pressure.

  • Excellent written and verbal communication skills—able to convey technical findings and operational metrics to executives, product teams, and customers.

  • High emotional intelligence, with a calm, decisive demeanor during high-stress situations.

  • Proficiency with SIEM/analytics platforms (e.g., Splunk, Elastic, QRadar), log aggregation tools, and incident-tracking systems.

  • Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).

Bonus Skills and Qualifications:

  • Prior experience working in or leading a SOC at a security-focused product company.

  • Certifications such as CISSP, GCIH, or equivalent GIAC credentials.

  • Familiarity with SOAR or automation platforms to streamline alert handling and triage workflows.

  • Hands-on understanding of cloud security monitoring (AWS CloudWatch, Azure Sentinel, GCP Security Command Center).

  • Demonstrated success developing and presenting SOC performance reports and post-incident analyses to leadership or customers.

Benefits:

 Halcyon offers the following benefits to eligible employees:

  • Comprehensive healthcare (medical, dental, and vision) with premiums paid in full for employees and dependents.

  • 401k plan with a generous employer contribution.

  • Short and long-term disability coverage, basic life and AD&D insurance plans.

  • Medical and dependent care FSA options.

  • Flexible PTO policy.

  • Parental leave.

  • Generous equity offering.

The Company reserves the right to modify or change these benefits programs at any time, with or without notice.​

Base Salary Range: $150,000 - $180,000

In accordance with applicable state and federal laws, the range provided is Halcyon’s reasonable estimate of the base compensation for this role. The actual amount may differ based on non-discriminatory factors such as experience, knowledge, skills, abilities, and location. Base pay is one part of the total package that is provided to compensate and recognize employees for their work, and this role may be eligible for additional discretionary bonuses/incentives, and equity in the Company.

We understand it takes a diverse team of highly intelligent, passionate, curious, and creative people to develop the exceptional product we are building. Our dynamic team has incredible perspectives to share, just as we know you do, and we take great pride in being an equal opportunity employer.

Top Skills

Aws Cloudwatch
Azure Sentinel
Elastic
Gcp Security Command Center
Qradar
SIEM
Splunk

Similar Jobs

30 Minutes Ago
Remote
United States
Mid level
Mid level
Information Technology
The Engineering Manager will lead and mentor a small team, drive execution on product initiatives, align engineering priorities with company goals, and champion engineering best practices.
Top Skills: PostgresPython/FlaskReactTypescript
30 Minutes Ago
Remote
United States
Junior
Junior
Information Technology
The B2B Marketing Manager will develop messaging and content, manage demand generation and events, and support marketing operations to engage leaders in target industries.
Top Skills: CanvaFigmaHubspot
30 Minutes Ago
Remote
United States
Entry level
Entry level
Information Technology
As a Backend Software Engineer, you'll collaborate with cross-functional teams to build systems, improve backend services, and maintain user-centric practices.
Top Skills: Python

What you need to know about the Los Angeles Tech Scene

Los Angeles is a global leader in entertainment, so it’s no surprise that many of the biggest players in streaming, digital media and game development call the city home. But the city boasts plenty of non-entertainment innovation as well, with tech companies spanning verticals like AI, fintech, e-commerce and biotech. With major universities like Caltech, UCLA, USC and the nearby UC Irvine, the city has a steady supply of top-flight tech and engineering talent — not counting the graduates flocking to Los Angeles from across the world to enjoy its beaches, culture and year-round temperate climate.

Key Facts About Los Angeles Tech

  • Number of Tech Workers: 375,800; 5.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Snap, Netflix, SpaceX, Disney, Google
  • Key Industries: Artificial intelligence, adtech, media, software, game development
  • Funding Landscape: $11.6 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Strong Ventures, Fifth Wall, Upfront Ventures, Mucker Capital, Kittyhawk Ventures
  • Research Centers and Universities: California Institute of Technology, UCLA, University of Southern California, UC Irvine, Pepperdine, California Institute for Immunology and Immunotherapy, Center for Quantum Science and Engineering

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account