← All Jobs
Posted Apr 6, 2026

Incident Response Manager

Apply Now ✨
%3Cp%3EYour potential has a place here with TTEC’s award-winning employment experience. As an Incident Response Manager working remote in the United States, you’ll be a part of bringing humanity to business. #experienceTTEC%3C/p%3E%3Cp%3EOur employees have spoken. Our purpose, team, and company culture are amazing and our Great Place to Work® certification in the United States says it all!%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cstrong%3EWhat You’ll be Doing:%3C/strong%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3EAs part of our Information Security team, you will%26nbsp;support the compliance lifecycle needs of existing Federal clients as well as consult on new projects’ information security and compliance needs. %26nbsp;This role will provide vulnerability-management services to project teams, client personnel and on-behalf of stakeholders to comply with a federal agency’s comprehensive security program and the NIST Risk Management Framework (RMF).%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;%22%3E%3Cstrong%3EDuring a Typical Day You’ll:%3C/strong%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3ELead Incident Orchestration efforts, serving as the primary responder for security incidents escalated by the SOC, including coordination of containment, eradication, and recovery activities across technical teams. [Security E...ponse Plan | PDF]%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EManage and mentor a high%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eperforming Incident Response and Security Analyst team, providing hands%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eon technical guidance, coaching, and professional development to strengthen detection and response capabilities.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EDevelop, maintain, and continuously improve the Incident Response Plan (IRP) and detailed playbooks for a range of threat scenarios, including ransomware, phishing, insider threat, and third%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eparty incidents, ensuring alignment with FedRAMP and NIST RMF requirements. [Security E...ponse Plan | PDF], [Incident R...n Test SOP | PDF]%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EDesign and facilitate tabletop and simulation exercises to test incident readiness, validate executive and technical response procedures, and identify gaps prior to real%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eworld events. [Incident R...n Test SOP | PDF]%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3ETranslate complex technical findings into clear, actionable communications for Legal, HR, PR, executive leadership, and client stakeholders during and after security incidents.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EConduct Post%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3EIncident Reviews (Post%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3EMortems) to assess root cause, response effectiveness, and control gaps, driving continuous improvement of security posture, policies, and processes. [Incident R...n Test SOP | PDF]%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EConfigure and execute vulnerability scans of FedRAMP%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eauthorized environments, analyze results, and lead remediation discussions with technical and business stakeholders.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EPrepare, validate, and maintain security and compliance documentation, including System Security Plans (SSP), Risk Assessments (RA), Contingency Plans (CP), Privacy Impact Assessments (PIA), and FIPS categorizations.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EProvide end%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eto%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Eend security lifecycle support for major applications supporting Federal clients, partnering closely with project teams and customer stakeholders.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EAdvise internal and client teams on remediation of security and privacy weaknesses, balancing risk, compliance, and operational impact.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EPrepare and deliver security and privacy awareness training tailored to technical teams, business users, and leadership audiences.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3EIdentify, track, and manage POA%26amp;Ms, driving corrective action plans through remediation and closure.%3C/p%3E%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22line-height:normal;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;%22%3E%3Cspan style=%22mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3ECollaborate with cross%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;%22%3E%3Cspan style=%22mso-bidi-font-family:%26quot;Cambria Math%26quot;;%22%3E‑%3C/span%3E%3C/span%3Efunctional teams to support Security Assessment %26amp; Authorization (SA%26amp;A) / C%26amp;A activities, audits, and continuous monitoring efforts.%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cstrong%3EWhat you Bring to the Role:%3C/strong%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E• 3+ years of experience in Federal government information security and privacy providing direct support to project teams and client stakeholders%3Cbr%3E• 7+ years in CyberSecurity with 4+ years of hands-on experience with industry-standard vulnerability management tools such as Qualys, Tenable, or Rapid7%3Cbr%3E• Perform vulnerability assessments, conduct research and evaluate relevant risks to the findings%3Cbr%3E• Write runbooks to assist junior-level Engineers and other team members with appropriate reactions and activities based on finding types%3Cbr%3E• Capable of self-direction in situations involving complex vulnerabilities that require in-depth troubleshooting%3Cbr%3E• Ensure solid communication with key stakeholders, including progress on issues or findings and setting relevant expectations%3Cbr%3E• Must be able to participate in and / or lead security assessments and audits Experience with Protected Health Information (PHI), Personally Identifiable Information (PII) in Federal healthcare programs and Payment Card Industry Data Security Standard (PCI DSS)%3Cbr%3E• Experience in preparing security documentation, evaluating and documenting security and privacy controls, and completing non-technical analysis activities%3Cbr%3E• Experience with FedRAMP, NIST 800-53 Rev 4 (or 800-171) or agency equivalent%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cstrong%3ENice To Have%26nbsp;%3C/strong%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E• Some experience with common penetration tools/frameworks (Open Source or Commercial)%3Cbr%3E• Bash and/or Python scripting experience and building API-based integrations%3C/p%3E%3Cp%3E%3Cstrong%3EWhat You Can Expect%3C/strong%3E%3C/p%3E%3Cul%3E%3Cli%3EThis is a 100% work from home position.%3C/li%3E%3Cli%3EWorking with a company and team that is supportive of your career and professional development%3C/li%3E%3Cli%3EAn inclusive culture and community minded organization where giving back is encouraged%3C/li%3E%3Cli%3EA global team of curious lifelong learners guided by our company values%3C/li%3E%3Cli%3EPaid time off (PTO) plus wellness and healthcare benefits%3C/li%3E%3Cli%3EAnd yes... a great compensation package and performance bonus opportunities, benefits you%27d expect and maybe a few perks that would pleasantly surprise you (like tuition reimbursement)%3C/li%3E%3Cli%3EVisit TTEC Benefits for U.S. Employees | TTEC for more information.%3C/li%3E%3C/ul%3E%3Cp%3EThe anticipated range is %24120,000-140,000. Actual compensation offers to a candidate may vary based upon geographic location, work experience, education and/or skill levels.%3C/p%3E%3Cp%3E%3Cstrong%3EAbout TTEC%3C/strong%3E%3Cbr%3EOur business is about making customers happy. That%27s all we do. Since 1982, we%27ve helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology. On behalf of many of the world%27s leading iconic and hypergrowth brands, we talk, message, text, and video chat with millions of customers every day. These exceptional customer experiences start with you.%3C/p%3E%3Cp%3ETTEC is proud to be an equal opportunity employer where all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. TTEC embraces and is committed to building a diverse and inclusive workforce that respects and empowers the cultures and perspectives within our global teams. We aim to reflect the communities we serve, by not only delivering amazing service and technology, but also humanity. We make it a point to make sure all our employees feel valued, belonging, and comfortable being their authentic selves at work. As a global company, we know diversity is our strength because it enables us to view things from different vantage points and for you to bring value to the table in your own unique way.%3C/p%3E