CSIRT Manager

1 day ago


Auburn Hills, Michigan, United States Stellantis Full time

Description
The CSIRT Manager leads the Cyber Security Incident Response Team (CSIRT), operating within Stellantis' Cyber Defense Operations Center (CDOC) and in close partnership with several others cybersecurity teams, and regional stakeholders. You will own the incident response lifecycle, ensure adherence to Stellantis crisis procedures, drive operational excellence (MTTD/MTTR), and cultivate a high performing team in a follow the sun model.

Stellantis is a global mobility leader with the ambition to deliver
clean, safe, and affordable freedom of mobility for all
, guided by the
Dare Forward 2030
strategy and a commitment to
carbon net zero by 2038 (Scopes 1-3)
with interim 2030 decarbonization targets. Our portfolio of iconic brands and strong operational performance underpin this transformation into a sustainable mobility tech company.

Key Responsibilities

  • Own the IR Lifecycle & Escalation: Direct the end-to-end response across preparation, detection/analysis, containment, eradication, recovery, and post incident, following
  • Lead & Develop the Team: Manage, mentor, and schedule CSIRT analysts and leads across shifts and on call rotations within the distributed regional model; drive skills development and readiness.
  • Command During Crises: Serve as Incident Commander for high/critical events and integrate the right SMEs into the crisis cell, ensuring disciplined communications and handoffs as defined in the CSIR crisis process.
  • Metrics & Reporting: Establish, track, and improve KPIs/SLAs (e.g., MTTD, MTTR, containment time, PIR completion) and present status in monthly business reviews and dashboards.
  • Playbooks, Use Cases & Lessons Learned: Ensure playbooks/response procedures are current and threat informed; feed PIR insights back into detections, SOAR workflows, and control hardening in partnership with platform engineering and detection teams.
  • Cross Functional Orchestration: Coordinate with CDOC other products (CTI, Redteam, Monitoring) and Legal/Privacy, Comms, and business/IT/Cloud owners; align to the SOC Target Operating Model and service catalogue.
  • Threat Informed Response: Consume and task Cyber Threat Intelligence and threat hunting to guide scoping, IOCs, and hypotheses; ensure bidirectional feedback between CTI, Red Team, and CSIRT.
  • Tooling & Case Management: Ensure consistent use of the incident/case platform and evidence handling procedures; maintain audit ready documentation and artifacts.
  • Vendor & Retainer Oversight: Govern IR retainer(s) and MSSP engagements; validate service performance and integration with internal processes.
  • Compliance & Governance: Ensure incident handling aligns with Stellantis policy, applicable regulations, and internal governance boards; prepare materials for audits, PIRs, and leadership readouts (per SOC governance and crisis documentation).

Sample Duties

  • Direct major incident bridges, integrate SMEs, and ensure timely executive updates per crisis process; confirm accurate status tracking and next actions.
  • Oversee investigations (host/network/cloud), evidence handling, and scoping; validate containment/eradication and business recovery while maintaining audit‑ready documentation.
  • Run post‑incident reviews and feed structured improvements into playbooks/use cases and control posture, track remediation to closure.
  • Report KPIs/SLAs and risk themes in monthly reviews; align resourcing and tooling roadmaps to findings.
  • Coordinate with CTI for threat‑informed scoping and proactive hunts; ensure bi‑directional intel sharing and IOC packages.

Basic Qualifications

  • Bachelor's degree (or equivalent experience) in Cybersecurity, Computer Science, or related field.
  • 5+ years in SOC/IR roles with 2+ years managing incident response teams or programs in large, distributed enterprises.
  • Demonstrated leadership during high/critical incidents and familiarity with crisis management communications per established escalation matrices.
  • Hands on knowledge of SIEM/SOAR, EDR, network security monitoring, IA detection & Response tools/ framework and cloud/identity telemetry; strong grasp of attacker TTPs and enterprise hardening.
  • Experience operating to structured IR frameworks (e.g., NIST style lifecycle) and running formal after action/lessons learned cycles integrated with use case/playbook updates.
  • Excellent written/oral communication, stakeholder management, and executive reporting skills; comfortable presenting in MBRs and steering forums.

Preferred Qualifications

  • Prior leadership within a CSIRT/CSOC supporting multiple regions and product/OT security stakeholders.
  • Certifications : GCIH, GCFA/GNFA, GCIA, CISSP, OSCP(or comparable).
  • Experience with threat‑informed defense (MITRE ATT&CK), KPI/SLA governance, and MSSP/retainer management.
  • Familiarity with worldwide privacy/security obligations and incident communication expectations in regulated, multi‑jurisdictional environments (in partnership with Legal/Privacy).

Essential Skills & Competences

  • Crisis Leadership: Decisive command in high pressure situations, with disciplined adherence to escalation and executive comms playbooks.
  • Operational Excellence: KPI driven mindset; ability to translate PIR insights into upgraded detections, controls, and automations.
  • Collaboration & Influence: Build strong relationships across CSOC, PSOC, CTI, Red Team, platform engineering, and business/IT owners.
  • Communication: Clear incident narratives, timelines, and executive one pager; ability to brief senior leadership succinctly.

Our Benefits — Designed With You In Mind
Comprehensive Health & Well-being Coverage
From your very first day, you'll have access to medical, dental, vision, and prescription drug coverage — ensuring you and your family stay healthy and protected. Also, our Employee Assistance Program (EAP) offers confidential support for personal and professional challenges, always ready when you need it.

Family Building Benefit
We proudly support all paths to parenthood- including fertility and infertility treatments, adoption services, and gestational surrogacy.

Generous Paid Time Off
We believe in work-life balance. That's why we offer: 17+ paid holidays, including shut-down from December 24th through New Years Day every year. Vacation, float & wellbeing days, sick time and fully paid parental leave when your family needs you most.

Competitive Retirement Savings Plans
We Help You Plan For The Future With

  • An employer match on contributions to your 401k, Roth, and Catch-Up plans
  • An employer contribution, even if you don't contribute

Income Protection & Insurance Options
Benefit from both employer-provided and voluntary plan offerings, including life insurance, group accident, critical illness, etc. - supporting the needs of you and your family and ensuring peace of mind.

Company Vehicle Lease Program
Eligible employees and their immediate families can participate in the company vehicle lease program, providing access to Stellantis vehicles with insurance, maintenance, and unlimited miles included. Plus, take advantage of exclusive discounts on Stellantis products.

Support for Your Growth and Giving Back
We believe in investing in your future and your passions:

  • Tuition reimbursement
  • Student loan refinancing programs
  • 18 paid volunteer hours each year to make a difference in your community

And so much more
When you join us, you're not just building a career — you're joining a company that supports you, inside and outside of work.

At Stellantis, we assess candidates based on qualifications, merit, and business needs. We welcome applications from all people without regard to sex, age, ethnicity, nationality, religion, sexual orientation, disability, or any characteristic protected by law. We believe that diverse teams reflect our identity as a global company, enabling us to better address the evolving needs of our customers and care for our future.

EOE / Disability / Veteran


  • CSIRT Manager

    1 week ago


    Auburn Hills, United States Stellantis Full time

    Description: The CSIRT Manager leads the Cyber Security Incident Response Team (CSIRT), operating within Stellantis’ Cyber Defense Operations Center (CDOC) and in close partnership with several others cybersecurity teams, and regional stakeholders. You will own the incident response lifecycle, ensure adherence to Stellantis crisis procedures, drive...

  • CSIRT Manager

    1 week ago


    Auburn Hills, United States Stellantis Full time

    Description: The CSIRT Manager leads the Cyber Security Incident Response Team (CSIRT), operating within Stellantis’ Cyber Defense Operations Center (CDOC) and in close partnership with several others cybersecurity teams, and regional stakeholders. You will own the incident response lifecycle, ensure adherence to Stellantis crisis procedures, drive...

  • CSIRT Manager

    1 week ago


    Auburn Hills, MI, United States Stellantis Full time

    Description: The CSIRT Manager leads the Cyber Security Incident Response Team (CSIRT), operating within Stellantis' Cyber Defense Operations Center (CDOC) and in close partnership with several others cybersecurity teams, and regional stakeholders. You will own the incident response lifecycle, ensure adherence to Stellantis crisis procedures, drive...

  • CSIRT Manager

    3 days ago


    Auburn Hills, United States Stellantis Full time

    Description: The CSIRT Manager leads the Cyber Security Incident Response Team (CSIRT), operating within Stellantis’ Cyber Defense Operations Center (CDOC) and in close partnership with several others cybersecurity teams, and regional stakeholders. You will own the incident response lifecycle, ensure adherence to Stellantis crisis procedures, drive...


  • Farmington Hills, United States Comerica Bank Full time

    Job Description SOC Analyst III The Security Operations Center is responsible for providing 24/7, 365 monitoring, detection, and response capabilities for Comerica. This includes event, cloud security, and DLP monitoring, as well as a role in the incident response process. The Tier 3 SOC Analyst serves as an escalation point for Tier 1 and Tier 2 Analysts...