ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

Senior Cyber Defense Manager - Incident Response

BoydGaming

Las Vegas, , United States permanent

Posted: March 20, 2026

Interested in this position?

Create a free account to apply with AI-powered matching

Quick Summary

Lead the Cyber Incident Response Program, oversee the full incident response life and ensure maximum value for shareholders, team members and communities.

Job Description

Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities.

Lead the Cyber Incident Response Program

• Oversee the full incident response lifecycle: preparation, identification, containment, eradication, recovery, and post-incident lessons learned (per NIST SP 800-61 or similar frameworks).
• Manage day-to-day incident response operations, including triage, investigation coordination, forensic analysis, and executive-level reporting.
• Develop, maintain, and regularly test incident response playbooks, runbooks, and escalation procedures.

Enhance Detection Capabilities

• Drive continuous improvement of threat detection engineering, including tuning of SIEM rules, EDR/XDR configurations, threat intelligence integration, and behavioral analytics.
• Collaborate with SOC, threat hunting, and security engineering teams to reduce false positives, accelerate mean time to detect (MTTD) and respond (MTTR), and implement proactive detection use cases.
• Lead initiatives to mature internal blue-team capabilities across endpoints, cloud, identity, network, and email environments.

Manage MSSP Services Transition

• Lead the end-to-end transition of MSSP services from the current provider to the new partner, including planning, knowledge transfer, contract/SLA alignment, and cutover execution.
• Conduct due diligence on the new MSSP, define transition success criteria, and mitigate risks during handover (e.g., service continuity, data migration, access controls).
• Establish governance for the new MSSP relationship, including performance monitoring, regular service reviews, incident handoff protocols, and continuous improvement feedback loops.
• Ensure the transition strengthens rather than disrupts detection and response effectiveness.

Team Leadership & Development

• Build, mentor, and lead a high-performing incident response team (internal analysts, responders, and cross-functional partners).
• Provide performance management, career development, and technical coaching to team members.
• Foster a culture of continuous learning, tabletop exercises, red/blue team simulations, and post-incident reviews.
• Stakeholder Collaboration & Reporting
• Serve as the primary point of contact for major incidents, briefing executive leadership, legal, compliance, and external regulators as needed.
• Coordinate with IT, legal, risk, business units, and external partners (e.g., law enforcement, forensics firms) during incidents.
• Produce executive-level reports on incident trends, program maturity, detection improvements, and transition status.

Program Maturity & Compliance

• Align incident response practices with industry standards (NIST, ISO 27001, MITRE ATT&CK, etc.) and regulatory requirements.
• Drive metrics-driven improvements and maturity assessments for the IR program.
• Contribute to enterprise-wide security initiatives, including vulnerability management, threat intelligence, and security awareness.

Required:

• 10+ years of progressive experience in cybersecurity, with at least 5+ years in incident response, digital forensics, or security operations leadership roles.
• Proven experience leading cyber incident response teams and managing complex, high-impact incidents.
• Demonstrated success in vendor/MSSP transitions or outsourcing handovers in a cybersecurity context.
• Strong understanding of detection technologies (SIEM, EDR/XDR, SOAR, threat intelligence platforms) and experience improving detection efficacy.
• Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field (Master's preferred).
• Relevant certifications such as CISSP, CISM, GIAC GCFA/GCIH/GCTI, or similar.

Preferred:

• Experience in a regulated industry (e.g., finance, healthcare, critical infrastructure).
• Hands-on technical experience with tools such as Splunk, Elastic, CrowdStrike, Microsoft Defender, Sentinel, or similar.
• Prior experience building or maturing an internal SOC/IR function while reducing MSSP dependency. Skills & Competencies
• Exceptional leadership, communication, and stakeholder management skills — able to translate technical details for non-technical audiences.
• Strong project/program management abilities, especially in high-stakes transitions. • Analytical mindset with experience in root cause analysis and threat hunting.
• Ability to thrive in a fast-paced, high-pressure environment with on-call responsibilities.
• Strategic thinker focused on long-term program maturity and risk reduction.

Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.

Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply