Information Security Operations Manager
The Information Security Operation (ISOP) Manager is primarily focused in the security management and administration of the various platforms and operating systems that are in use in the organization, the execution of operating systems and application security controls, and the management of investigations and responses to security events and cybersecurity incidents. The ISOP Manager is also responsible of identity and access management, privileged access management, crypto key management, and the operation and maintenance of the tools that fall under the responsibility of the Information Security Operations area.
In this role, the ISOP Manager will work closely with other members of the team, business units, Information Technology, and customers, to improve processes, meet the information security objectives, and to enforce the company information security program. The ISOP Manager will participate in information security and design reviews, budget development, business case development, tools and vendor selection, gap analyses, risk assessments, policies and standards development, security investigations, KRI and measurements development and reporting, while making sure that activities are performed in time and under budget.
Responsibilities will include:
Performs duties through methods and actions that are consistently ethical and in total compliance with the laws, applicable regulations, Code of Ethics, corporate policies and guidelines and rules of conduct. Completes corporate trainings and certifications intended for the detection and prevention of money laundering related activities and fraud, insider training and conflict of interest policies and procedures, as applicable.
Education and Experience Required
Bachelor's Degree in Computer Science or related field from an accredited institution. Ten (10+) years of combined information security experience working as a security manager and as one or more of the following: security analyst, cyber defense analyst, cyber defense incident responder, vulnerability assessment analyst, incident response analyst, threat/warning analyst, or exploitation analyst in a mission-critical environment. Five (5+) years of management experience managing a team of technical analysts.
Information Security Management Experience in the financial industry or highly regulated Industries is a plus. Strong Project management and interpersonal skills required.
Possession of industry certifications highly preferred including, but not limited to, Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), and Certified Information Systems Auditor (CISA).
Knowledge and Skills Required
• Strong management skills leading people and getting results with a strong customer orientation. • In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; excellent understanding of information security concepts, protocols, industry best practices and strategies • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences • Strong analytical skills to analyze security requirements and relate them to appropriate security controls. Must be able to react calmly and competently in high-stress situations. • Must be able to prioritize work efforts and balance operational tasks with incident response, last minute requests and projects. • Strong knowledge of Windows Security and Unix/Linux security. Knowledge of Database Security and Mainframe and Middleware Security. • Knowledge of cloud service models and how the control environment of those models differentiate from an on-premise environment. • Knowledge of Identity Management Systems and management of privileged users. • Knowledge of computer networking concepts and protocols, and network security methodologies. • Comprehensive knowledge of system security design, network design, defense-in-depth principles, and network security architecture. Skill in evaluating the adequacy of security designs. • Experience working with SIEM and Log Aggregators, IPS/IDS, log/event correlation, event analysis, and threat analysis. Experience working with Incident Response Platforms, Threat Intelligence Platforms, DDoS mitigation, WAF. • Knowledge of the MITRE ATT&CK framework, NIST Cybersecurity Framework, NIST SP 800-53, PCI DSS, PCI PIN, Lockheed Martin Cyber Kill Chain, FFIEC Information Security Handbook, compliance standards, controls and remediation technologies, solutions, and processes. • Must Understand Gramm-Leach Billy ACT (GLBA) Sarbanes-Oxley ACT (SOX) SSAE-16, ISO 27001 Standards, Payment Card Industry Data Security Standard (PCI DSS). Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. • Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.). • Knowledge of cyber incident response and handling methodologies.
Monday to Friday from 8:00 AM - 5:00 PM
Available to work extended hours, weekends and/or holidays as needed and the availability to travel as required supporting projects in the region.