Cybersecurity Infrastructure Manager - Network Security

27 Nov 2024

Vacancy expired!

As a member of the IT Management Team, you are responsible for managing, developing, and leading a team of employees. Your role includes leading the specific functional responsibilities of your team, which involves overseeing team performance and deliverables. However, your role as a leader within our organization requires more than the management of resources and day-to-day operations. As a steward of the company, you are charged with the development and execution of your team’s strategic vision and plan and ensuring that your team’s actions align with the larger goals of the company and the IT Division.

The Cybersecurity Infrastructure Manager is responsible for coordinating analysis, reviews, and other tasks necessary to protect the integrity and confidentiality of the company's information and information systems. This position will provide strong leadership, direction, and guidance to Senior IT Management on Information Security issues. The three main areas of responsibility include, but are not limited to: 1) providing for the development and maintenance of the Cybersecurity program and the protection of key information system resources; 2) aligning information security best practices with business requirements; and 3) managing the Cybersecurity team in alignment with corporate business objectives.

This position will ensure that our Network Security program provides a comprehensive approach to delivering core Network Security and Security Logging capabilities to the company at scale globally. The individual in this role will enable discovery, monitoring, detection, and mitigation of security threats both internally and externally for the company's network. Additionally, this individual will build meaningful relationships with teams and management. This role will drive implementation, execution, metrics, and sustainability of program objectives that allow security teams to continuously improve our ability to protect and respond to vulnerabilities and threats to our global footprint.

As the primary conduit between your employees and upper leadership, your role in communicating and modeling the values and guiding principles of our company culture is of vital importance. All members of IT Management should strive to consciously and consistently foster a culture of engagement, trust, and “open door” communication.

If you want to be a part of one of the BEST “to work for” companies in the world, simply apply and let your career be reimagined.

ROLE

INTEGRITY: When achieving benchmarks and goals, use methods/strategies that are consistent with the Code of Ethics and the Standard of Ethics for Managers and Supervisors. Always leads by example. Appropriately handles employee concerns and follows through to resolution.MEMBER SERVICE: Provides and ensures staff provides an exceptional member experience.ADMINISTRATION: Ensures proper department coverage (writing schedule and break aids if needed). Understands department budget, able to research and explain budget variances.MANAGING PERFORMANCE: Coaches and mentors employees to provide support and guidance. Has regular open and honest conversations with employees to discuss work performance and career development. Identifies learning opportunities to strengthen employee knowledge, skill and ability.COMMUNICATION: Regularly shares information with employees via meetings and one-on-one conversations. Successfully navigates difficult conversations with employees, members, and suppliers. Listens, expresses empathy and adapts to get point across. Addresses issues immediately to ensure a timely resolution and to avoid escalating the situation. Consistently demonstrates business knowledge during interactions with senior management.SELF-MANAGEMENT: Demonstrates sound judgement, taking a partner when necessary. Ability to maintain self-control in the face of hostility or provocation or in intense, hectic situations.INCLUSION: Encourages different approaches and ideas to work and to accomplish goals. Seeks employee input. Takes the time to get to know or reach out to candidates who show potential that may not come forward on their own.COMPLIANCE AND SAFETY: Takes measures to ensure employee and member information is kept confidential and adheres to IS security policy.Translates business goals into security practices, policies, standards, guidelines, procedures, and other elements of an infrastructure to support corporate information security.Monitors new and emerging security, compliance, and privacy related requirements, technologies, trends, issues, and solutions, and assesses their applicability to our key business initiatives and business strategies.Provides advice and consulting to senior management and the organization in the development, implementation, and administration of actions to meet these emerging requirements.Coordinates and monitors information security activities throughout the organization, including the preparation of periodic status and progress reports to applicable parties, leadership teams, and stakeholders.Hires, trains, and mentors Information Security team members.Understands and executes against outcome-based goals and strategy for this area and supports all IT divisional goals and initiatives.Establishes and develops a productive relationship between this area and other appropriate departments and outside suppliers.Presents fact-based, objective assessments of information security and compliance risks to management and acts on their direction for responding to such threats.Maintains an Information Security Business Plan that reflects the strategic direction within IT and provides annual and as-needed updates to management.Ensures that the team is properly staffed and trained to meet these planned/approved objectives.Communicates and creates presentations, as required, to mid-level, upper-level management, and other personnel.Leads the team in developing and driving KPI’s and metrics.Delivers regular vulnerability reports that will be presented to our Information Security Leadership and IT Executives.Strives to continuously improve current vulnerability and asset management assessment coverage depth, quality, and capabilities through new services or processes.REQUIRED

5+ years’ in a Manager or leadership role with demonstrated strong team-building skills with diverse teams.Ability to define, communicate, and execute on a vision and strategy.Conversant in technology matters related to security, architecture, emerging InfoSec trends, compliance, and risk.Experience working with Network Security Monitoring and IDS tools like Stealthwatch, Security Onion, Suricata, Snort, Bro, Zeek, etc.Experience with Firewall and Routing platforms like Fortigate, Cisco, Juniper, Palo Alto, Azure Firewall, and Azure Network Security Gateways.Experience with Firewall Configuration Management and Automation tools like Firemon.Experience with Firewall ACL reviews and procedures.Experience with logging technologies such as SyslogNG, Splunk, etc.Experience with Network Segmentation.Excellent communication skills, both oral and written, that can communicate security and compliance issues to executives, end users, and security experts in an effective and appropriate manner.Outstanding customer/client relations skills to ensure that security and business objectives are always in alignment and a flexible and business-oriented focus on security matters.Must be extremely responsive, with a strong sense of urgency.Able to work well under stress and handle crisis situations professionally.Scheduling flexibility to meet the needs of the business, including weekends, holidays, and 24/7 on call responsibilities on a rotational basis.Ability to travel as needed, including internationally.Recommended

5+ years’ in an engineering and/or architectural role.Experience leading Information Security or Compliance functional teams.A deep understanding of cybersecurity threats, vulnerabilities, controls, and remediation strategies in global enterprise environments.Strong organizational skills with ability to handle multiple high visibility issues simultaneously.Experience managing budgets ($5M+) over the course of Months, Quarters, and Years.Experience with Web Application Firewall technologies like Akamai Kona Site Defender or Azure WAF.Experience working with Cloud Environments and Services such as Azure, Google Cloud, Etc.An understanding of Micro Segmentation and Zero Trust Network Architecture (ZTNA).Experience managing Linux systems at scale in an enterprise environment.An ability to communicate complex and technical issues to diverse audiences, verbally and in writing, in an easily-understood, authoritative, and actionable mannerPrevious management experience over highly technical teams.Hands-on experience related to security design, architecture, incident response, and strategic planning.Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and/or Certified Information Systems Auditor (CISA) status or equivalent.Experience with Agile and other iterative methodologies.Possess experience with common information security management frameworks, such as International Standards Organization (ISO) /27001, the IT Infrastructure Library (ITIL) and Control Objectives for Information and Related Technology (COBIT) frameworks.

  • ID: #23552450
  • State: Washington Seattle-tacoma 98101 Seattle-tacoma USA
  • City: Seattle-tacoma
  • Salary: $160,000 - $190,000
  • Job type: Permanent
  • Showed: 2021-11-27
  • Deadline: 2022-01-25
  • Category: Et cetera