Support cybersecurity operations by designing, developing or recommending secure technical solutions, including policy, standards, applications, systems, architectures, and infrastructure that are operationally viable and efficient. Ensure appropriate application of security products and technologies to protect the organization's systems and information and enable achievement of the organization's objectives. Manage and design innovative integration of cybersecurity toolsets to enable more automated discovery, remediation, and alerting of network and device vulnerabilities, as a means of improving the security posture. Perform analysis of emerging technologies and design and build architectures and solutions to enable secure implementation of new technologies.
Develop a risk-based cyber security program which meets regulatory requirements and aligns with industry leading information security practices.
• Perform threat identification and mitigation activities using industry leading security controls and tools sets.
•Advance the Company’s cyber threat and vulnerability management program to ensure consistent identification, analysis, response, and monitoring of cyber security threats, events, and vulnerabilities.
•Assess threats to the business and deploy countermeasures for those threats.
•Collaborate with business units, application development teams, and third-party vendors to achieve program requirements while enabling the business.
•Apply technical knowledge to protect the Company against cyber threats (e.g., knowledge of firewalls, intrusion detection and prevention systems, data loss prevention solutions, endpoint protections, log aggregation technology and other leading-edge security technologies).
•Facilitate cross team coordination to achieve defined security goals as well as meet technical requirements in support of detailed implementation plans for security projects.
•Manage security projects to ensure the timely, on budget, and effective implementation of cyber security improvements that are operationally supported with validation methods in place to measure effectiveness.
•Perform assessment of cyber security incidents to identify the root cause, respond, and recover the environment.
•Develop strategies, policy and standards to protect company information and technology assets.
•Manage capital and operational expense budgets to ensure accurate forecasting and administration.
Education: Bachelor’s Degree in Information Security, Computer Science, or related field.
Experience: Minimum 5 years
At least 5 years of experience but typically 7 plus years of experience is required.
• Possess expertise in valuing and implementing industry standards such as the ISO 27001/2, SOC 2, HITRUST and FedRAMP Information Security standard and the ISO 22301 Business Continuity Standard.
• Experience with implementation and operational use of GRC toolsets (Governance Risk and Compliance)
• Possess CISSP certification (or similar) and be knowledge of national and international regulatory compliances and frameworks such as ISO, SOX, BASEL II, EU DPD, HIPAA, and PCI DSS.