Dir, Enterprise Security Operations

General Communication   •  

Anchorage, AK

Industry: Telecommunications

  •  

11 - 15 years

Posted 39 days ago

Manage and oversee the Security Operations Center (SOC) and the teams responsible for the real-time protection of the Enterprise. Inspire the teams to deliver high levels of performance and quality results while maintaining morale. Act as a positive mentor and coach, with both technical and soft skills. Perform timely management duties, such as annual performance reviews, hiring, and promotions. Responsible for communicating clear expectations and prioritization to, and measuring and reporting upon those expectations to management.· Leadership (Departmental and staff related activities):

  • Requires the ability to perform highly complex and diverse duties under deadlines and operating constraints. Capable of delivering large, highly complex projects, often involving the coordination of activities of other business units in the company.
  • Requires ability to develop, recommend, and execute plans and programs with greater organizational impact.
  • Must have knowledge and technical expertise in the area of responsibility and company policies/procedures.
  • Position is expected to provide functional leadership, oversight and guidance to staff and groups assigned, while fostering teamwork within area of responsibility.
  • Responsible for hiring, leading, developing and managing the performance by those reporting to this position, establishes and communicates clear performance expectations, and makes recommendations for salary increases.

Continuously improve and advance the organizations operation security capabilities, focusing on process and procedures.

  • Security Operations (prevention & identification):
  • Oversee the organization's security operations.
  • Research, develop, and implement security plans and policies associated with the organization's communications and other business systems.
  • Provide leadership to Security Operations Center; ensuring effective operational procedures are in place along with all tasks, activities and controls necessary to run a 24x7 SOC.
  • Responsible for the clear communication of the current threat and vulnerability landscape.
  • Lead the development of operational security controls, procedures and tools to defend people and assets against current and emerging securitythreats/risks.
  • Lead the development and implementation of security configurations and standards.
  • Management of escalations and exception requests.
  • Establish reporting and information sharing relationships with external organizations for the purpose of tracking threat intelligence and security incidents within the region and the industry.
  • Provide regular and consistent reporting as to the status of security operations.

Security Program Management: Actively participate in the ESO management team. Support other ESO directors and managers to advance their department’s programs and achieve their goals. Contribute to the overall maturity of the information security program.

  • Security Program Administration (preparation & prevention):
  • Lead the continuous development of operational security policies, procedures & standards.
  • Manage and support risk based assessments of systems, networks, applications and vendors based upon contractual requirements, security policies, best practices and industry standards/regulations; reporting findings and assisting in remediation of vulnerabilities.

Project and Resource Management: Working with the department’s Program/Project Management Office, ensure the successful implementation of complex new security systems, controls and processes. Collaborate with internal and external resources in order to achieve successful outcomes. Finalize documentation and support materials for assigned technology systems and infrastructure. Participate with defining, monitoring and reporting upon control compliance and effectiveness.

  • Incident Response (detection, eradication, containment & recovery):
  • Provides calm and clear leadership during major security incidents.
  • Develop and ensure the (24x7) ability of the SOC to rapidly respond to, contain and eradicate security incidents.
  • Continuous improve and refine the securityincident management process.
  • Oversee fraud and forensic investigations
  • Oversee and manage security violations and incidents.
  • Oversee post-event reviews of security incidents and present root cause analysis and recommendations.

Vendor, Contract and Budget Management: Responsible for departmental and project budgets and ensuring efficient use of resources. Manages vendor relationships to ensure quality services. Manages ESO contracts and procurement of security solutions in collaboration with procurement and legal. Knowledge, Skills, Abilities:

  • Leadership and Management:
  • Proven ability to lead an organization to high levels of performance while maintaining morale and personal growth for employees in a union free environment. Ability to act as a positive mentor and coach to subordinates and instill a coaching environment in the organization.
  • Proven ability to implement and executive against strategic vision.
  • While technically competent, able to maintain focus on Leadership and Management responsibilities.
  • Ability to develop detailed capital and operating budgets for the department. Familiar with reporting and tracking tools necessary to assure budget guidelines meet expectations.
  • Demonstrated ability to analyze complex challenging problems and situations leading to optimal solutions.
  • Ability to develop the organization necessary to meet the group mission and to interface with other units within the company.
  • Excellent verbal and written communication required. Must be able to articulate information in presentation format in front of internal and external customers.

  • Technical Competencies:
  • Ability to work independently, manage projects, and exercise judgement in reaching solutions.
  • In-Depth understanding and working knowledge of information security data and processes.
  • Ability to work and coordinate with multi-team environment including program managers, business analyst, IT analyst and othersecurity professionals.
  • Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.
  • Demonstrated experience with networks, information classifications, and confidentiality requirements associate with high security environments.
  • Knowledgeable of technological trends and developments in the area of information security and risk management.
  • Knowledge of firewalls, anti-virus, intrusion detection/intrusion prevention systems, virtual private networks, remote access systems, networkzoning, centralized monitoring, and application scanning.
  • Knowledge of information security and risk control frameworks, business continuity, and IT disaster recovery frameworks.
  • Knowledge and experience of operation methodologies, such as ITIL.
  • Experience in creation, design, development and implementation of dashboards.

  • People, Team and Self:
  • At all times is a model example of GCI’s values, principles, ethics and code of conduct, is a model example of integrity and trustworthiness, honors the confidentiality of information entrusted to them, promotes, and fosters the mission statement for the Enterprise Security Office.
  • Ability to develop and maintain productive relationships with peers and managers across the enterprise.
  • A strong customer/client focus, with the ability to manage expectations appropriately, to provide a superior customer/client experience and build long-term relationships.
  • Demonstrated ability to discuss complex technical details with extended support staff and translate into non-technical communication.
  • Strong analytical skills to analyze security requirements and relate them to appropriate security controls.
  • Ability to interact with GCI's personnel at all levels and across all business units and organizations, and to comprehend business imperatives.
  • Ability to work independently while handling multiple projects with changing priorities and deadlines.
  • Excellent verbal and written communication skills and the ability to interact professionally with a diverse group of executives, managers, and subject matter experts.
  • Excellent organizational, planning and time management skills
  • Ability and capability to work with only minimal supervision.
  • Strong written, verbal and presentation communication skills.
  • Ability to work flexible hours and some weekend work may be required

Minimum qualifications:

  • Minimum of twelve (12)years of professional (relevant)experience in; InformationSecurity, CyberSecurity, PhysicalSecurity,Information Technologyinfrastructure, application development, support & operations, systems administration, access control, cryptography,technologyarchitecture, critical analysis, disaster recovery,investigations, compliance, or technical legal areas (such as those involved inlaw enforcement, prosecution, defense, orforensics). To include:
    • Minimum of ten (10) years’ experience in Information / cybersecurity;
    • Minimum of five (5) years of managerial experience with proven experience building and leading strong teams.
    • Minimum of four (4) years’ involving production operations; e.g. incident, change, service management.
  • High School diploma or equivalent is required.
  • BachelorDegree in computer science, technology, security or in relevant field required. In addition to minimum experiencerequired, degree may be substituted on a year for year basis with relevant exempt work experience on a year for year basis. Masters Degree is desired.
  • Certifications: Industry specific certifications are highly valued and can contribute toward education. Three (3) of the following certifications are highlydesired
    • CISA: Certified Information SecurityAuditor
    • CRISC: Certified in Risk and Information Systems Control
    • CISSP: Certified Information Systems Security Professional
    • CISM: Certified Information Systems Manager
    • GSLC: GIAC Security Leadership
    • CSX Certificate, CSX Practitioner, or CSX Specialist
    • Other applicable IT, Information Security and Compliance related Certifications
  • Driving Requirements (if applicable): Must possess and maintain a valid driver’s license, proof of insurance and a satisfactory driving record.

18000454