Dir, Enterprise Security Operations

General Communication   •  

Anchorage, AK

Industry: Telecommunications


11 - 15 years

Posted 186 days ago

This job is no longer available.

The Dir, Enterprise Security Operations through the management of an enterprise-wide security operations center and program; enables the business to operate securely, protect its people, defend its assets and preserve shareholder value

The position is responsible for the management and constant improvement of operational security controls and processes; such as incident response and vulnerability management.

    Leadership (Departmental and staff related activities):

  • Requires the ability to perform highly complex and diverse duties under deadlines and operating constraints. Capable of delivering large, highly complex projects, often involving the coordination of activities of other business units in the company.  

  • Requires ability to develop, recommend, and execute plans and programs with greater organizational impact.

  • Must have knowledge and technical expertise in the area of responsibility and company policies/procedures. 

  • Position is expected to provide functional leadership, oversight and guidance to staff and groups assigned, while fostering teamwork within area of responsibility.

  • Responsible for hiring, leading, developing and managing the performance by those reporting to this position, establishes and communicates clear performance expectations, and makes recommendations for salary increases.


Continously improve and advance the organizations operation security capabilities, focusing on process and procedures.

  • Security Operations (prevention & identification):

  • Oversee the organization's security operations.

  • Research, develop, and implement security plans and policies associated with the organization's communications and other business systems.

  • Provide leadership to Security Operations Center; ensuring effective operational procedures are in place along with all tasks, activites and controls necessary to run a 24x7 SOC.

  • Responsbile for the clear communication of the current threat and vulnerability landscape.

  • Lead the development of operational security controls, procedures and tools to defend people and assets against current and emerging securitythreats/risks.

  • Lead the development  and implementation of security configurations and standards.

  • Management of escalations and exception requests.

  • Establish reporting and information sharing relationships with external organizations for the purpose of tracking threat intelligence and security incidents within the region and the industry.

  • Provide regular and consistent reporting as to the status of security operations.

Security Program Management: Actively participate in the ESO management team. Support other ESO directors and managers to advance their department’s programs and achieve their goals. Contribute to the overall maturity of the information security program.

  • Security Program Administration (preparation & prevention):

  • Lead the continuous development of operational security policies, procedures & standards.

  • Manage and supportrisk based assessments of systems, networks, applications and vendors based upon contractural requirements, security policies, best practices and industry standards/regulations; reporting findings and assisting in remediation of vulnerabilities.

Knowledge, Skills, Abilities:

  • Leadership and Management:

  • Proven ability to lead an organization to high levels of performance while maintaining morale and personal growth for employees in a union free environment. Ability to act as a positive mentor and coach to subordinates and instill a coaching environment in the organization.

  • Proven ability to implement and executive against stragtegric vision.

  • While technically compentent, able to maintain focus on Leadership and Management responsibilities.

  • Ability to develop detailed capital and operating budgets for the department. Familiar with reporting and tracking tools necessary to assure budget guidelines meet expectations.

  • Demonstrated ability to analyze complex challenging problems and situations leading to optimal solutions.

  • Ability to develop the organization necessary to meet the group mission and to interface with other units within the company.

  • Excellent verbal and written communication required. Must be able to articulate information in presentation format in front of internal and external customers.

  • Technical Competencies:

  • Ability to work independently, manage projects, and exercise judgement in reaching solutions.

  • In-Depth understanding and working knowledge of information security data and processes.

  • Ability to work and coordinate with multi-team environment including program managers, business analyst, IT analyst and other security professionals.

  • Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.

  • Demonstrated experience with networks, information classifications, and confidentiality requirements associate with high security environments.

  • Knowledgeable of technological trends and developments in the area of information security and risk management.

  • Knowledge of firewalls, anti-virus, intrusion detection/intrusion prevention systems, virtual private networks, remote access systems, networkzoning, centralized monitoring, and application scanning.

  • Knowledge of information security and risk control frameworks, business continuity, and IT disaster recovery frameworks.

  • Knowledge and experince of operation methodologies, such as ITIL.

  • Experience in creation, design, development and implementation of dashboards.

  • People, Team and Self: 

  • At all times is a model example of GCI’s values, principles, ethics and code of conduct, is a model example of integrity and trustworthiness, honors the confidentiality of information entrusted to them, promotes, and fosters the mission statement for the Enterprise Security Office.

  • Ability to develop and maintain productive relationships with peers and managers across the enterprise.

  • A strong customer/client focus, with the ability to manage expectations appropriately, to provide a superior customer/client experience and build long-term relationships.

  • Demonstrated ability to discuss complex technical details with extended support staff and translate into non-technical communication.

  • Strong analytical skills to analyze security requirements and relate them to appropriate security controls.

  • Ability to interact with GCI's personnel at all levels and across all business units and organizations, and to comprehend business imperatives.

  • Ability to work independently while handling multiple projects with changing priorities and deadlines.

  • Excellent verbal and written communication skills and the ability to interact professionally with a diverse group of executives, managers, and subject matter experts.

  • Excellent organizational, planning and time management skills

  • Ability and capability to work with only minimal supervision.

  • Strong written, verbal and presentation communication skills.

  • Ability to work flexible hours and some weekend work may be required

Minimum qualifications:

  • Minimum of twelve (12) years of professional (relevant) experience in; Information Security, Cyber Security, Physical Security, Information Technologyinfrastructure, application development, support & operations, systems administration, access control, cryptography, technology architecture, critical analysis, disaster recovery, investigations, compliance, or technical legal areas (such as those involved in law enforcement, prosecution, defense, or forensics). To include:

    • Minimum of ten (10) years’ experience in Information / cybersecurity;

    • Minimum of five (5) years of managerial experience with proven experience building and leading strong teams.

    • Minimum of four (4) years’ involving production operations; e.g.  incident, change, service management.

  • High School diploma or equivalent is required. 

  • Bachelor Degree in computer science, technology, security or in relevant field required. In addition to minimum experiencerequired, degree may be substituted on a year for year basis with relevant exempt work experience on a year for year basis. Masters Degree is desired.

  • Certifications:Industry specific certifications are highly valued and can contribute toward education. Three (3) of the following certifications are highly desired

    • CISA: Certified Information Security Auditor

    • CRISC: Certified in Risk and Information Systems Control

    • CISSP: Certified Information Systems Security Professional

    • CISM:   Certified Information Systems Manager

    • GSLC:  GIAC Security Leadership

    • CSX Certificate, CSX Practitioner, or CSX Specialist

    • Other applicable IT, Information Security and Compliance related Certifications