Senior Manager of Security Engineering and Operations

Recruiter
Request Technology - Anthony Honquest
Location
Lake Forest
Salary
150000.00 - 175000.00 USD Annual + bonus
Posted
23 May 2017
Closes
30 May 2017
Job Title
Director
Contract Type
Permanent
Hours
Full Time

Prestigious Organization is seekings Senior Security and Engineering Operations Manager. This individual is responsible for 2 managers, 10 individuals, a MSSP and 2 contractors. All cyber security, SEIM, Firewall, Infrastructure, IDS, endpoint, PCI, wireless, cloud based. Looking for strong management experience and the ability to lead teams.

This includes:

  • Develop and execute a compelling operational security strategy including Detection and Response, Identity and Access Management, Network Security, and System Security
  • Oversee the analysis of business requirements and the subsequent interpretation into security requirements internally and externally
  • Partner with security executives across the organization to help envision and deliver company-wide security initiatives
  • Evaluate, prioritize, and resource security projects and programs based on input from appropriate stakeholders
  • Evaluate, implement, and support security-focused tools and services
  • Collaborate with other corporate functions including Internal Audit, Legal and Compliance, Privacy, and Enterprise Sourcing to ensure that the organization maintains a strong security posture
  • Liaise with Business Information Security Officers (BISOs) for cyber security and IT Risk & Compliance Management program needs within the business units
  • Develop and manage a security budget and develop strategic plans to invest resources to efficiently reduce cyber security risk
  • Oversee the analysts' daily tasking.
  • Manage the team's scheduling.
  • Ensure effective incident management.
  • Identify chronic operational and security issues, and ensure they are managed appropriately.
  • Manage and escalate roadblocks that may jeopardize security monitoring operations, infrastructure, and SLAs.
  • Serve as a senior mentor to SOC staff.
  • Interface and collaborate with outside teams.
  • Track tactical issues in execution of SOC responsibilities.
  • Document and track analyst training requirements.
  • Ensure analysts follow existing procedures and all procedures are documented in accordance with local guidelines.
  • Manage the process improvement program for SOC processes.
  • Management, maintenance, and rule creation for SIEM

Incident Response

  • Serve as focal technical lead on incident events and incidents.
  • Must be highly technical, hands-on and also capable of serving as the primary point of contact with senior management
  • Investigate network intrusions and other cyber security incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.
  • Summarize events/incidents effectively to different constituencies such as legal counsel, executive management and technical staff, both in written and verbal forms.
  • Managing the chain of custody for all evidence collected during incidents and security investigations
  • Create a curriculum and conduct in-house training sessions, individualized if needed, for IR staff, to ensure appropriate development of skills and continued innovation as well a facilitating incident management team exercises and events

Qualifications:

  • Bachelor's Degree in Information Security, Computer Science or equivalent; or 7 years' comparable work/military experience
  • Security Certifications such as CISSP, ECIH, GCIA, and/or GCIH
  • Strong background in security operations, process, solutions and technologies
  • Experience interfacing with other internal or external organizations regarding failure and incident response situations
  • 3+ years of experience leading teams utilizing a Security Incident Event Management Solution
  • 5+ years of experience in security incident handling and forensics skills including knowledge of common probing and attack methods, network/service discovery, system assessment, viruses and other forms of malware.
  • Experience mitigating and addressing threat vectors including Advanced Persistent Threat (ADT), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc.
  • Knowledge of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks and exploits
  • Excellent verbal communication skills, strong analytical and organizational skills. Strong analytical skills to define risk, identify potential threats, and develop action/mitigation plans.
  • Ability to manage expectations with multiple stakeholders on projects and programs in conjunction with information security team
  • Demonstrated personal integrity, the ability to professionally handle confidential matters and exhibit the appropriate level of judgment and decision making commensurate with the position and responsibilities
  • Demonstrated initiative, dependability, and ability to work with little supervision
  • Travel (including international) is possible. Evening and weekend hours should be anticipated
  • Ability to acquire a US government clearance a plus