Manager Cyber Defense Threats and Vulnerabilities

Request Technology - Robyn Honquest

Posted on Nov 7, 2023 by Request Technology - Robyn Honquest
Chicago, IL, 60601
IT
Immediate Start
$155k - $160k Annual
Full-Time

Manager, Cyber Defense Threats and Vulnerabilities

SALARY: $160k plus 15%

LOCATION: Chicago, IL

Hybrid 3 days remote 2 days onsite

Looking for a Manager over Cyber defense threats & vulnerabilities. You will manage security tools and lead 3-5 employees. Cyber threats digital forensics incident response application security operating systems cryptographic networking 24/7 on-call support SIEM crowdstrike axiom encase FTX blue coat forefront DSS wireshark snort Active Directory security IAM permissions LDAP SSO

The Manager, Cyber Defense will help plan actions and lead security professionals in the analysis and determination of threats to the enterprise, vulnerabilities in the environment, and how our company will best defend itself against these threats. This position will require initiative to oversee security technology implementations and be expected to put together projects and teams to remediate identified security threats, incidents, and compliance issues.

  • Manage security tools including appliances, hosted systems, and SaaS - including health checks, version updates, and content development.
  • Validate content changes to security tools are appropriate from other analysts and teams.
  • Report on and enhance current metrics surrounding security tool capabilities and efficacy.
  • Take a lead role in the systems life cycle performing upgrades, implementation of new technologies, and enhancement identification.

Team Management

  • Lead 3-5 employees and contingent labor professional for the cyber systems function within Cyber Defense.
  • Manage team effectively in delivery of incident resolution, project tasks, compliance milestones, and systems implementations.
  • Perform talent management functions across the team, including performance reviews, direct feedback, and other administrative functions as required.

Incident Management and Security Response Actions:

  • Lead cyber security incident responders in response activities including investigation, coordination, review, and reporting.
  • Oversee technical analysis of security events while coordinating incident response activities with internal and external teams.
  • Ensure and directly oversee the collection and preservation of data associated with cyber security incident response activities following industry best practices and established procedures.
  • Develop and support briefings to senior management as a trusted incident responder.

Supervisory Responsibilities:

  • Manages all members of the Cybersecurity team within Security Services. Assigns personnel to projects, directs their activities, and performs personnel actions (hiring, promotions, terminations, etc.)
  • Confer with and advise subordinates on administrative policies and procedures, technical problems, priorities, and methods.
  • Promote employee development by conducting career-planning sessions with staff and selecting and scheduling employee training classes, conferences, and seminars

Qualifications:

Technical Skills:

  • SIEM solutions
  • Experience with Crowdstrike solutions
  • Forensic analysis tools (Axiom, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront) solutions
  • Network sniffers and packet tracing tools (DSS, Ethereal and tcpdump, WireShark).
  • Intrusion Detection & Prevention Tools such as SNORT/Sourcefire, Palo Alto, etc.)
  • Encryption technologies (PGP, PKI and X.509)
  • Hands on experience with network architecture, including network security.
  • Hands on experience with Active Directory Security, including scans, best practices and security configuration.
  • Hands on experience with Application Security controls including design, dynamic scans, static code analysis.
  • Hands on experience with Incident Reponses process, procedures and Tools
  • Identity and access management (I&AM) experience with Active Directory, NTFS permissions, LDAP and Single Sign On (SSO) solutions.
  • Industry-standard metrics and measurements for SOC effectiveness
  • Risk management in the context of the NIST CSF or another industry-standard framework
  • Passion for creating tools and automating processes.
  • Standard technical writing tools including MS Word, Excel, Project and Visio

Familiarity with:

  • Industry-standard operating systems and environments such as Microsoft Windows and Linux distributions, in data center and cloud environments.
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Fundamental understanding of the underlying protocols and data used as the basis for the security monitoring service, including: HTTP, HTTPS, SQL, TCP/IP, Active Directory
  • Application and database security experience
  • Network and security engineering experience, including log and network traffic capture analysis.
  • Experience with assessing system hardening procedures for Windows, Linux
  • Security policy, standards, governance, privacy and regulatory experience (eg, NIST, COBIT).
  • Knowledge of BYOD and Mobile Device Management platforms.
  • Securing cloud based platforms (Microsoft Azure, Amazon AWS, etc.).

Education and/or Experience:

  • Minimum three years of information security experience, preferably in the financial services industry.
  • Minimum two years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages, Incident Response
  • Minimum one year in a leadership role or team/project lead capacity.
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives.
  • Familiarity with computer network exploitation and network attack methodologies.
  • Industry knowledge of leading-edge security technologies and methods working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities

Reference: 2675611836

https://jobs.careeraddict.com/post/85098855

This Job Vacancy has Expired!

Request Technology - Robyn Honquest

Manager Cyber Defense Threats and Vulnerabilities

Request Technology - Robyn Honquest

Posted on Nov 7, 2023 by Request Technology - Robyn Honquest

Chicago, IL, 60601
IT
Immediate Start
$155k - $160k Annual
Full-Time

Manager, Cyber Defense Threats and Vulnerabilities

SALARY: $160k plus 15%

LOCATION: Chicago, IL

Hybrid 3 days remote 2 days onsite

Looking for a Manager over Cyber defense threats & vulnerabilities. You will manage security tools and lead 3-5 employees. Cyber threats digital forensics incident response application security operating systems cryptographic networking 24/7 on-call support SIEM crowdstrike axiom encase FTX blue coat forefront DSS wireshark snort Active Directory security IAM permissions LDAP SSO

The Manager, Cyber Defense will help plan actions and lead security professionals in the analysis and determination of threats to the enterprise, vulnerabilities in the environment, and how our company will best defend itself against these threats. This position will require initiative to oversee security technology implementations and be expected to put together projects and teams to remediate identified security threats, incidents, and compliance issues.

  • Manage security tools including appliances, hosted systems, and SaaS - including health checks, version updates, and content development.
  • Validate content changes to security tools are appropriate from other analysts and teams.
  • Report on and enhance current metrics surrounding security tool capabilities and efficacy.
  • Take a lead role in the systems life cycle performing upgrades, implementation of new technologies, and enhancement identification.

Team Management

  • Lead 3-5 employees and contingent labor professional for the cyber systems function within Cyber Defense.
  • Manage team effectively in delivery of incident resolution, project tasks, compliance milestones, and systems implementations.
  • Perform talent management functions across the team, including performance reviews, direct feedback, and other administrative functions as required.

Incident Management and Security Response Actions:

  • Lead cyber security incident responders in response activities including investigation, coordination, review, and reporting.
  • Oversee technical analysis of security events while coordinating incident response activities with internal and external teams.
  • Ensure and directly oversee the collection and preservation of data associated with cyber security incident response activities following industry best practices and established procedures.
  • Develop and support briefings to senior management as a trusted incident responder.

Supervisory Responsibilities:

  • Manages all members of the Cybersecurity team within Security Services. Assigns personnel to projects, directs their activities, and performs personnel actions (hiring, promotions, terminations, etc.)
  • Confer with and advise subordinates on administrative policies and procedures, technical problems, priorities, and methods.
  • Promote employee development by conducting career-planning sessions with staff and selecting and scheduling employee training classes, conferences, and seminars

Qualifications:

Technical Skills:

  • SIEM solutions
  • Experience with Crowdstrike solutions
  • Forensic analysis tools (Axiom, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront) solutions
  • Network sniffers and packet tracing tools (DSS, Ethereal and tcpdump, WireShark).
  • Intrusion Detection & Prevention Tools such as SNORT/Sourcefire, Palo Alto, etc.)
  • Encryption technologies (PGP, PKI and X.509)
  • Hands on experience with network architecture, including network security.
  • Hands on experience with Active Directory Security, including scans, best practices and security configuration.
  • Hands on experience with Application Security controls including design, dynamic scans, static code analysis.
  • Hands on experience with Incident Reponses process, procedures and Tools
  • Identity and access management (I&AM) experience with Active Directory, NTFS permissions, LDAP and Single Sign On (SSO) solutions.
  • Industry-standard metrics and measurements for SOC effectiveness
  • Risk management in the context of the NIST CSF or another industry-standard framework
  • Passion for creating tools and automating processes.
  • Standard technical writing tools including MS Word, Excel, Project and Visio

Familiarity with:

  • Industry-standard operating systems and environments such as Microsoft Windows and Linux distributions, in data center and cloud environments.
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Fundamental understanding of the underlying protocols and data used as the basis for the security monitoring service, including: HTTP, HTTPS, SQL, TCP/IP, Active Directory
  • Application and database security experience
  • Network and security engineering experience, including log and network traffic capture analysis.
  • Experience with assessing system hardening procedures for Windows, Linux
  • Security policy, standards, governance, privacy and regulatory experience (eg, NIST, COBIT).
  • Knowledge of BYOD and Mobile Device Management platforms.
  • Securing cloud based platforms (Microsoft Azure, Amazon AWS, etc.).

Education and/or Experience:

  • Minimum three years of information security experience, preferably in the financial services industry.
  • Minimum two years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages, Incident Response
  • Minimum one year in a leadership role or team/project lead capacity.
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives.
  • Familiarity with computer network exploitation and network attack methodologies.
  • Industry knowledge of leading-edge security technologies and methods working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities

Reference: 2675611836

CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test