Cyber Threat and Vulnerabilities Defense Manager

Request Technology - Craig Johnson

Posted on Feb 7, 2024 by Request Technology - Craig Johnson
Chicago, IL, 60601
IT
Immediate Start
$140k - $165k Annual
Full-Time

*Position is bonus eligible*

Prestigious Financial Company is currently seeking a Cyber Threat and Vulnerabilities Defense Manager. Candidate will help plan actions and lead security professionals in the analysis and determination of threats to the enterprise, vulnerabilities in the environment, and how our company will best defend itself against these threats. This position will require initiative to oversee security technology implementations and be expected to put together projects and teams to remediate identified security threats, incidents, and compliance issues.

Responsibilities:

  • Manage security tools including appliances, hosted systems, and SaaS including health checks, version updates, and content development.
  • Validate content changes to security tools are appropriate from other analysts and teams.
  • Report on and enhance current metrics surrounding security tool capabilities and efficacy.
  • Take a lead role in the systems life cycle performing upgrades, implementation of new technologies, and enhancement identification.
  • Lead 3-5 employees and contingent labor professional for the cyber systems function within Cyber Defense.
  • Manage team effectively in delivery of incident resolution, project tasks, compliance milestones, and systems implementations.
  • Perform talent management functions across the team, including performance reviews, direct feedback, and other administrative functions as required.
  • Lead cyber security incident responders in response activities including investigation, coordination, review, and reporting.
  • Oversee technical analysis of security events while coordinating incident response activities with internal and external teams.
  • Ensure and directly oversee the collection and preservation of data associated with cyber security incident response activities following industry best practices and established procedures.
  • Develop and support briefings to senior management as a trusted incident responder.

Supervisory Responsibilities:

  • Manages all members of the Cybersecurity team within Security Services. Assigns personnel to projects, directs their activities, and performs personnel actions (hiring, promotions, terminations, etc.)
  • Confer with and advise subordinates on administrative policies and procedures, technical problems, priorities, and methods.
  • Promote employee development by conducting career-planning sessions with staff and selecting and scheduling employee training classes, conferences, and seminars

Qualifications:

  • Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines.
  • Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets.
  • Effective and excellent oral and written communication, analytical, judgment and consultation skills.
  • Ability to effectively communicate in both formal and informal review settings with all levels of management.
  • Ability to work with local and remote IT staff/management, vendors and consultants.
  • Ability to work independently and possess strong project management skills.
  • SIEM solutions
  • Experience with Crowdstrike solutions
  • Forensic analysis tools (Axiom, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront) solutions
  • Network sniffers and packet tracing tools (DSS, Ethereal and tcpdump, WireShark).
  • Intrusion Detection & Prevention Tools such as SNORT/Sourcefire, Palo Alto, etc.)
  • Encryption technologies (PGP, PKI and X.509)
  • Hands on experience with network architecture, including network security.
  • Hands on experience with Active Directory Security, including scans, best practices and security configuration.
  • Hands on experience with Application Security controls including design, dynamic scans, static code analysis.
  • Hands on experience with Incident Reponses process, procedures and Tools
  • Identity and access management (I&AM) experience with Active Directory, NTFS permissions, LDAP and Single Sign On (SSO) solutions.
  • Industry-standard metrics and measurements for SOC effectiveness
  • Risk management in the context of the NIST CSF or another industry-standard framework
  • Passion for creating tools and automating processes.
  • Standard technical writing tools including MS Word, Excel, Project and Visio
  • Industry-standard operating systems and environments such as Microsoft Windows and Linux distributions, in data center and cloud environments.
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Fundamental understanding of the underlying protocols and data used as the basis for the security monitoring service, including: HTTP, HTTPS, SQL, TCP/IP, Active Directory
  • Application and database security experience
  • Network and security engineering experience, including log and network traffic capture analysis.
  • Experience with assessing system hardening procedures for Windows, Linux
  • Security policy, standards, governance, privacy and regulatory experience (eg, NIST, COBIT).
  • Knowledge of BYOD and Mobile Device Management platforms.
  • Securing cloud based platforms (Microsoft Azure, Amazon AWS, etc.).
  • Minimum three years of information security experience, preferably in the financial services industry.
  • Minimum two years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages, Incident Response
  • Minimum one year in a leadership role or team/project lead capacity.
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives.
  • Familiarity with computer network exploitation and network attack methodologies.
  • Industry knowledge of leading-edge security technologies and methods working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Professional security certifications is a plus (ie, GIAC, CISSP, CISA, CISM, CRISC)

Reference: 2712907258

https://jobs.careeraddict.com/post/87836444

This Job Vacancy has Expired!

Request Technology - Craig Johnson

Cyber Threat and Vulnerabilities Defense Manager

Request Technology - Craig Johnson

Posted on Feb 7, 2024 by Request Technology - Craig Johnson

Chicago, IL, 60601
IT
Immediate Start
$140k - $165k Annual
Full-Time

*Position is bonus eligible*

Prestigious Financial Company is currently seeking a Cyber Threat and Vulnerabilities Defense Manager. Candidate will help plan actions and lead security professionals in the analysis and determination of threats to the enterprise, vulnerabilities in the environment, and how our company will best defend itself against these threats. This position will require initiative to oversee security technology implementations and be expected to put together projects and teams to remediate identified security threats, incidents, and compliance issues.

Responsibilities:

  • Manage security tools including appliances, hosted systems, and SaaS including health checks, version updates, and content development.
  • Validate content changes to security tools are appropriate from other analysts and teams.
  • Report on and enhance current metrics surrounding security tool capabilities and efficacy.
  • Take a lead role in the systems life cycle performing upgrades, implementation of new technologies, and enhancement identification.
  • Lead 3-5 employees and contingent labor professional for the cyber systems function within Cyber Defense.
  • Manage team effectively in delivery of incident resolution, project tasks, compliance milestones, and systems implementations.
  • Perform talent management functions across the team, including performance reviews, direct feedback, and other administrative functions as required.
  • Lead cyber security incident responders in response activities including investigation, coordination, review, and reporting.
  • Oversee technical analysis of security events while coordinating incident response activities with internal and external teams.
  • Ensure and directly oversee the collection and preservation of data associated with cyber security incident response activities following industry best practices and established procedures.
  • Develop and support briefings to senior management as a trusted incident responder.

Supervisory Responsibilities:

  • Manages all members of the Cybersecurity team within Security Services. Assigns personnel to projects, directs their activities, and performs personnel actions (hiring, promotions, terminations, etc.)
  • Confer with and advise subordinates on administrative policies and procedures, technical problems, priorities, and methods.
  • Promote employee development by conducting career-planning sessions with staff and selecting and scheduling employee training classes, conferences, and seminars

Qualifications:

  • Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines.
  • Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets.
  • Effective and excellent oral and written communication, analytical, judgment and consultation skills.
  • Ability to effectively communicate in both formal and informal review settings with all levels of management.
  • Ability to work with local and remote IT staff/management, vendors and consultants.
  • Ability to work independently and possess strong project management skills.
  • SIEM solutions
  • Experience with Crowdstrike solutions
  • Forensic analysis tools (Axiom, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront) solutions
  • Network sniffers and packet tracing tools (DSS, Ethereal and tcpdump, WireShark).
  • Intrusion Detection & Prevention Tools such as SNORT/Sourcefire, Palo Alto, etc.)
  • Encryption technologies (PGP, PKI and X.509)
  • Hands on experience with network architecture, including network security.
  • Hands on experience with Active Directory Security, including scans, best practices and security configuration.
  • Hands on experience with Application Security controls including design, dynamic scans, static code analysis.
  • Hands on experience with Incident Reponses process, procedures and Tools
  • Identity and access management (I&AM) experience with Active Directory, NTFS permissions, LDAP and Single Sign On (SSO) solutions.
  • Industry-standard metrics and measurements for SOC effectiveness
  • Risk management in the context of the NIST CSF or another industry-standard framework
  • Passion for creating tools and automating processes.
  • Standard technical writing tools including MS Word, Excel, Project and Visio
  • Industry-standard operating systems and environments such as Microsoft Windows and Linux distributions, in data center and cloud environments.
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Fundamental understanding of the underlying protocols and data used as the basis for the security monitoring service, including: HTTP, HTTPS, SQL, TCP/IP, Active Directory
  • Application and database security experience
  • Network and security engineering experience, including log and network traffic capture analysis.
  • Experience with assessing system hardening procedures for Windows, Linux
  • Security policy, standards, governance, privacy and regulatory experience (eg, NIST, COBIT).
  • Knowledge of BYOD and Mobile Device Management platforms.
  • Securing cloud based platforms (Microsoft Azure, Amazon AWS, etc.).
  • Minimum three years of information security experience, preferably in the financial services industry.
  • Minimum two years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages, Incident Response
  • Minimum one year in a leadership role or team/project lead capacity.
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives.
  • Familiarity with computer network exploitation and network attack methodologies.
  • Industry knowledge of leading-edge security technologies and methods working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Professional security certifications is a plus (ie, GIAC, CISSP, CISA, CISM, CRISC)

Reference: 2712907258

CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test