Return To Job Search
IT Security Operations Manager
Nevada
Nevada All
Business Operations
Project Management
JN -022018-20811

The IT Security Operations Manager (ITSOM) will act as an interface between the Chief Information Security Officer's (CISO’s) risk-management activities and the work of the technology-focused analysts, engineers, architects, administrators, and developers in the IT organization. The ITSOM must be able to translate and quantify the IT-risk requirements and constraints of the business into technical control requirements and specifications, as well as, develop metrics for ongoing performance measurement and reporting. The ITSOM coordinates the IT organization's technical activities to implement and manage security controls and to provide regular status and service-level reports to management.

The ITSOM will be responsible for working with business, security, and IT stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. The ITSOM will provide guidance to IT personnel responsible for managing technical security infrastructure who report to other areas of IT operations (for example, networking, servers or database management). The ITSOM will also be responsible for vendor relationship management ensuring that service levels and vendor obligations are met.

ESSENTIAL FUNCTIONS:

The ITSOM's job is composed of a variety of activities, including tactical, operational and strategic activities in support of IT and security program initiatives, such as:

Strategic Support

·         Work with IT and security on projects that address identified risks and business security requirements.

·         Monitor and report on compliance with security policies, as well as, the enforcement of policies within the IT department.

·         Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.

·         Provide leadership and coaching for IT and security team members

Security Liaison

·         Assist resource owners and IT staff in understanding and responding to security audit failures reported by auditors.

·         Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements.

·         Manage production issues and incidents, and participate in problem and change management forums.

·         Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.

·         Serve as an active and consistent participant in the information security governance process.

·         Provide support and guidance for legal and regulatory compliance efforts, including audit support.

Architecture/Engineering Support

·         Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.

·         Recommend and coordinate the implementation of technical controls to support and enforce defined security policies.

·         Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.

·         Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirements.

·         Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements.

Operational Support

·          Measure and report on the technical aspects of security management.

·         Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.

·         Manage and coordinate operational components of incident management, including detection, response and reporting.

·         Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations.

·         Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.

·         Manage security projects and provide expert guidance on security matters for other IT projects.

·         Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.

·         Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.

·         Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks.

JOB REQUIREMENTS:

·         A minimum of seven years of IT experience, with at least two years in an information security role, at least two years in an IT infrastructure and operations role performing architecture, engineering, or administration work, and at least two years in a leadership or management capacity.

·         A bachelor's degree in information systems, information security, or equivalent work experience; an M.S. in information security is preferred.

·         Security+ and CISSP certifications  preferred

·         Cisco CCNA Security or CCNP Security - preferred

·         Strong leadership skills and the ability to work effectively with business managers, security, IT engineering and IT operations staff.

·         A strong understanding of the business impact of security tools, technologies and policies.

·         Strong leadership abilities, with the capability to provide guidance for information security team members and IT operations personnel, and work with minimal supervision.

·         Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT and information security organizations, project and application development teams, management and business personnel; in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies.

·         Experience working with legal, audit and compliance staff.

·         Experience developing and maintaining policies, procedures, standards and guidelines.

·         Experience with common information security management frameworks, such as International Standards Organization (ISO) 2700x and IT Infrastructure Library (ITIL).

·         Familiarity with applicable legal and regulatory requirements, including, but not limited to, the U.S. Sarbanes-Oxley Act (SOX) and Payment Card Industry Data Security Standard (PCI DSS).

·         Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation.

·         Proficiency in performing risk, business impact, control and vulnerability assessments, and in defining treatment strategies.

·         Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.

·         Strong analytical skills to analyze security requirements and relate them to appropriate security controls.

·         An understanding of operating system internals and network protocols.

·         Familiarity with the principles of cryptography and cryptanalysis.

·         Experience in application technology security testing (white box, black box and code review).

·         Experience in system technology security testing (vulnerability scanning and penetration testing).

·         Documentation and presentation skills

·         Ability to identify needs, take initiative and prioritize work efforts — balancing operational tasks with longer-term strategic security efforts


Previous MonthNext Month
SunMonTueWedThuFriSat