Manager, Cybersecurity Engineering – Bot Mitigation and Digital Fraud

Location: Remote

Job Type: Full Time / Permanent

OVERVIEW: The Manager, Cybersecurity Engineering – Bot Mitigation and Digital Fraud will drive strategic support, engineering, and operations of critical cybersecurity technologies covering bot mitigation and digital fraud to assure the security posture of the organization’s acting-commerce and mobile channels as a security liaison to business and technology stakeholders. This role requires the ability to translate the technology risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The role coordinates the technology organization’s technical activities to consult and assure the security posture of the organization via bot and digital fraud mitigation infrastructure while providing regular status and service-level reports to management. An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. Expertise in leading project teams and developing and managing projects is essential for success in this role. As well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting. Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position. The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the position. Technology personnel responsible for managing technical security infrastructure may report directly to the role or may report to other areas of Technology with their security-related activities coordinated by the role.

ROLE RESPONSIBILITIES: Strategy and People Leadership: Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements. Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals and objectives. Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members. Security Liaison: Assist resource owners and technology staff in understanding and responding to security audit failures reported by auditors. Provide security communication and awareness for audiences, which may range from senior leaders to field staff. Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums. Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support for legal and regulatory compliance efforts, including audit support. Security Engineering: Consult with technology and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software. Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with technology management to align existing technical installed base and skills with future architectural requirements. Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory, and audit requirements. Operational Support: Coordinate, measure and report on the technical aspects of security management. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Support operational components of incident management, including detection, response and reporting. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other technology projects. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of networks and endpoint systems, and manage the remediation of identified risks.

QUALIFICATIONS: Bachelor’s Degree or equivalent experience in management information systems, computer science, information security/cybersecurity. 3-5 years of experience in bot mitigation, digital fraud, security threat detection and risk management, technology controls, security frameworks, DevSecOps, software engineering, staff mentorship & development. CISM (preferred). CISSP (preferred). Operating Systems such as Windows and Linux. Experience building solutions to mitigate unwanted traffic at scale, especially for high heat product launches, DDoS attacks, account takeover attacks, etc. Understanding of web and mobile security standards, architecture, web and mobile security best practices and application security best practices. Experience with fraud mitigation solutions, methodologies and best practices. Cloud security. Strong knowledge of retail e-commerce domain and e-commerce security best practices. Strong understanding and implementation of Technology best practices, policies and procedures. Assessing risk and business impact of technical changes to our environment. Proactively identifying and evaluating problems, determine root cause. Public and private cloud engineering and strategic view of cost-effective hosting. Translating a service interruption into an impact analysis and execute a corrective plan of action. Contract negotiations, vendor management, project management and financial management. Effective leadership and management during crisis. Ability to effectively plan, organize, schedule and coordinate among competing priorities across multiple entities. Ability to effectively communicate complex technical issues. Good interpersonal skills with staff, end-users, peers, management, and vendors. A strong understanding of the business impact of security tools, technologies and policies. In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies. Experience working with legal, audit and compliance staff. Experience developing and maintaining policies, procedures, standards and guidelines. An understanding of operating system internals and network protocols. Familiarity with the principles of cryptography and cryptanalysis. Proficient in effective troubleshooting and issue resolution techniques. Mastery of modern product development processes and pipelines. Capable of understanding complicated systems quickly. Proficient in effective system monitoring and log analysis techniques. Proficient managing and growing team members in a professional setting. Proficiency in guiding more junior team members through Software Engineering fundamentals in a professional setting. Experience managing vendor relationships. Proficient balancing workloads across teams. Exposure to a CI/CD toolchain. Experience with translating high level strategy to tactical execution. Deep understanding of threat modelling and risk profiling of threats. Understanding of modern microservice-based architectures and methodologies. Exposure to business logic flaws and tactical remediation. Exposure to REST and effective web service design. Exposure to production systems design including High Availability, Disaster Recovery, Performance, Efficiency, and Security Experience with Agile Development and knowledge on Agile Deployment tools and versioning using Git or similar tools. Experience in a front-end technology and framework such as HTML, CSS, JavaScript, AngularJS, ReactJS, and JQuery Mastery of a modern object oriented design and programming language (Java) Mastery of a modern web application framework such as Spring boot/UML/Struts/Spring.