Manager, Threat Intelligence and Security Operations

Location: Remote

Job Type: Full Time / Permanent

OVERVIEW: The Manager of Threat Intelligence and Security Operations will drive strategic support, applicable engineering, and operations of critical cybersecurity technologies to assure the front-line intelligence gathering and defense against security attacks directed at the organization all while acting as a security liaison to business and technology stakeholders. This role will have ownership of the organization’s security operations center capability as well as the organization’s cybersecurity incident response plan and execution of cybersecurity incident response. This role requires the ability to develop metrics for ongoing security operations performance measurement and reporting to management. An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. Expertise in leading project teams and developing and managing projects is essential for success in this role, as well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting.

Vendor relationship management: ensuring that service levels and vendor obligations are met — is also an important aspect of the position. The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the position.

Strategy and People Leadership: Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements. Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals and objectives. Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members.

Security Liaison: Work as a liaison with vendors and the legal and procurement departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums. Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support and guidance for legal and regulatory compliance efforts, including audit support.

Threat Intelligence and Security Incident Preparedness: Develop, maintain, and support an intelligence capability to identify current and emerging security risks to the organization. Act as a liaison between industry peers, government agencies (including law enforcement) and other specialists. Utilize commercial intelligence providers to gain insight into adversary tactics, techniques and procedures, as well as planned activities and emerging motivations. Lead and coordinates the security operations center, provided internally and/or by an externally managed security services provider, to identify, assess, and respond to security incidents. Advise management of significant emerging threats and recommend both strategic and tactical steps to counteract these threats. Develop and deliver tabletop preparedness exercises, at least annually. Lead quarterly reviews of the incident response plan to ensure accuracy in accordance with organizational and infrastructure changes. Participates in industry exercises. Provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements. Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements.

Security Incident Management: Develop and maintain the security incident response process, including all required supporting materials. Develop functional requirements for roles that will be involved in the CSIRT program. Work with business units, technology functions and external providers to ensure that the process is mutually understood and agreed on, and that responsibilities are clear and accepted. Act as a liaison throughout the entire organization (including, but not limited to, enterprise technology services, lines of business, public relations, legal counsel and customer call centers). Initiates the security incident response process and executes decision authority to the extent of the role within that process. Ensures execution of the incident response process to the resolution of the incident. Ensures generation, maintenance, and protection of required incident records, such as investigator journals. Organizes, participates in and, if required, chairs post-incident reviews for presentation to senior management. Ensures the delivery of threat intelligence collected from incident engagements to threat intelligence teams and content creators for the purpose of operationalizing. Provides specialized security support for other events that fall outside the security incident realm, such as fraud attempts based on electronic channels or high-impact outages due to reasons other than security. Organizes the day-to-day management of the CSIRT, including staffing, employee development, budgeting and other relevant management functions. Assists in e-discovery and forensic procedures when necessary. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.

QUALIFICATIONS: Bachelor’s Degree in Management information systems, computer science, information security/cybersecurity or equivalent experience. 3-5 years of experience in security threat detection and risk management, technology controls, security frameworks, DevSecOps, staff mentorship & development. CISM (preferred not required). GIAC (preferred not required). CISSP (preferred not required). Operating Systems such as Windows and Linux. Threat intelligence platforms, SIEM platforms, MDR platforms, XDR platforms, and SOAR platforms. Cloud-native environments, such as Microsoft Azure. Strong understanding and implementation of Technology best practices, policies and procedures. Assessing risk and business impact of technical changes to our environment. Proactively identifying and evaluating problems, determine root cause. Public and private cloud engineering and strategic view of cost-effective hosting. Translating a service interruption into an impact analysis and execute a corrective plan of action. Contract negotiations, vendor management, project management and financial management. Effective leadership and management during crisis. Ability to effectively plan, organize, schedule and coordinate among competing priorities across multiple entities. Ability to effectively communicate complex technical issues. Good interpersonal skills with staff, end-users, peers, management, and vendors Methods and motivations adopted by adversaries to attack IT platforms and automated information systems. Security incident management processes and tools. Operations and support organizations (e.g., Infrastructure). Security risk assessment process. Security forensic techniques, tools and procedures for on-premises and cloud environments. Threat intelligence management lifecycle. Ability to consume and synthesize intelligence about actors, techniques or situations to identify emerging risk scenarios.