Security Operations Manager in Athol, MA (GC or Citizen) at Athol, Idaho, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2161112&uid= From: bhuwan tiwari, Sonitalentcorp [email protected] Reply to: [email protected] Job Title: Security Operations Manager Location: Hybrid. They will need to travel to Athol several times a month for the first few months until the program is up and running. After that, can work remotely. Ideally, driving distance to Athol. Duration: 6+ months Interview: Phone/ Skype-2Rounds Visa: USC and GC Linkedin Must have Note: be sure you send me info on the candidate- how many yrs of security- where and when etc- dont just send me a resume with no info and be sure all the information is on their resume also. Job Description: This is a technical role. They need to be a security specialist with experience in security operations and common security tools. see job description We are seeking a dedicated and experienced Security Operations Manager to join our team. The Security Operations Manager will oversee the protection of an organization's information systems and ensure the security of its digital assets. The Manager will work closely with the CIO and CISO to establish and enhance the companys security program.KEY RESPONSIBILITIESSecurity Operations Management Act as the primary security operations lead across the Companys global sites/divisions. Oversee ongoing security operations, including patch management, asset management, and engagement with security partners, ensuring effective monitoring and response to security incidents. Implement and manage security tools and technologies such as firewalls, intrusion detection systems, and antivirus software. Coordinate with IT and other departments to ensure security measures are integrated into all aspects of the organization's operations. Manage the security awareness and training program to ensure all end users receive regular security training. Manage deployment of security tool agents. Conduct access control reviews and other security control reviews.Security Strategy, Governance and Regulatory Compliance Support CISO in the development and implementation of a comprehensive cybersecurity strategy aligned with the organization's goals and objectives. Support the CISO in developing the enterprise security program, including policies, procedures, and plans. Under the CIOs and the vCISOs direction, establish, track, and report on security KPIs. Participate in ongoing security governance activities, including regular leadership updates. Ensure compliance with relevant laws, regulations, and industry standards, such as GDPR, HIPAA, and ISO 27001. Maintain documentation for security policies, procedures, and protocols. Conduct regular audits and assessments to ensure adherence to security policies and identify areas for improvement. Collaborate with legal and compliance teams to address regulatory requirements and data protection concerns. Coordinate with technical resources across all Company locations to establish a consistent security landscape.Incident Readiness, Response and Recovery Develop and maintain incident response plans to address security breaches and other cybersecurity incidents. Manage and coordinate response efforts during security incidents, including containment, eradication, and recovery. Conduct post-incident analysis to identify root causes and implement measures to prevent future occurrences. Maintain an up-to-date incident response plan and ensure all team members are familiar with their roles and responsibilities. Conduct risk assessments and vulnerability analyses to identify potential threats and mitigate risks.Threat Intelligence and Analysis Monitor threat intelligence feeds and stay informed about emerging cybersecurity threats and vulnerabilities. Conduct threat analysis and provide actionable insights to improve the organization's security posture. Collaborate with external partners, such as cybersecurity firms and government agencies, to share threat intelligence and best practices.QUALIFICATIONS Bachelors degree in Information Security, Computer Science, or a related field. 5+ years of experience in information security operations management or related roles, with a focus on security operations, incident response, and risk management. Strong knowledge of information security principles, protocols, and best practices. Experience with security technologies and tools (e.g., firewalls, intrusion detection/prevention systems, SIEM). Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, ISO/IEC 27001). Strong analytical and problem-solving skills, with the ability to identify and mitigate security risks. Strong communication and interpersonal skills. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Proven experience in developing and implementing cybersecurity operational controls and procedures. Experience in conducting security audits, assessments, and compliance reviews. Excellent communication and interpersonal skills, with the ability to convey complex security concepts to non-technical stakeholders. Ability to work under pressure and manage multiple tasks in a fast-paced environment. Thanks, | Bhuwan Tiwari Sr.Technical Recruiter SoniTalent Corporation I 5404 Merribrook Lan--e, Prospect, KY, USA | | Cell -859-946-4062 | [email protected] | | | | | Keywords: information technology green card Kentucky Security Operations Manager in Athol, MA (GC or Citizen) [email protected] http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2161112&uid= |
[email protected] View All |
01:13 AM 11-Feb-25 |