Cyber Security Manager

2 weeks ago


Miami, United States Carisam Full time
Job DescriptionJob Description

JOB DESCRIPTION

Cyber Security Manager

Department: MIS Department Job Status: Full Time

FLSA Status: Reports to: IT Manager

Work Schedule: Monday-Friday 8:00 A.M. - 5:00 P.M. Positions Supervised:

POSITION SUMMARY:

The Information Technology (IT) Security Manager will lead the team of security staff responsible for the internal and external security of the organization’s information systems. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

ESSENTIAL FUNCTIONS:

• Organizes and directs the security incident response team (SIRT).

• Hires and trains members of the security team.

• Conducts performance evaluations that are timely and constructive.

• Handles discipline and termination of employees as needed and in accordance with company policy.

Duties/Responsibilities:

  • Facilitates and manages the development, modification, and operation of security protocols including intrusion detection and prevention systems to protect the organization’s information from breach or loss.
  • Conducts periodic audits and due diligence checks of security protocols, evaluating systems for vulnerabilities.
  • Recommends modifications to security protocols as required.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Develops and/or provides training and guidance on acceptable use, risk management, incident response, and security protocols to employees.
  • Periodically briefs senior management on status of security system and protocols.
  • Reviews reports of, and evaluates response to, any security incidents.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Ensures that monitoring operations comply with all applicable government regulations and standards.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Maintains current knowledge of emerging security threats, technical challenges, and developments in system protection and IT security standards.
  • Performs other related duties as assigned.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Access Security Providers , make recommendation of outsourcing security

Required Knowledge, Skills, Abilities:

  • To convey in leading and guiding a team.
  • Demonstrated problem-solving and analytical skills.
  • Excellent verbal and written communication skills.
  • Proficient, or able to gain proficiency with, a broad array of security software applications and tools.
  • Proficient with Microsoft Office Suite or related software needed to maintain reports and records.
  • Organized with attention to detail.
  • Develop computer or information security policies or procedures.
  • Update knowledge about emerging industry or technology trends
  • implement security measures for computer or information systems.
  • Collaborate with others to resolve information technology issues.
  • Test computer system operations to ensure proper functioning.
  • Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
  • Computers and Electronics — Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
  • Engineering and/or Technology — Knowledge of the practical application of engineering science and/or technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
  • Deductive Reasoning — The ability to apply general rules to specific problems to produce answers that make sense.
  • Inductive Reasoning — The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
  • Problem Sensitivity — The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing that there is a problem.
  • Attention to Detail — Job requires being careful about detail and thorough in completing work tasks.
  • Dependability — Job requires being reliable, responsible, and dependable, and fulfilling obligations.
  • Integrity — Job requires being honest and ethical.
  • Analytical Thinking — Job requires analyzing information and using logic to address work-related issues and problems.
  • Cooperation — Job requires being pleasant with others on the job and displaying a good-natured, cooperative attitude.

Education and Experience:

  • Bachelor’s degree in Computer Science, Information Management, or equivalent; Master’s degree preferred.
  • At least seven years of experience in computer systems with at least five years specializing in computer security.

PHYSICAL DEMANDS:

  • Prolonged periods sitting at a desk and working on a computer.
  • Must be able to lift up to 15 pounds at times.

WORK ENVIRONMENT

  • Working conditions are good. Physical demand is normal and that of regular office conditions such as sitting, standing and walking.

  • Sedentary work. Exerting up to 50 pounds of force occasionally and/or negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects.

  • VISUAL ACUITY

  • The worker is required to have close visual acuity to perform an activity such as: preparing and analyzing data and figures; transcribing; viewing a computer terminal; and extensive reading.

Department Head or Manager: _________________________ Date: _________________________

Approval Signature: ______________________________ Date: ____________________________________

Director of Human Resources

The company has reviewed this job description to ensure that essential functions and basic duties have been included. It is not intended to be construed as an exhaustive list of all functions, responsibilities, skills and abilities. Additional functions and requirements may be assigned by supervisors as deemed appropriate.

I acknowledge receipt of the job description. It has been reviewed with me by my supervisor I understand should I have any questions regarding my duties, I will consult with my supervisor and/or the Human Resources Department.

Employee: ___________________________________ Date: ____________________________________

(Print Name)

Employee: ___________________________________

(Signature)



  • Miami, United States Government Tactical Solutions, LLC Full time

    Please see the following regarding input for the SIEM position: Investigates, analyzes, and responds to cyber incidents within a networkenvironment or enclave. Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, rewalls, network trafficlogs) to analyzeevents that occur within their environments for the purposesof mitigating threats....


  • Miami, FL, United States Canonical - Jobs Full time

    Job Description This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal...

  • Sales Engineer

    1 week ago


    Miami, United States Jericho Security Full time

    Jericho is the ultimate battleground where cyberdefense clashes with the constantly evolving menace of generative artificial intelligence. The threat of malicious AI attacks is greater than ever with its evolving efficiency placing all industries in peril. Jericho is taking on the challenge to protect all from the unrelenting assault of next-gen cyber...


  • Miami, United States Jackson Health System Full time

    **Jackson Health System** **Department**:Jackson Memorial Hospital -Biomedical Engineering **Address**:1611 NW 12th Ave, Miami, Florida, 33136 **Shift details**: Full-Time, Days **Why Jackson**: Jackson Health System is a nationally and internationally recognized academic medical system offering world-class care to any person who walks through our doors....


  • Miami, United States Cypfer Full time

    Job DescriptionJob DescriptionSalary: $70,000+About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics...


  • Miami, United States Cypfer Full time

    Job DescriptionJob DescriptionSalary: $70,000+About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics...


  • Miami, United States Public Health Trust of Dade Co Full time

    Jackson Health System Department: Jackson Memorial Hospital -Biomedical Engineering Address:1611 NW 12th Ave, Miami, Florida, 33136 Shift details:Full-Time, Days, On-Site Why Jackson: Jackson Health System is a nationally and internationally recognized academic medical system offering world-class care to any person who walks through our doors. For more than...

  • Cyber Threat Analyst

    2 months ago


    Miami, United States Cypfer Full time

    Job DescriptionJob DescriptionSalary: About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics for...

  • Cyber Threat Analyst

    3 weeks ago


    Miami, United States Cypfer Full time

    Job DescriptionJob DescriptionSalary: About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics for...


  • Miami, United States United States Air Force Full time

    SECURING OUR TECHNOLOGY The Air Force relies heavily on advanced computer and software systems, so it is paramount to keep those systems safe. It's the job of Cyber Systems Operations specialists to design, install and support our systems to ensure they operate properly and remain secure from outside intrusion. These experts enhance our capabilities and...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team's...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - Increase your chances of an interview by reading the following overview of this role before making an application. The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...


  • Miami, United States Audit & Risk Recruitment Full time

    Audit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...


  • Miami, United States Carnival Corporation Full time

    The Maritime OT Cyber Safety Analyst serves as the liaison between Carnival Cruise Line (CCL), P&O Cruises Australia (P&O AU), and Carnival Corporation’s Global Information Security and Compliance (GISCS) organization. This role provides support for maritime cyber safety operational technology (OT) compliance, project management, and operations....


  • Miami, Florida, United States U.S. Army Cyber Command Full time

    Coordinates incident response functions and provides technical support to cyber defense technicians to resolve incidents. Provides guidance, support, and technical expertise on the security of DAO uniform constructed networks (to include NIPRNet, SIPRNet, and mission partner environments). Provides technical expertise on network security aspects. Maintains...


  • Miami, United States ESB Technologies Full time

    6 monthsRemote ok but highly prefer someone local enough to come in as needed (Miami, FL)2 different positionsInfrastructure PM with SecurityCyber Security PMWould like unicorn that has both in one BUT understands these are two different people so might not be plausible – please note is they are more on one side vs another when subbing or if they can be...


  • Miami, United States ESB Technologies Full time

    6 monthsRemote ok but highly prefer someone local enough to come in as needed (Miami, FL)2 different positionsInfrastructure PM with SecurityCyber Security PMWould like unicorn that has both in one BUT understands these are two different people so might not be plausible – please note is they are more on one side vs another when subbing or if they can be...