Cyber Security Manager
2 weeks ago
JOB DESCRIPTION
Cyber Security Manager
Department: MIS Department Job Status: Full Time
FLSA Status: Reports to: IT Manager
Work Schedule: Monday-Friday 8:00 A.M. - 5:00 P.M. Positions Supervised:
POSITION SUMMARY:
The Information Technology (IT) Security Manager will lead the team of security staff responsible for the internal and external security of the organization’s information systems. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
ESSENTIAL FUNCTIONS:
• Organizes and directs the security incident response team (SIRT).
• Hires and trains members of the security team.
• Conducts performance evaluations that are timely and constructive.
• Handles discipline and termination of employees as needed and in accordance with company policy.
Duties/Responsibilities:
- Facilitates and manages the development, modification, and operation of security protocols including intrusion detection and prevention systems to protect the organization’s information from breach or loss.
- Conducts periodic audits and due diligence checks of security protocols, evaluating systems for vulnerabilities.
- Recommends modifications to security protocols as required.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Develops and/or provides training and guidance on acceptable use, risk management, incident response, and security protocols to employees.
- Periodically briefs senior management on status of security system and protocols.
- Reviews reports of, and evaluates response to, any security incidents.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Ensures that monitoring operations comply with all applicable government regulations and standards.
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Maintains current knowledge of emerging security threats, technical challenges, and developments in system protection and IT security standards.
- Performs other related duties as assigned.
- Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Access Security Providers , make recommendation of outsourcing security
Required Knowledge, Skills, Abilities:
- To convey in leading and guiding a team.
- Demonstrated problem-solving and analytical skills.
- Excellent verbal and written communication skills.
- Proficient, or able to gain proficiency with, a broad array of security software applications and tools.
- Proficient with Microsoft Office Suite or related software needed to maintain reports and records.
- Organized with attention to detail.
- Develop computer or information security policies or procedures.
- Update knowledge about emerging industry or technology trends
- implement security measures for computer or information systems.
- Collaborate with others to resolve information technology issues.
- Test computer system operations to ensure proper functioning.
- Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
- Computers and Electronics — Knowledge of circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
- Engineering and/or Technology — Knowledge of the practical application of engineering science and/or technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
- Deductive Reasoning — The ability to apply general rules to specific problems to produce answers that make sense.
- Inductive Reasoning — The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
- Problem Sensitivity — The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing that there is a problem.
- Attention to Detail — Job requires being careful about detail and thorough in completing work tasks.
- Dependability — Job requires being reliable, responsible, and dependable, and fulfilling obligations.
- Integrity — Job requires being honest and ethical.
- Analytical Thinking — Job requires analyzing information and using logic to address work-related issues and problems.
- Cooperation — Job requires being pleasant with others on the job and displaying a good-natured, cooperative attitude.
Education and Experience:
- Bachelor’s degree in Computer Science, Information Management, or equivalent; Master’s degree preferred.
- At least seven years of experience in computer systems with at least five years specializing in computer security.
PHYSICAL DEMANDS:
- Prolonged periods sitting at a desk and working on a computer.
- Must be able to lift up to 15 pounds at times.
WORK ENVIRONMENT
- Working conditions are good. Physical demand is normal and that of regular office conditions such as sitting, standing and walking.
- Sedentary work. Exerting up to 50 pounds of force occasionally and/or negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects.
- VISUAL ACUITY
- The worker is required to have close visual acuity to perform an activity such as: preparing and analyzing data and figures; transcribing; viewing a computer terminal; and extensive reading.
Department Head or Manager: _________________________ Date: _________________________
Approval Signature: ______________________________ Date: ____________________________________
Director of Human Resources
The company has reviewed this job description to ensure that essential functions and basic duties have been included. It is not intended to be construed as an exhaustive list of all functions, responsibilities, skills and abilities. Additional functions and requirements may be assigned by supervisors as deemed appropriate.
I acknowledge receipt of the job description. It has been reviewed with me by my supervisor I understand should I have any questions regarding my duties, I will consult with my supervisor and/or the Human Resources Department.
Employee: ___________________________________ Date: ____________________________________
(Print Name)
Employee: ___________________________________
(Signature)
-
Cyber Security Engineer
1 day ago
Miami, United States Government Tactical Solutions, LLC Full timePlease see the following regarding input for the SIEM position: Investigates, analyzes, and responds to cyber incidents within a networkenvironment or enclave. Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, rewalls, network trafficlogs) to analyzeevents that occur within their environments for the purposesof mitigating threats....
-
Head of Cyber Security Operations
2 months ago
Miami, FL, United States Canonical - Jobs Full timeJob Description This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal...
-
Sales Engineer
1 week ago
Miami, United States Jericho Security Full timeJericho is the ultimate battleground where cyberdefense clashes with the constantly evolving menace of generative artificial intelligence. The threat of malicious AI attacks is greater than ever with its evolving efficiency placing all industries in peril. Jericho is taking on the challenge to protect all from the unrelenting assault of next-gen cyber...
-
Biomedical Cyber Security Specialist Ppr
1 week ago
Miami, United States Jackson Health System Full time**Jackson Health System** **Department**:Jackson Memorial Hospital -Biomedical Engineering **Address**:1611 NW 12th Ave, Miami, Florida, 33136 **Shift details**: Full-Time, Days **Why Jackson**: Jackson Health System is a nationally and internationally recognized academic medical system offering world-class care to any person who walks through our doors....
-
Cyber Security Consultant
4 weeks ago
Miami, United States Cypfer Full timeJob DescriptionJob DescriptionSalary: $70,000+About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics...
-
Cyber Security Consultant
3 weeks ago
Miami, United States Cypfer Full timeJob DescriptionJob DescriptionSalary: $70,000+About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics...
-
Biomedical Cyber Security Specialist PPR
3 days ago
Miami, United States Public Health Trust of Dade Co Full timeJackson Health System Department: Jackson Memorial Hospital -Biomedical Engineering Address:1611 NW 12th Ave, Miami, Florida, 33136 Shift details:Full-Time, Days, On-Site Why Jackson: Jackson Health System is a nationally and internationally recognized academic medical system offering world-class care to any person who walks through our doors. For more than...
-
Cyber Threat Analyst
2 months ago
Miami, United States Cypfer Full timeJob DescriptionJob DescriptionSalary: About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics for...
-
Cyber Threat Analyst
3 weeks ago
Miami, United States Cypfer Full timeJob DescriptionJob DescriptionSalary: About Us: Cypfer is a true first-responder Cybersecurity organization enabling clients to return to business rapidly, the right way, following a cyber-attack. We are a global market leader in ransomware post-breach remediation and cyber-attack first response. We deliver results that far surpass market statistics for...
-
Cyber Systems Operations
1 week ago
Miami, United States United States Air Force Full timeSECURING OUR TECHNOLOGY The Air Force relies heavily on advanced computer and software systems, so it is paramount to keep those systems safe. It's the job of Cyber Systems Operations specialists to design, install and support our systems to ensure they operate properly and remain secure from outside intrusion. These experts enhance our capabilities and...
-
Cyber Security Manager
6 days ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team's...
-
Cyber Security Manager
1 month ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - Increase your chances of an interview by reading the following overview of this role before making an application. The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best...
-
Cyber Security Manager
3 weeks ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...
-
Cyber Security Manager
1 month ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...
-
Cyber Security Manager
1 month ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...
-
Cyber Security Manager
3 weeks ago
Miami, United States Audit & Risk Recruitment Full timeAudit and Risk Recruitment - The Manager, Cybersecurity Compliance is responsible for managing the overall Global Compliance Program, including but not limited to regulatory needs such as SOX, PCI-DSS, Data Privacy (GDPR/CCPA, etc) and best practices from NIST CSF, ISO, SOC2, etc. Additionally, this role is responsible for leading the compliance team’s...
-
Miami, United States Carnival Corporation Full timeThe Maritime OT Cyber Safety Analyst serves as the liaison between Carnival Cruise Line (CCL), P&O Cruises Australia (P&O AU), and Carnival Corporation’s Global Information Security and Compliance (GISCS) organization. This role provides support for maritime cyber safety operational technology (OT) compliance, project management, and operations....
-
it cybersecurity specialist
1 month ago
Miami, Florida, United States U.S. Army Cyber Command Full timeCoordinates incident response functions and provides technical support to cyber defense technicians to resolve incidents. Provides guidance, support, and technical expertise on the security of DAO uniform constructed networks (to include NIPRNet, SIPRNet, and mission partner environments). Provides technical expertise on network security aspects. Maintains...
-
Infrastructure PM with Security
3 weeks ago
Miami, United States ESB Technologies Full time6 monthsRemote ok but highly prefer someone local enough to come in as needed (Miami, FL)2 different positionsInfrastructure PM with SecurityCyber Security PMWould like unicorn that has both in one BUT understands these are two different people so might not be plausible – please note is they are more on one side vs another when subbing or if they can be...
-
Infrastructure PM with Security
3 weeks ago
Miami, United States ESB Technologies Full time6 monthsRemote ok but highly prefer someone local enough to come in as needed (Miami, FL)2 different positionsInfrastructure PM with SecurityCyber Security PMWould like unicorn that has both in one BUT understands these are two different people so might not be plausible – please note is they are more on one side vs another when subbing or if they can be...