Deputy CISO - Director, Cybersecurity Architecture and Operations
Brentwood, TN, US, 37027
Are you looking for a career in a dynamic and innovative company that values versatility, growth, and teamwork? Look no further than Delek US Holdings!
WHAT IS DELEK? WHAT DO WE DO?
We are a boutique-sized diversified downstream energy company with a range of assets, including petroleum refining and logistics.
- Our refineries in Texas, Arkansas, and Louisiana have a combined crude capacity of 302,000 barrels per day
- Our logistics business currently owns and operates 720 miles of crude and product pipelines, a 600-mile crude oil gathering system, and storage tanks and terminals.
DELEK BENEFITS
We offer fantastic benefits that include up to a 10% match on 401K on your hire start, with a vesting timeline of only one year, along with medical benefits that start on day one with a 30% premium rebate annually! We value your well-being and all employees now have access to the Calm app for FREE, which is used for meditation, stress management, and better sleep. Through our performance management program, you can earn additional annual incentives as you set and achieve goals. Our pay for performance culture motivates our employees to improve Delek’s year-over-year company, business unit, and individual results. With some of the highest bonus payouts in recent years, we know that our success is due to our talented and dedicated team. We are looking for individuals like you to help us continue this momentum and bring new ideas to the table. At Delek, you will have the opportunity to make an impact and grow your career in a supportive and innovative environment.
JOB SUMMARY
Evaluates, tests, recommends, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software. Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security. Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security. Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
All activities will be performed in support of the strategy, and vision of the organization. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. All activities must be in compliance with Equal Employment Opportunity laws, HIPAA, ERISA, and other regulations, as appropriate
EDUCATION AND EXPERIENCE
-
4 year / Bachelor's Degree (Required)
-
Master's Degree (Preferred)
-
Four (4) or more years Management experience (Required)
-
Ten (10) or more years Experience in a related field of security Architecture and security operations (Required)
-
Five (5) or more years Experience as a SOC lead, managing a team of analysts, Information Security/Cybersecurity
-
Proven experience managing complex cyber incidents across IT and OT, including executive coordination and regulatory reporting.
-
Skilled in using SIEM, SOAR, and forensic tools, with a strong grasp of frameworks like NIST and ISA/IEC-62443.
-
Strong organizational skills and ability to set priorities and handle multiple projects concurrently
-
Knowledge of cyber threat and/or intelligence analysis
-
Knowledge of cyber vulnerability management practices
-
CISSP, CISM, CISA, SANS, PMP are preferred
-
Solid understanding of cyber security and be able to analyze incident reporting and follow up with reporting sites
-
Strong knowledge of incident management, problem management and change management best practices
-
No Licensure or Certification Required.
JOB REQUIREMENTS
-
Agile Engineering Best Practices
-
Business Partnership & Consulting
-
Project Management
-
Resource Planning & Optimization
-
Systems Thinking
-
Technical Communication/Presentation
-
Technology Advising/Consulting
-
Troubleshooting
-
Work with key stakeholders to assess and ensure our technology is aligned with the leading industry standards and develop our strategic IT infrastructure roadmap, architecture standards for the cloud and best practices in cyber security operations.
-
Lead efforts with business vendors and technical contacts on all point-to-point’s, software upgrades, and replacements.
-
Manage engagements with outside experts and coordinate internal resources for successful execution of our hardware development strategy, our cloud solution strategy, our PCI compliance and our network reliability and security.
-
Program Management: Partner with PMO team to oversee portfolio of cyber security operational services and the pipeline of projects/tasks to create, evolve, and change them as needed.
ARCHITECTURE REQUIREMENTS
-
Responsible to develop and maintain a comprehensive vision and strategy for overall Security Architecture to accomplish the objectives of protecting Delek’s IT & OT Infrastructures.
-
Manages, coordinates, and evaluates the work on the IT & OT Infrastructure Security department to ensure the security, confidentiality, integrity & availability of Delek’s infrastructure.
-
Monitors changes in legislation and compliance standards that affect IT & OT Infrastructure Security and proactively acts to update standards, best practices and architecture based on this information.
-
Provides overall operational management of cybersecurity architecture.
-
Is available to respond to unplanned IT & OT security & risk management events including crisis situations.
-
Coordinates and manages remediation of non-compliant IT infrastructure to meet applicable compliance standards and best practices.
-
Design and implement a Zero Trust Architecture (ZTA) framework across IT and OT environments to ensure least-privilege access and continuous verification.
-
Develop and maintain a comprehensive Identity and Access Management (IAM) strategy, including Privileged Access Management (PAM).
-
Define and enforce segmentation strategies for IT & OT networks (e.g., Purdue Model) and secure remote access protocols for industrial control systems.
-
Integrate security into the software development lifecycle (SSDLC).
-
Establish data protection architecture, including encryption standards, data classification, and Data Loss Prevention (DLP) policies across IT and OT domains.
SECURITY OPERATIONS REQUIREMENTS
-
Responsible for developing and maintaining a comprehensive vision and strategy for Security Operations, ensuring the protection of Delek’s IT and OT infrastructures.
-
Ensure the monitoring services are being fulfilled 24x7x365,
Provide oversight, direction, scheduling and monitoring within the SOC.
-
Lead the full lifecycle of cyber incident response across IT and OT environments, including detection, containment, recovery, and post-incident analysis, while ensuring compliance with regulatory reporting requirements.
-
Demonstrated experience managing high-severity incidents, coordinating cross-functional teams, and utilizing tools such as SIEM, SOAR, and forensic platforms to drive effective resolution and continuous improvement.
-
Perform review and validation of all deliverables for SOC, IR, Threat Intelligence, Threat Hunting and other assigned activities.
-
Develop policies, instruction, standards, and procedures around security operation functions.
-
Provide Metrics and Artifacts supporting audit activities.
-
Brief executives about current issues, events, and pertinent information.
-
Ensure timely and accurate reporting to all relevant stakeholders (Internal & External).
-
Responsible for overall use of resources and initiation of corrective action where required for Security Operations Center.
-
Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring.
-
Define patch and vulnerability management strategies for IT & OT systems, accounting for operational constraints and vendor dependencies.
CORE COMPETENCIES
CHANGE AGILITY (LEVEL 4 LEADING):
Identifies, initiates, and adapts to organizational changes that foster enhanced effectiveness, efficiency, safety, and ultimately business results.
COLLABORATION (LEVEL 4 LEADING):
Sees connection points across the organization and partners effectively with others to achieve common goals.
DECISION MAKING (LEVEL 4 LEADING):
Selects a course of action to reduce risk and uncertainty and create optimal outcomes.
DRIVE FOR RESULTS (LEVEL 4 LEADING):
Drives to achieve challenging performance objectives.
TEAM BUILDING (LEVEL 4 LEADING):
Builds trust, fosters openness, and provides support. As the manager of a team, selects and motivates a strong team.
#LI-MG1
We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin, disability status, protected veteran status, or any other characteristic protected by law. Equal Opportunity Employer/Disabled/Veterans.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Audits CISA CISM CISO CISSP Cloud Compliance Encryption HIPAA IAM Incident response Industrial IT infrastructure Monitoring NIST Risk assessment Risk management SANS SDLC SIEM SOAR SOC SSDLC Strategy Threat intelligence Vulnerability management Zero Trust
Perks/benefits: 401(k) matching Career development Health care Salary bonus Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.