Security Manager
Plano, Texas, United States
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Toyota Tsusho Systems
This is the official website of Toyota Tsusho Systems Corporation (TTS), the global ICT company of the Toyota Tsusho Group.Job Summary:
The Security Manager will oversee daily security operations, incident response, and compliance activities. This role involves monitoring security assessments, investigating incidents, collaborating with internal teams and affiliates, and implementing security solutions. The Security Manager will lead efforts in threat analysis, risk management, and training development to enhance the organization's cybersecurity posture.
Key Responsibilities:
• Daily Monitoring and Incident Investigation:
• Conduct daily RSOC monitoring and trend analysis for security assessments.
• Investigate and document incidents such as phishing and account breaches.
• Cybersecurity Operations:
• Oversee Multi-Factor Authentication (MFA) and VPN setups, including troubleshooting and onboarding.
• Oversee the implementation of security solutions and review test policies/procedures.
• Assist with the implementation and operations of corporate security-related tools.
• Oversee security-related tools, including MACD policies for users, groups, and computers.
• Configure Microsoft Office security settings (e.g., Intune, Teams, Exchange Online Protection) and manage Web Security configurations.
• Report, investigate, and mitigate malicious activity, completing break/fix tickets and internal app instructions.
Incident Response and Threat Management:
• Lead the investigation and response to security incidents, including data breaches and cyber-attacks.
• Coordinate with global security teams to ensure a unified response to incidents.
• Contain threats, remediate incidents, and analyze the causes of incidents to support countermeasure planning.
• Collect and preserve evidence for potential legal proceedings and monitor incident status for classification and severity.
• Generate final reports with lessons learned and disseminate to appropriate authorities.
Threat Analysis and Intelligence:
• Conduct thorough analysis of security threats and vulnerabilities, including risky sign-ins and external threats.
• Risk Management:
• Collaborate with the SOC team to conduct regular risk assessments and implement risk mitigation strategies to protect organizational assets.
• Utilize vulnerability scanning tools to reports and evaluate internal and external vulnerabilities.
• Collaboration and Project Management:
• Participate in meetings and collaborate with internal teams on security projects.
• Work with affiliates on E5 security and audits as part of a temporary assignment.
• Collaborate with other departments and stakeholders to communicate threats and ensure comprehensive security measures are designed and implemented.
Administrative Management:
• Address invoices and manage administrative tasks related to security operations.
• Contribute to monthly reports and meetings with relevant stakeholders.
• Cyber Insurance and Compliance:
• Collaborate with Finance on cyber insurance matters and audits.
• Continuously review, test, and enforce cybersecurity policies and procedures, ensuring compliance with internal and external audits, regulations, and standards.
Training and Development:
• Lead and mentor regional team members with cybersecurity responsibilities.
• Guide regional infrastructure operations team members on cybersecurity matters.
Requirements
• Bachelor’s degree in Cybersecurity, Information Technology, or a related field.
• Proven experience in cybersecurity management, incident response, and compliance.
• Strong understanding of security tools and technologies, including MFA, VPN, and vulnerability management.
• Excellent analytical, communication, and leadership skills.
• Relevant certifications (e.g., CISSP, CISM, CEH) are preferred.
Skills:
• Strong problem-solving and organizational abilities.
• Ability to work collaboratively in a team environment.
• Proficiency in cybersecurity tools and technologies.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits CEH CISM CISSP Compliance Finance Incident response Monitoring Risk assessment Risk management Security assessment SOC VPN Vulnerabilities Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.