IT Security Supervisor

Houston, TX, US, 77060

Applications have closed

Baker Construction Enterprises

Baker Concrete Construction is the nation’s leading commercial concrete construction contractor. Our drive is to perform safer, smarter, better, and faster.

View all jobs at Baker Construction Enterprises

Req ID: 5294
Travel: Up to 25%
Number of Openings: 1 

 

Achieve more in your career with the nation’s leading specialty concrete contractor. At Baker Construction, you’ll be part of a team that prioritizes people, invests in their development, and offers unparalleled opportunities for professional growth. In this role, you’ll be integral to building the future of our country and our company. You’ll collaborate across diverse teams, have a hand in significant projects, and dive headfirst into complex challenges with the best in the industry. If you are driven to do more and have the grit to follow through, you’ll have everything you need to define your career on your terms. 

 

Make a meaningful impact with a team that values ambition and rewards initiative. Apply today and be more with Baker.

Summary

The IT Security Supervisor is responsible for safeguarding Baker’s information systems and networks. S/ne primary focus will be on preventing unauthorized access, ensuring data integrity, and protecting against cyber threats. This role has overall responsibility for daily management of IT Security Services, Governance, Risk Management, Compliance, and related projects. The Security Supervisor ensures that co-workers and the company are receiving the appropriate security measures. This includes the responsibility of managing all procedures related to the identification, prioritization, and resolution of security risks, including monitoring, tracking, and coordination of IT security functions
 

Roles and Responsibilities

The IT Security Supervisor  will perform the following duties in a safe, productive, and effective manner:

  • Governance: implements clear guidelines, policies, and standards to ensure that IT systems and data are used and secured properly. Establishment of best practices and protocols to ensure that all IT activities align with Baker’s goals and objectives. Key activities: 
    • Directive Development: Creates and reviews policies for IT security
    • Support on Cyber Strategic Planning: Aligns IT security strategies with business objectives and ensures adequate resources
    • Performance Measurement: Uses metrics and KPIs to assess the effectiveness of cybersecurity measures
    • Risk Management Integration: Incorporates  cybersecurity risk management into overall business risk strategies 
    • Awareness, Training and Education:  Owns the security awareness program and ensures the workforce is properly trained and educated. Measures the effectiveness of awareness, training, and education program
  • Risk Management: focuses on identifying, assessing, and mitigating risks that could potentially harm Baker’s assets, reputation, or stakeholders. Understands the threats to IT infrastructure, systems, and data and takes appropriate measures to reduce these risks to an acceptable level. 
    • Risk Assessment: Identifies and evaluates risks associated with IT systems and data.
    • Risk Mitigation Planning: Develops strategies to address identified risks, such as implementing security controls. 
    • Continuous Monitoring: Regularly reviews and updates risk assessments to address new threats.
  • Compliance: ensures that Baker adheres to laws, regulations, contracts, and standards relevant to its industry and operations
  • Cybersecurity Program Management: oversees the projects part of our program and ensures all projects within the cybersecurity umbrella are effectively aligned, executed, and delivered. 
  • Key Activities:
    • Project Management: Oversees various cybersecurity projects, from inception to completion. 
    • Stakeholder Communication: Acts as the central point of communication for all cybersecurity projects. 
    • Performance Tracking and Reporting: Monitors and reports on the progress of cybersecurity projects
  • Security Operations: Ensures that the organization’s security operations are effective and responsive to the evolving threat landscape. Key Activities:
    • Security Operations: Oversees security day to day operations
    • Incident Response: Manages the response to cyber incidents, ensuring rapid and effective mitigation of threats
    • Threat Intelligence: Gathers, analyzes, and disseminates threat intelligence to anticipate and mitigate potential attacks
    • Security Monitoring: Oversees continuous monitoring of IT systems for security breaches, using tools and technologies to detect and respond to incidents
    • Vulnerability Management
    • Access Management
    • Security Policy Enforcement
    • Outsourced Security Services
  • Serves as the first point of contact for security incidents
  • Works with IT Services Manager (Service Desk and Support teams) during outages to determine the best course of action
  • Advises the Director of Information and Systems Security of any outages or services problems
  • Provides guidance, direction, coaching, and support to direct reports to maximize individual and overall department performance.
    • Responsible for holding timely performance appraisals and progress reviews
    • Assists direct reports in developing short and long-term goals 
    • Ensures direct reports receive appropriate training

Requirements

  • Bachelor’s degree in information security, Computer Science, or a related field with at least 6 years’ experience in IT security roles or equivalent combination of education and experience
  • Proven track record in devising, delivering, and overseeing innovative cybersecurity programs to senior stakeholders, including maintaining technical strategy and roadmaps
  • Familiarity with relevant regulations and compliance requirements
  • Experience with security standards (e.g., ISO 27001, NIST) and regulatory requirements
  • Experience managing teams and/or overseeing service providers

The following competencies are needed to successfully perform this job:

  • Excellent communication and interpersonal skills for effective training, documentation, and interfacing with the user community and all levels of the organization
  • Ability to explain complex security issues in simple terms to non-technical users
  • Ability to use basic math, geometry and algebra
  • Ability to develop business case justifications and cost/benefit analyses for IT security initiatives.
  • Proficient with security tools and technologies
  • Familiarity with security operations, incident response tools and techniques
  • Ability to demonstrate a positive team attitude and a desire to always help
  • Ability to handle multiple priorities under the pressures of a heavy workload and/or time constraints

At Baker Construction, we welcome those who are driven to make things happen. Your tenacity will be rewarded with great pay, excellent benefits, and opportunities to make your mark. This is an opportunity to own your future while working alongside co-workers who are united in our purpose to build better structures and better lives. Go further with an industry leader that puts people first, honors its word, and has the grit to achieve greatness.

 

Baker is an EOE Disability/Veterans Employer.

 

Applicants with physical and/or mental disabilities who require a reasonable accommodation for any or part of the application process may make their requests known by emailing hrtech@sharedservices.cc or calling 1-513-539-4000 and asking for HR.

#LI-AS1

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Compliance Computer Science Governance Incident response ISO 27001 IT infrastructure KPIs Monitoring NIST Risk assessment Risk management Strategy Threat intelligence Vulnerability management

Perks/benefits: Career development Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.