Cybersecurity-Threat and Vulnerability Management - Cyber Defense Operations - Manager
Sacramento, CA, US, 95814
EY
Mit unseren vier integrierten Geschäftsbereichen — Wirtschaftsprüfung und prüfungsnahe Dienstleistungen, Steuerberatung, Unternehmensberatung und Strategy and Transactions — sowie unserem Branchenwissen unterstützen wir unsere Mandanten dabei,...Cybersecurity – Threat and Vulnerability Management – Cyber Defense Operations – Manager
The opportunity
As a Manager in Cybersecurity Operations, you will play a pivotal role in protecting our company's data and computer systems. You will be at the forefront of monitoring, identifying, and mitigating security threats, ensuring effective incident response, and driving continuous improvements in our operational processes and protocols. Your expertise will be vital in evaluating, deploying, and enhancing cyber defense measures to maintain the highest level of security against digital threats. Within our Threat and Vulnerability Management team, you will lead critical security initiatives and oversee the daily operations of our cybersecurity unit. Your role is essential in managing security incidents, ensuring compliance, and promoting a culture of collaboration and innovation. With your strategic focus on security and team management, you will enhance our cybersecurity posture and drive continuous improvements across operational activities.
Your key responsibilities
In this dynamic role, you will focus on delivering and managing key processes and projects with an emphasis on quality and robust risk management. You will be responsible for:
- Overseeing staff and guiding complex technical initiatives
- Mentoring team members and resolving issues that impact the department
- Meeting objectives and performance metrics
- Engaging in sales processes, identifying growth opportunities, and leading RFP responses
- Traveling as needed to meet client requirements and actively participating in client sessions
- Leadership and Team Management: Provide strategic guidance and leadership to the cybersecurity team, facilitating effective collaboration with security and business units to deliver impactful results.
- Mentorship and Culture Building: Mentor both senior and junior team members, cultivating a culture of trust and collaboration.
- Training and Development: Advocate for and allocate resources for team development, ensuring that team members possess cutting-edge cybersecurity skills and knowledge.
- Documentation and Compliance: Develop, coordinate, and implement comprehensive security documentation, ensuring adherence to policies and compliance standards.
- Performance Metrics and Reporting: Establish and report on performance metrics, using data insights to improve processes and enhance security strategies.
- Incident Management: Lead teams in real-time monitoring, alert triage, incident scoping, documentation, ticket escalation, and cyber-attack disruptions.
- Resource Allocation and Coordination: Manage team leads, oversee staffing levels, and ensure seamless coordination across shifts and with other operational teams.
- Stakeholder Communication: Act as a primary contact for issue communication and escalation, leading presentations and meetings with clients and EY leadership.
- Threat Landscape Monitoring: Stay informed on the latest cyber threat trends and technologies, representing the team at industry events and conferences.
- Business Development Support: Contribute to business development through methodology development, proposal writing, and supporting client presentations.
Skills and attributes for success
To thrive in this role, you will need a combination of technical expertise and business acumen. Your success will be driven by your ability to:
- Solve complex problems and recommend modifications to company policies or procedures
- Select appropriate methods and establish evaluation criteria to achieve results
- Rely on judgment and extensive knowledge in the cybersecurity realm to make informed decisions
- Effective Communication: Excellent verbal and written communication skills for interaction with clients, leadership, technical teams, and partners.
- Client Engagement: Strong ability to listen to and understand client needs, building rapport and delivering effective solutions.
- Risk Management: Ability to identify, escalate, and manage risks, enhancing service delivery and client satisfaction.
- Documentation and Quality: Proficient in producing high-quality documentation, reports, and presentations, ensuring adherence to quality standards.
- Collaborative Teamwork: Skilled at working within diverse, cross-functional teams, including those that are geographically dispersed.
- Analytical and Critical Thinking: Strong analytical skills with the ability to interpret complex information and communicate it effectively.
- Proactive Learning: Active interest in staying updated on the latest cybersecurity threats and trends, promoting continual learning and adaptation.
To qualify for the role, you must have
- A bachelor’s degree (4-year degree) in Computer Science, Information Technology, Cybersecurity, or a related field, or equivalent experience.
- A minimum of 4-6 years of relevant experience in cybersecurity operations, with a substantial background in SOC roles and team leadership.
- Proficient in IDS, SIEM tools, and other essential cybersecurity technologies.
- In-depth knowledge of cybersecurity principles, practices, and industry standards.
- Demonstrated experience in malware analysis, threat intelligence, and sophisticated forensic methodologies.
- Proven track record of leading cybersecurity projects and initiatives, with the ability to drive strategic security improvements within an organization.
- The ability to travel 70% (average) of the time to client(s) domestically and/or internationally; passport required or ability to obtain passport. Travel will depend on client(s) expectations.
Industry Certifications:
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker (CEH)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Certified Incident Handler (GCIH)
- Certified Information Systems Auditor (CISA)
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: CEH CISA CISM CISSP Compliance Computer Science Cyber defense GCIA GCIH GIAC IDS Incident response Malware Monitoring RFPs Risk management SIEM SOC Strategy Threat intelligence Travel Vulnerability management
Perks/benefits: Career development Conferences Flex hours Flex vacation Health care Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.