Cyber Security Manager, Threat Management (Remote)

FRANKLIN, Tennessee, United States

Community Health Systems

CHS has been developing and operating healthcare delivery systems committed to helping people get well and live healthier for nearly 40 years.

View all jobs at Community Health Systems

Apply now Apply later

Community Health Systems is one of the nation’s leading healthcare providers. Developing and operating healthcare delivery systems in 39 distinct markets across 15 states, CHS is committed to helping people get well and live healthier. CHS operates 69 acute-care hospitals and more than 1,000 other sites of care, including physician practices, urgent care centers, freestanding emergency departments, occupational medicine clinics, imaging centers, cancer centers and ambulatory surgery centers.

 

Summary:

As a member of the Cybersecurity leadership team, the Manager of Threat Management leads a team of security practitioners whose service lines are threat intelligence and cyber initiative delivery (“Cyber Enablement”), and will build and operate a new Security Validation service line that provides internal red team capabilities, validation that vulnerabilities have been effectively closed, and demonstration of susceptibility to build consensus and buy-in regarding the need for resolution. In leading the Threat Intelligence team, this position will elevate insights regarding the CHS and healthcare industry threat landscape to help shape cybersecurity and broader technology strategy. The manager will drive strategy and projects that increase the overall growth and maturity of the threat management services.

 

Essential Duties and Responsibilities:

  • Develop and maintain a broad understanding of the healthcare threat landscape, including notable threat actors, techniques, and news.
  • Provide leadership, management, and oversight for cyber enablement, ensuring that work generated by partner teams such as vulnerability findings and low-severity incident response findings are effectively driven to closure. Drive high-criticality, short-term work to
  • Provide leadership, management, and oversight for the threat intelligence program including reviewing threat intelligence communications for the enrichment of the broader cybersecurity and technology programs.
  • Launch and Operationalize a new Security Validation service line, including hiring dedicated personnel, in order to demonstrate susceptibility to attack. Perform internal red team exercises and purple team exercises in coordination with the SOC. Generate credibility by demonstrating attack patterns and validating effective closure of risks.
  • Function as a key partner to the Security Operations Center and vulnerability management activities. Contribute to the overall strategic success of the Cyber Defense team.
  • Evaluate, develop, and report on metrics demonstrating the effectiveness of each program within this position’s scope
  • Continuously improve Threat and Vulnerability services through the identification and execution of process improvement efforts. Develop capabilities in alignment with the NIST Cybersecurity Framework and internal strategic goals.
  • Make recommendations for the creation of cost-effective risk mitigation strategies to reduce the overall enterprise cybersecurity risk.
  • Manage collaboration with peer organizations to ensure required technical capabilities are maintained, available, and aligned to current as well as future program requirements
  • Review security technologies, tools, and services, and make recommendations to the broader security team for their use, based on security, financial, and operational metrics and place purchase requests for personnel and infrastructure to support each program of responsibility
  • Liaise with Chief Cybersecurity Architect to share best practices and insights
  • Develop and mature processes to guide team member development to achieve career goals by leading individual 1:1 meetings and coaching individual team member development plans.


Qualifications:

  • Required Education: High School Diploma
  • Preferred Education: Bachelor’s or Master’s Degree in Cyber Security, Computer Science, Information Systems (or other related field), or equivalent work experience.
  • Required Experience:
    • Duration:
      • 6+ years of IT or information security
      • 4+ years of information security
    • Activities:
      • Designed and implemented technologies designed to reduce information security risk
      • Provided value across a spectrum of information security activities, such as monitoring, vulnerability management, threat intelligence, security architecture and engineering, and operations
      • Worked in process-driven structured environments, and participated in process optimization activities.
    • Competencies:
      • Advanced knowledge of security principles, issues, techniques and implementations across IT platforms.
      • Proactive identification and solving of complex problems
      • Strong understanding of systems development lifecycle to provide technical leadership for multifunctional projects or initiatives.
      • Effective communication of technical concepts to a non-technical audience.
      • Excellent written and verbal communication skills
  • Required License/Registration/Certification: None
  • Preferred License/Registration/Certification:
    • SANS Certification
    • GIAC Certification
    • CISSP Certification
  • Computer Skills Required: General office software, and reporting software as necessary to support the team.

 

Physical Demands:
In order to successfully perform this job, with or without a reasonable accommodation, the following are outlined below:

  • The Employee is required to read, review, prepare and analyze written data and figures, using a PC or similar, and should possess visual acuity.
  • The Employee may be required to occasionally climb, push, stand, walk, reach, grasp, kneel, stoop, and/or perform repetitive motions.
  • The Employee is not substantially exposed to adverse environmental conditions and; therefore, job functions are typically performed under conditions such as those found within general office or administrative work.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: CISSP Computer Science Cyber defense GIAC Incident response Monitoring NIST Red team SANS SOC Strategy Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.