Manager Senior, Cybersecurity Product Management

San Antonio Home Office I, United States

USAA

USAA offers competitive auto rates, no-monthly service fee banking and retirement options to all branches of the military and their family. Join now and let us serve you.

View all jobs at USAA

Apply now Apply later

Why USAA?

At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.

Embrace a fulfilling career at USAA, where our core values – honesty, integrity, loyalty and service – define how we treat each other and our members. Be part of what truly makes us special and impactful.

The Opportunity

As a dedicated Manager Senior, Cybersecurity Product Management, you will lead a new team that's focused on supporting project management, product management and engineering integration within the CTOC. This team will support the prioritization of work, tracking of work and execution of efforts towards defending against threats to the Association and our Membership.

The Cyber Threat Operations Center (CTOC) is USAA’s equivalent to a traditional Security Operations Center (SOC). The CTOC safeguards against cybersecurity threats targeting USAA. The CTOC comprises several teams supporting cyber threat intelligence, protection, monitoring, analysis, and response, vulnerability management, application security, network security and all report under the Executive Director of Cyber Threat Operations.

Leads one or more analytical, business or technical support functions and is responsible for the implementation and management of enterprise information security policies, standards, processes and solutions that ensure USAA establishes, deepens and retains a best-in-class security posture.

Develops, designs and implements security governance and assurance processes within security domains. This role has a direct impact on protecting USAA’s brand and reputation within assigned Information Security domains. Plans and organizes activities of professional and administrative staff engaged in providing information security/cyber security services associated with existing and emerging security risks in a complex and highly regulated environment. Partners with the lines-of-business, Enterprise Risk and Compliance, Audit Services, and Legal, to support enterprise information security risk and compliance initiatives.

We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: San Antonio, TX, Plano, TX, Or Phoenix, AZ. Relocation assistance is not available for this position.

What you'll do:

  • Responsible for ownership and execution of one or more critical security domains or capabilities.

  • Implements senior leadership's strategic vision and leads their team in the compliant daily execution of their assigned information security domain. Contributes to the organization’s short and long-term vision, strategies, goals and metrics.

  • Leads effective operation of assigned information security domain's day-to-day operations including capacity, resilience and dependability capabilities and how changes in conditions, operations, or the environment will affect the system's operation.

  • Develops, reviews, and communicates information security risk management policies and procedures to ensure appropriateness and adequacy versus industry standard methodologies and regulatory requirements.

  • Responsible for developing evaluation methods and reporting the status of information security activities and alerting management to potential risks, compliance issues, and operational inefficiencies.

  • Develops, designs, and delivers a sustainable governance and assurance model within multiple domains.

  • Identifies, monitors and evaluates operational solutions to reduce information security risk, meet compliance requirements and increase enterprise workforce efficiency, business agility and workforce scalability.

  • Promotes information security awareness within their teams and across Enterprise Security Group.

  • Serves as financial steward for the organization and handles workforce and budgets to ensure they cost-effectively meet the needs of the organization.

  • Builds and oversees a team of employees for assigned functional area through ongoing execution of recruiting, development, retention, coaching and support, performance management, and managerial activities.

  • Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.

What you have:

  • Bachelor’s degree in Information Security, Information Technology, Computer Science, Business Administration, Information Systems/Management or related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.

  • 6 years of related information security experience in one or more domains, e.g.: Cybersecurity, Identity and Access Management, Information Assurance and Governance, Operational Risk Management and/or Information Technology to include substantial accountability for projects, programs, processes or policies.

  • 2 years of direct team lead, supervisory, or management experience in an Information Security or Information Technology domain.

  • 2 years of researching, designing, or implementing technology, information security or cybersecurity solutions in a large financial institution or large enterprise information security program with a consistent track record of delivering results in compliance with federal/state/regulatory information security and risk management policies, standards, and guidelines.

  • Working knowledge of relevant regulations and standards related to risk management and information security, e.g.: FFIEC, Gramm-Leach-Bliley, FFIEC Cybersecurity Assessment Tool, NIST Cybersecurity Framework and the Payment Card Industry Data Security Standard.

  • Strong written and verbal communication skills, including the ability to communicate technical analyses to a non-technical audience.

  • Strong knowledge of security technologies to include cryptography, authentication, authorization, and controls.

  • Strong Knowledge of IT risks and experience implementing security solutions.

  • Knowledge of threats, vulnerabilities, attack methods and countermeasures for web-based applications, networks, and cyber security solutions.

  • Expertise in risk management processes and principles.

  • Familiarity with budgets, forecasting, and completing the budgets for the applicable information security, cybersecurity, or technology support function.

What sets you apart:

  • Experience leading teams focused on project management, product management and engineering integration.

  • Planning and program management experience in cyber operations, applications security, vulnerability management and platform/network defense programs.

  • Experience with portfolio management tools and work item management tools.

  • Thought leadership – understanding strategy/vision to execution and delivering business value.

  • Drives creativity and ingenuity among the team in the search for and application of new product development solutions to resolve highly technical complex and unique issues.

  • Experience with preparing for and implementing Scaled Agile Framework (SAFe) Planning Intervals.

  • Ability to partner with sponsors, collaborators, architects and IT partners to facilitate, define and document relevant business gaps, gaining an understanding of business needs, priorities, metrics, risks and controls for the business domain.

  • Provides guidance and oversight at the portfolio, program and project level plans related to schedule, scope and resources.

  • Supports the development and monitoring of Objectives and Key Results (OKRs)

  • Awareness of industry and government regulations affecting security practices, including FFIEC IT Handbooks / Federal Reserve regulatory requirements, privacy and PCI

Compensation range: The salary range for this position is: $143,320.00 - $273,930.00.

Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.

 

Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.

The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.

 

Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.

 

For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.

Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.

 

USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Apply now Apply later
Job stats:  1  0  0
Category: Leadership Jobs

Tags: Agile Application security Compliance Computer Science Cryptography FFIEC Governance IAM Monitoring Network security NIST OKR Privacy Risk management SOC Strategy Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development Competitive pay Flex hours Flex vacation Health care Insurance Relocation support Wellness

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.