Cybersecurity Manager
Huntington Beach, CA, United States
Full Time Mid-level / Intermediate USD 120K - 150K
SBT Global
SAP 기반 솔루션 연구개발 및 컨설팅, SAP ERP 구축 및 Conversion, Data 기반 AI 서비스, SAP 기능 내제화 된 CRM 솔루션 Salesforce 사업, INFORACTIVE(인포랙티브), SBT Global, 에스비티 글로벌, SBT 글로벌, 소베텍Company Description
Onsite
$120K - $150K DOE
Job Description
Position Overview
We are seeking a highly experienced and strategic Cybersecurity Manager to lead the development and execution of our cybersecurity portfolio roadmap. This critical role ensures the health and successful delivery of all projects within the portfolio, driving alignment with organizational priorities and mitigating cybersecurity risks. You will be hired solely to be responsible security aspects and make a team growth for safe work environment. This position demands a deep understanding of company IT infrastructure principles, including roadmap development, security management, and capacity planning. Excellent interpersonal skills are essential to build strong relationships, facilitate effective decision-making, and influence outcomes across the organization.
Key Responsibilities
- Effective Collaboration and Communication: Develop and maintain the cybersecurity portfolio roadmap, ensuring alignment with organizational goals. Drive continuous improvement and create clear documentation of all security initiatives.
- Collaboration with cross-functional business organization to ensure security is integrated into all aspects of the network infrastructure
- Communicate security risks and recommendations to management and other stakeholders.
- Provide training to staff on security best practices
- Collaborate with cybersecurity executives and external stakeholders to develop and maintain a comprehensive cybersecurity portfolio roadmap. Heavily involved to HQ and Group security policy and practices to be adopted adequately.
- Security Management: Security solutions for end points (SASE, EDR), Cloud based access control by VPN/ZTNA solutions or practices should be controlled and perform periodic routine tasks including threatening monitoring and immediate remedy reaction. Mainly work proactively how to protect company valuable and sensitive information and apply improvement as top priority
- Network Security Design and Implementation
- Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and other security devices.
- Configure and maintain network security devices and software to ensure optimal performance and security.
- Develop and implement network security policies, procedures, and standards.
- Security Monitoring and Incident Response: Serve as the point of escalation for cross-functional dependencies, impediments, and risk resolutions. Implement robust governance processes to effectively manage risks and issues.
- Monitor network traffic and security logs for suspicious activity and potential security breaches.
- Investigate and respond to security incidents, including malware infections, unauthorized access attempts, and data breaches.
- Conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses.
- Maintain and update security incident response plans.
- Security Auditing and Compliance:
- Effective Collaboration and Communication: Develop and maintain the cybersecurity portfolio roadmap, ensuring alignment with organizational goals. Drive continuous improvement and create clear documentation of all security initiatives.
- Conduct regular security audits to ensure compliance with industry standards and regulations (e.g., ISO 27001, PCI DSS, GDPR).
- Maintain accurate documentation of network security configurations, policies, and procedures.
- Prepare security reports and presentations for management.
- Security Technology Evaluation and Implementation:
- Evaluate and recommend new security technologies and solutions to enhance network security.
- Stay up-to-date on the latest security threats and vulnerabilities.
- Provide technical expertise and support to other IT teams on security-related matters.
Qualifications
Qualifications
- Minimum 5 years of progressive experience in Information Technology/Information Security, including network security configuration, management of firewall/VPN devices, any on-site/cyber security solutions setup/development/management
- Proven experience with firewall management (e.g., Palo Alto, Cisco ASA, Fortinet), IDS/IPS, VPNs, and other security technologies.
- Strong understanding of TCP/IP, routing, switching, and other networking protocols.
- Experience with security information and event management (SIEM) systems (e.g., Splunk, QRadar).
- Experience with cloud security (AWS, Azure/Microsoft Defender, Sentinel, Entra, GCP) is a strong plus.
- Bachelor’s degree preferably in computer science, information security, or other relevant area of study
- Expertise in developing security strategic technology plans and roadmaps, including business capability planning.
- Exceptional business communication, relationship-building, influencing, and change management skills.
- Ability to translate complex security concepts into clear and compelling presentations for non-technical audiences.
- Minimum 5 years of progressive experience in Information Technology/Information Security, including network security configuration, management of firewall/VPN devices, any on-site/cyber security solutions setup/development/management
Preferred Qualifications
- Microsoft Certified: Azure Security Engineer Associate or Cybersecurity Architect Expert
- CISA, CISM or CISSP (or similar) certification.
- PMP or CSM certification.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Tags: Audits AWS Azure CISA CISM CISSP Cloud Compliance Computer Science EDR Firewalls GCP GDPR Governance IDS Incident response Intrusion detection IPS ISO 27001 IT infrastructure Malware Monitoring Network security PCI DSS Pentesting QRadar SASE Sentinel SIEM Splunk TCP/IP VPN Vulnerabilities ZTNA
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.