AVP, Security Operations

VyStar Credit UnionJacksonville, FL
1dHybrid

About The Position

At VyStar, we offer competitive pay, an excellent benefit package that includes a 401(k) Plan, an extensive paid technical and on-the-job training program, and tuition reimbursement--available to all full and part time employees. Part time positions start at a minimum of 30 hours per week. We encourage you to become a part of VyStar Credit Union's family of employees. AVP, Security Operations ACCOUNTABILITY STATEMENT The AVP will lead teams in Security Operations along with the 24x7x365 Cyber Security Operations Center (CSOC) capability with hybrid external MDR services and in-house tiered monitoring and incident response capabilities. ESSENTIAL FUNCTIONS Provides subject matter expertise in the delivery and operation of security solutions. Define, scope and drive security initiatives to continue securing data and platforms across the organization. Lead detection, validation and remediation of security events and incidents and security recommendations for management to consider for deployment. Lead incident response and forensics investigations and communications to relevant stakeholders and executive leadership. Lead the incident response program and involve relevant stakeholders in regular exercises. Lead threat intelligence and hunting programs to improve detection of known and emerging threats and exploits. Implement, manage and operate security solutions for security operations process and technology protection along with improving security orchestration, automation and response (SOAR) capabilities. Develop & operate defined security policies, procedures, and standards in line with industry leading practices for on-prem, hybrid and cloud specific environments. Define security operations continuous improvement plan and drive execution. Develop, track and present metrics and KPIs for security operations functions. Develops and acts with holistic security mindset while successfully analyzing business risk and remediation effort, to prioritize efforts and projects and not impact productivity. Partner with leadership and business project sponsors to build consensus on project requirements, expected timelines, and service delivery goals and report on status and key project risks. Communicate highly technical content to various audiences ranging from engineers to executive management, including mixed audiences. Operate independently and effectively with minimal daily oversight while ensuring alignment with security leadership directives and priorities. Perform as an individual contributor while also leading and developing team members. All employees and business units, as first line of defense, are expected to proactively help identify, assess, manage, and report risks within their domain of work. To enhance a healthy risk culture and support our growth for good pillar, employees will maintain vigilance in safeguarding our operations while ensuring compliance with regulatory mandates. The Risk team serves as the second line of defense by providing risk oversight and credible challenge whereas the Audit team serves as the third line of defense by providing risk assurance. Focus on creating and executing secure processes with concentration on internal user experience and external member experience. Incumbent is expected to demonstrate each of the following VyStar Excellence behaviors in performing the duties and responsibilities of their job. Focus - Focus your full attention by carefully listening to and observing your client or member. Connect - Consistently be friendly and approachable. Demonstrate you care. Understand - Listen empathetically and ask questions. (70%/30%) Counsel - Recommend solutions based on your client’s or member’s needs and objectives. Advance - Ensure that member's expectations were exceeded.

Requirements

  • A bachelor’s degree in information security, Computer Science, Information Systems, or another related field is preferred, but not required.
  • 8+ years Information Security experience.
  • 5+ years Security Operations experience.
  • 4+ years in a team leadership role.
  • Demonstrated self-starter with strong analytical skills.
  • Ability to communicate Information Security related concepts to a broad range of technical and non-technical staff both verbally and in writing.
  • Ability to manage multiple tasks simultaneously and meet established deadlines.
  • Ability to collaborate with all IT teams on security-related incidents, tasks and projects.
  • Ability to work productively while remote and communicate effectively in a virtual team and on location hybrid work environment.
  • Ability to work within agile and waterfall project methodology.
  • Ability to stay current with new technology.
  • Experience implementing and managing security operations solutions.
  • Experience with security operations for Windows, Linux, Mac operating systems.
  • Experience with large scale and complex incidents of all types, including APT, DDoS, malicious insider, web and mobile applications, and data exfiltration.
  • Experience with assessing, developing, implementing, optimizing and documenting comprehensive operations of security solutions and processes.
  • Experience managing and building comprehensive security operations programs.
  • Extensive knowledge of protection solutions and technologies for security operations, security orchestration, automation & response.
  • Extensive knowledge implementing and managing security solutions: Logging & Security Event and Information Management (SIEM) Security Orchestration, Automation & Response (SOAR) Threat Intelligence Threat Hunting Insider Threat Digital Forensics Incident Response & Case Management
  • Experience with application security tools, functions & services similar to CrowdStrike, Exabeam, Splunk, Palo Alto, Lumifi, Axonius and Microsoft security suite.
  • Experience with security operations in on-prem & cloud environments, Azure preferred.
  • Knowledge of the following Frameworks NIST Cybersecurity Framework Cloud Security Alliance
  • Experience with Microsoft Office Suite (Word, Outlook, PowerPoint, Excel, Visio)
  • Experience and knowledge of banking and financial industry IT regulatory environment preferred.

Nice To Haves

  • CISSP, CISM, GIAC, and other security engineering, security operations and incident response certifications are preferred.
  • Career development plan to include certifications upon hire.

Responsibilities

  • Provides subject matter expertise in the delivery and operation of security solutions.
  • Define, scope and drive security initiatives to continue securing data and platforms across the organization.
  • Lead detection, validation and remediation of security events and incidents and security recommendations for management to consider for deployment.
  • Lead incident response and forensics investigations and communications to relevant stakeholders and executive leadership.
  • Lead the incident response program and involve relevant stakeholders in regular exercises.
  • Lead threat intelligence and hunting programs to improve detection of known and emerging threats and exploits.
  • Implement, manage and operate security solutions for security operations process and technology protection along with improving security orchestration, automation and response (SOAR) capabilities.
  • Develop & operate defined security policies, procedures, and standards in line with industry leading practices for on-prem, hybrid and cloud specific environments.
  • Define security operations continuous improvement plan and drive execution.
  • Develop, track and present metrics and KPIs for security operations functions.
  • Develops and acts with holistic security mindset while successfully analyzing business risk and remediation effort, to prioritize efforts and projects and not impact productivity.
  • Partner with leadership and business project sponsors to build consensus on project requirements, expected timelines, and service delivery goals and report on status and key project risks.
  • Communicate highly technical content to various audiences ranging from engineers to executive management, including mixed audiences.
  • Operate independently and effectively with minimal daily oversight while ensuring alignment with security leadership directives and priorities.
  • Perform as an individual contributor while also leading and developing team members.
  • All employees and business units, as first line of defense, are expected to proactively help identify, assess, manage, and report risks within their domain of work.
  • To enhance a healthy risk culture and support our growth for good pillar, employees will maintain vigilance in safeguarding our operations while ensuring compliance with regulatory mandates.
  • The Risk team serves as the second line of defense by providing risk oversight and credible challenge whereas the Audit team serves as the third line of defense by providing risk assurance.
  • Focus on creating and executing secure processes with concentration on internal user experience and external member experience.
  • Incumbent is expected to demonstrate each of the following VyStar Excellence behaviors in performing the duties and responsibilities of their job. Focus - Focus your full attention by carefully listening to and observing your client or member. Connect - Consistently be friendly and approachable. Demonstrate you care. Understand - Listen empathetically and ask questions. (70%/30%) Counsel - Recommend solutions based on your client’s or member’s needs and objectives. Advance - Ensure that member's expectations were exceeded.

Benefits

  • competitive pay
  • an excellent benefit package that includes a 401(k) Plan
  • an extensive paid technical and on-the-job training program
  • tuition reimbursement
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service