Cyber Security Manager

Starboard Cruise ServicesDoral, FL
1d

About The Position

As the Cyber Security Manager/Security Engineer, your primary purpose is to protect Starboards information systems, cloud infrastructure, endpoints, networks, and data against threats, including malware, hacks, and security breaches. The cybersecurity manager devises and implements policies to protect digital systems and assets. This role develops comprehensive guidelines and protocols for the organization’s employees on handling systems and information. The Cyber Security Manager will monitor new and emerging data privacy laws and ensure compliance -technically and contractually. In the event of a cyberattack or data breach, the cybersecurity manager oversees the situation internally and works with external investigators and law enforcement personnel. This position is responsible for the collection and monitoring of risk metrics from operational security controls such as vulnerability scanning, system patching, penetration testing, and other security event sources.

Requirements

  • Bachelor’s degree in information technology field such as Computer Science, Cyber Security, or equivalent years of experience required.
  • Experience in risk management, vulnerability assessment, and security controls implementation.
  • Ability to handle level 1-3 security issues.
  • 5 years of as a network and system administrator
  • Strong knowledge of incident response and crisis management with the ability to identify both tactical and strategic solutions using strong verbal and written communication skills.
  • Understanding of network, desktop, and server technologies, including experience with network intrusion methods, network containment, segregation techniques and technologies
  • Familiarity with Industry standards such as PCI DSS, NIST, ISO / IEC 27000
  • Familiarity with Data Privacy Legislation such as GDPR, CCPA, VCDPA, etc.
  • Cloud security knowledge and skills; securing cloud environments as well as detecting and responding to cyber security incidents in the cloud.
  • Log (network, security, access, OS, application, etc.) analysis skills and experience in relation to identifying and investigating security incidents.
  • Strong knowledge of firewall technologies -Checkpoints preferred, but Palo Alto, or Fortinet Firewalls sufficient.
  • Experience with Rolling out BitLocker enterprise wide.
  • knowledge of PAM, IPAM, and IAM Solutions
  • Experience managing cyber security training programs and phishing campaigns.
  • Working knowledge of Data security technologies and Products including Tanium, Sentinel One, Proofpoint, SFTP
  • Strong communication skills, as well as the ability to adapt communication styles to suit different audiences. To have a clear understanding of confidentiality issues and related laws.
  • Able to thrive in both independent and collaborative work environments.
  • Dedicated, innovative and self-motivated team player.
  • Able to effectively oversee multiple and concurrent projects / responsibilities.
  • Ability to work flexible hours, days, and shifts.
  • Ability to learn quickly and work independently with or without direct supervision.
  • Ability to present cyber-related presentations to senior executives.
  • Ability to maintain a positive mental attitude in a highly flexible environment.

Nice To Haves

  • Industry certification such as CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional) a plus.
  • Knowledge of regulatory frameworks desired (e.g. PCI, SOX, GDPR, SSAE16, ISO 27001)

Responsibilities

  • Information Security Program Management
  • Oversee the organization's information technology (IT) security needs.
  • Minimize security risks, respond to security threats and attacks, and develop best practices and procedures to safeguard information for the organization.
  • Manage Projects to implement new security solutions on time and on budget
  • Research and recommend investments in cybersecurity technologies
  • Design and build new security solutions to improve the security posture of the organization
  • Reconfigure existing security platforms to reduce cyber security risk scores
  • Apply security related changes to the firewall and network switches
  • Apply security related changes to web/hypervisor/SAN and related servers
  • Recommends and participates in the analysis, evaluation, and development of enterprise long-term strategic and operating plans to ensure that the IT objectives are consistent with security best practices
  • Establish performance metrics and key performance indicators (KPIs) to measure the effectiveness of the security programs effectiveness
  • Conduct threat identification and vulnerability assessments
  • Offer cybersecurity guidance, best practices, and support across businesses
  • Collaborate with cross-functional teams to integrate security into all aspects of projects, systems, and processes
  • Research new attack vectors and technologies to mitigate potential threats
  • Review, develop, test, and implement security plans, products, and control techniques
  • Work with Enterprise Services team to design security services and implement security architecture improvements
  • Identify unsupported applications or otherwise insecure technologies and work to update them or remove them from the network
  • Incident Review and Mitigation
  • Manage the Security Operations Center Partner ArticWolf to monitor and improve the organization's security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
  • Lead response and investigation efforts in data security incidents, provide an after-action report and design corrective actions.
  • Act as incident response manager and lead recover efforts in the event of security breaches or incidents.
  • Monitor for new vulnerabilities, identify risks, and lead mitigation efforts.
  • Ensure security patching is up to date -Collaborate with the Enterprise Services team as required for assistance
  • Perform Vulnerability scans and recommend remediation as needed
  • Perform Penetration testing annually -track and lead remediation
  • Track operational metrics related to alerts, incidents, and vulnerabilities
  • Review incidents identified by the SOC partner Arctic Wolf and action as appropriate
  • Monitoring cyber threats, vulnerabilities, suspicious activities, and intrusions
  • Providing technical support for security systems, including firewalls and patch management
  • Managing user configuration and remote access privileges
  • Policies and Procedures
  • Lead, coordinate, communicate, integrate, and be accountable for the overall success of the cyber security program, ensuring alignment of enterprise priorities
  • Review legal documents relating to Data Privacy policies and lead contract review discussions with the legal team
  • Monitor new and emerging data privacy laws and ensure compliance -technically and contractually -advise the Starboard executive team how new Cyber Security Laws will affect the organization’s operations
  • Devise and implement policies to protect digital systems and assets. In addition, develop comprehensive guidelines and protocols for the organization's employees on handling systems and information
  • Manage Cyber Security awareness training across the organization
  • Review system configurations for unapproved changes. i.e. additional access, firewall rules, etc
  • Partner with Internal Audit to ensure compliance with all established security controls
  • Partner with External Audit to ensure compliance with all STB financial security controls
  • Lead the Change Advisor Board. Ensuring system changes do not put operations of the organization at risk of failures or security incidents
  • Conducting periodic security audits to ensure policies are followed
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service