Cybersecurity Manager

FujifilmRemote,
Remote

About The Position

The Manager of Cybersecurity will report to the Director of Information Security and is responsible for developing, implementing, and managing Cybersecurity operations. In addition, this position will oversee securing information technology systems and applications, such as security patching, data protection controls, vulnerability scanning, encryption, remediation of penetration test findings, etc. This position is responsible for managing a team of security professionals that oversees, analyzes, and implements remediation plans to mitigate/eliminate security threats/vulnerabilities. This position is responsible for the deployment and management of security management systems, ensuring proactive identification of information and network security vulnerabilities. To ensure success, the Manager of Cybersecurity must display an excellent understanding of technologies, using Firewalls, VPN, Data Loss Prevention, IDS/IPS, Web-Proxy, and Security Audits. This person must be comfortable working with a variety of technologies, conducting information security response programs, implementing security remediation/corrective action plans, conducting/managing forensic investigations.

Requirements

  • Knowledgeable in the following IT technologies and disciplines: Windows/Linux Operating Systems, Network architecture, firewalls, intrusion detection/prevention technologies, log collection technologies, security management tools (SIEM), data loss prevention, anti-virus/malware, vulnerability detection/management, EDR management, identity access management), and IT data center operations and application SDLC methodologies
  • Must possess strong management and leadership skills.
  • Must possess strong analytical, troubleshooting and organization skills.
  • Remains current on information security frameworks and be able to apply these requirements to applicable regulatory and laws.
  • Knowledgeable in threat hunting techniques, and common hacking/attack methodologies (cross-site-scripting, SQL injection, etc.) and various other security tools.
  • Have required skills to conduct and lead detailed analysis and forensic investigation on suspected unauthorized access, suspicious behavior, and potential data breach/exfiltration.
  • Have strong written and verbal communication skills and can summarize highly technical security findings into non-tech savvy responses.
  • A degree in computer science, Information Security, systems engineering, or related qualifications.
  • CISSP, CISM, or Security + certifications or equivalent in experience
  • 5 - 8 years of work experience in managing IT Data Center operations, or Security Operations Center, or equivalent IT management experience.
  • Experience with handling incident detection, incident response, and forensic investigations.

Nice To Haves

  • Experience working in a Shared Service organization, supporting numerous different industry security frameworks and regulations.
  • Real life data breach, incident response, and forensic investigation experience. Dealing with ransomware and other highly visible attack methods.
  • Relevant certifications such as CISSP, CISM, CEH, CompTIA Security+, or OSCP.

Responsibilities

  • Manages the day-to-day security operations. Monitoring and analyzing threats and vulnerabilities of Information Technology infrastructure and applications; going through alerts and logs is the basic work carried out daily by the Cybersecurity Operations team.
  • The Cybersecurity Manager maintains all security tools and technology.
  • Monitoring internal and external information/cybersecurity policy and procedure compliance. This involves ensuring that vendors, employees, and third-party workers understand your cybersecurity risk management policies and security controls.
  • Monitoring security controls for regulation compliance related to data such as health care data, credit card information, or other personally identifiable information.
  • Manages and prioritizes alerts provided by the Global SOC. Ensures they are analyzed and evaluated for validity and that remediation activities are completed by external delivery and local IT teams in a timely manner.
  • Analyze and monitor IT Systems and applications, ensuring software security patches are managed and accurately applied in accordance with agreed timeframes.
  • Makes security improvement recommendations based on resolutions of threats and risks identified.
  • Planning, implementing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
  • Ensuring that the organization's data and infrastructure are protected by enabling appropriate security controls.
  • Participates in the change management process to ensure security measures are evaluated, implemented, and maintained.
  • Daily administrative tasks, reporting, and communication with the relevant departments in the organization.
  • Ensure corporate security measures are effective in mitigating threats and risks and providing consultation on security issues to IT delivery team and local company IT support groups.
  • Responding to all system and/or network security breaches.
  • Remains current on malware, hacking techniques/threat vectors, and other potential internet security threats.
  • Coaches and mentors Cybersecurity Operations team, and IT delivery team members of security protection best practices.
  • All other activities assigned by the Director of Information Security

Benefits

  • Medical, Dental, Vision
  • Life Insurance
  • 401k
  • Paid Time Off
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service