Director, Cyber Defense & Response - Data Security

Prudential FinancialNewark, NJ
1d

About The Position

Are you passionate about safeguarding organizations from within by integrating innovative analytics, strategic prevention, and cyber defense capabilities? Our Cyber Defense and Response team is dedicated to a culture where proactive risk management is part of our DNA. When you join Prudential as a Director of Data Security, you’ll unlock a high-impact career path, while continuously growing your expertise at one of the world’s leading financial institutions. Your Team & Role The Director of Data Security is responsible for leading the daily operations of Prudential’s enterprise Data Security Program, focused on protecting data across on-premises, cloud, and endpoint environments. This role oversees the governance of data security capabilities, including monitoring, detection, and response to potential data security events. The Director works closely with the Chief Technology Office, Chief Data Office, HR, Privacy, Compliance, Legal, and Enterprise Risk Management to ensure secure data handling, storage, and transmission practices are consistently applied across the organization. The Director establishes operational processes, governance of control standards, and response procedures aligned with company standards to ensure data risks are identified, protected, detected, and addressed in a consistent and defensible manner. The role also provides leadership with insights into data risk exposure, control effectiveness, and emerging threats to support informed decision-making and strengthen the organization’s overall data security posture. Here is what you can expect on a typical day: Build, mentor, and manage a team of data security specialists responsible for monitoring and investigating data security incidents. Develop and maintain data security policies, standards, and procedures aligned with company policies and standards. Partner with key stakeholders to support efforts around identification and classification of data assets. Ensure appropriate protection mechanisms such as encryption, access controls, and DLP are implemented. Support data security risk assessments and control gap analysis to identify exposures affecting sensitive data. Oversee monitoring and detection capabilities to identify potential data loss, misuse, or unauthorized access. Direct response activities for data security incidents, including investigation, containment, remediation, and reporting. Partner with IT, Risk, Compliance, and Privacy teams to ensure secure data handling, storage, and transmission practices. Support education and awareness initiatives to promote responsible data handling. Provide executive reporting on data risk posture, security metrics, and program maturity. Continuously evaluate emerging threats, regulatory changes, and industry practices to enhance the data security program. Drive continuous improvement of detection, investigation, and prevention capabilities in alignment with leading practices. Operate effectively in ambiguous and complex situations, independently assessing risk, making timely decisions, and applying a flexible, solutions-oriented approach to resolve insider risk challenges. Continuously develop professional expertise by completing relevant training and pursuing industry-recognized certifications to stay current with evolving insider risk, cybersecurity, and investigative practices.

Requirements

  • Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field preferred.
  • 8+ years of experience in cybersecurity with a strong focus on data security, data protection, and governance.
  • Demonstrated experience leading enterprise or global data security programs and managing security teams.
  • Strong understanding of data protection principles aligned with industry best practices and frameworks.
  • Experience implementing and managing data security controls such as data classification, access control, encryption, data loss prevention (DLP), and monitoring of data usage.
  • Hands-on experience with security technologies used to protect and monitor data, including SIEM, CASB, DSPM, and cloud security platforms.
  • Familiarity with regulatory and privacy requirements impacting data protection (e.g., GDPR, HIPAA, CCPA) and their associated control expectations.
  • Ability to conduct data risk assessments, control gap analysis, and remediation planning to strengthen protection of sensitive information assets.
  • Strong leadership, communication, and stakeholder management skills, with the ability to collaborate across IT, Security, Privacy, Compliance, and Risk functions.
  • Proven ability to handle sensitive and confidential information with discretion and sound judgment.
  • Business acumen and the ability to make risk-based decisions that balance security, regulatory obligations, and operational needs.
  • Commitment to continuous learning and professional development to stay current with evolving data security threats, technologies, and regulatory requirements.

Nice To Haves

  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Cloud Forensics Responder (GCFR)
  • GIAC Cloud Forensics Responder (GCFR)
  • Certified Information Systems Security Professional (CISSP)
  • AWS Security Specialty

Responsibilities

  • Build, mentor, and manage a team of data security specialists responsible for monitoring and investigating data security incidents.
  • Develop and maintain data security policies, standards, and procedures aligned with company policies and standards.
  • Partner with key stakeholders to support efforts around identification and classification of data assets.
  • Ensure appropriate protection mechanisms such as encryption, access controls, and DLP are implemented.
  • Support data security risk assessments and control gap analysis to identify exposures affecting sensitive data.
  • Oversee monitoring and detection capabilities to identify potential data loss, misuse, or unauthorized access.
  • Direct response activities for data security incidents, including investigation, containment, remediation, and reporting.
  • Partner with IT, Risk, Compliance, and Privacy teams to ensure secure data handling, storage, and transmission practices.
  • Support education and awareness initiatives to promote responsible data handling.
  • Provide executive reporting on data risk posture, security metrics, and program maturity.
  • Continuously evaluate emerging threats, regulatory changes, and industry practices to enhance the data security program.
  • Drive continuous improvement of detection, investigation, and prevention capabilities in alignment with leading practices.
  • Operate effectively in ambiguous and complex situations, independently assessing risk, making timely decisions, and applying a flexible, solutions-oriented approach to resolve insider risk challenges.
  • Continuously develop professional expertise by completing relevant training and pursuing industry-recognized certifications to stay current with evolving insider risk, cybersecurity, and investigative practices.

Benefits

  • Market competitive base salaries, with a yearly bonus potential at every level.
  • Medical, dental, vision, life insurance, disability insurance, Paid Time Off (PTO), and leave of absences, such as parental and military leave.
  • 401(k) plan with company match (up to 4%).
  • Company-funded pension plan.
  • Wellness Programs including up to $1,600 a year for reimbursement of items purchased to support personal wellbeing needs.
  • Work/Life Resources to help support topics such as parenting, housing, senior care, finances, pets, legal matters, education, emotional and mental health, and career development.
  • Education Benefit to help finance traditional college enrollment toward obtaining an approved degree and many accredited certificate programs.
  • Employee Stock Purchase Plan: Shares can be purchased at 85% of the lower of two prices (Beginning or End of the purchase period), after one year of service.
  • Eligibility to participate in a discretionary annual incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service