Director, IT Security

Centric ConsultingSt. Louis, MO
12hHybrid

About The Position

At Centric Consulting, we've cultivated a unique approach to business. Our business is built on three fundamental principles: Enjoy the people you work with, have fun, and do great work. These principles define our consulting model and have crafted one of the most vibrant cultures in the consulting industry – celebrating individuals, collaboration, and lifelong friendships. In this role, you will: Architect and implement enterprise-grade cybersecurity solutions across the IT and OT (manufacturing) environments Develop and maintain security architecture documentation and standards Evaluate and deploy security technologies (e.g., SIEM, EDR, firewalls, IAM, DLP, DSPM, Zero Trust) Ensure compliance with relevant frameworks and regulations (e.g., NIST, ISO 27001, CMMC, SOC2) Lead complex incident response and forensic investigations. Design and manage threat detection and prevention systems. Perform proactive threat hunting and risk assessments. Collaborate with internal teams to architect secure infrastructure. Develop and enforce security policies, standards, and guidelines. Vulnerability Management: Implement and manage vulnerability assessment tools and processes to ensure the security and compliance of IT systems Technical Leadership: Provide guidance and mentorship to junior IT staff, fostering a culture of continuous learning and improvement Project Management: Lead IT projects from inception to completion, ensuring timely delivery and adherence to budget and quality standards Stakeholder Collaboration: Work closely with business leaders, IT teams, and external vendors to ensure alignment and successful implementation of IT initiatives while embedding security into systems and workflows

Requirements

  • Experience: 6+ years of progressive experience in Cybersecurity roles
  • Education: Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related discipline
  • Manufacturing OT: Strong understanding of ICS/SCADA systems, PLC networks, and industrial protocols (e.g., Modbus, OPC UA, DNP3). Experience with network segmentation, firewalls, IDS/IPS, and zero trust architectures in OT environments.
  • Vulnerability Management: Strong knowledge of vulnerability assessment tools and techniques
  • Leadership: Proven ability to mentor team members
  • Project Management: Strong project management skills with a track record of successful project delivery
  • Communication: Excellent verbal and written communication skills as well as ability to present monthly metrics to senior leadership
  • Business Acumen
  • Project Leadership: Lead small cross-functional projects, requiring them to consider the impact on the entire enterprise.
  • Financial Impact: Understand and review contract scope, corresponding cost and impact
  • Business Value: Ability to define and identify the business value for IT projects/support changes with limited oversight.
  • Technical Acumen
  • Enterprise-wide Technology Use: Able to analyze or design technical solutions and the impacts of the enterprise. Typically, is able to manage contract execution from beginning to end without leadership oversight.
  • Enterprise Thinking
  • Alignment with Organizational Goals: Aligns their work and decisions with the broader organizational goals and strategies. Leads efforts to resolve significant problems and serves as primary contact at supervisory and leadership level.
  • Decision Making: Able to interpret root-cause problems and propose relevant solutions. Broad understanding of issues and proactive recognition of patterns requiring deeper analysis within the function.
  • Project Leadership: Able to lead mid-sized projects with guidance from leadership. Able to drive alignment between project decisions and customer needs.
  • Emotional Intelligence: Demonstrated Emotional Intelligence: Accurately identifies, regulates and understands own emotions as well as the emotions of others, is able to manage conflict and bring solutions to the table.

Nice To Haves

  • Advanced certifications: CISSP, CISM, or OSCP are highly desirable.

Responsibilities

  • Architect and implement enterprise-grade cybersecurity solutions across the IT and OT (manufacturing) environments
  • Develop and maintain security architecture documentation and standards
  • Evaluate and deploy security technologies (e.g., SIEM, EDR, firewalls, IAM, DLP, DSPM, Zero Trust)
  • Ensure compliance with relevant frameworks and regulations (e.g., NIST, ISO 27001, CMMC, SOC2)
  • Lead complex incident response and forensic investigations.
  • Design and manage threat detection and prevention systems.
  • Perform proactive threat hunting and risk assessments.
  • Collaborate with internal teams to architect secure infrastructure.
  • Develop and enforce security policies, standards, and guidelines.
  • Vulnerability Management: Implement and manage vulnerability assessment tools and processes to ensure the security and compliance of IT systems
  • Technical Leadership: Provide guidance and mentorship to junior IT staff, fostering a culture of continuous learning and improvement
  • Project Management: Lead IT projects from inception to completion, ensuring timely delivery and adherence to budget and quality standards
  • Stakeholder Collaboration: Work closely with business leaders, IT teams, and external vendors to ensure alignment and successful implementation of IT initiatives while embedding security into systems and workflows

Benefits

  • competitive compensation
  • a comprehensive and well-rounded benefits package for full-time employees that have been designed to nourish your well-being, such as health coverage, wellness programs, 401K company match, self-managed PTO, and other unique incentives that celebrate your accomplishments.
  • Remote and Hybrid Work
  • Time Off When You Need It
  • Benefits That Flex
  • Professional Development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service