About The Position

Acuity is seeking a Manager – Information Security to supervise and direct a team of information security staff, including writing and delivering formal performance appraisals. This role is responsible and accountable for the planning, proposal, implementation, administration, management, and support of assigned hardware, systems, and associated software, including both current and future security infrastructure capacity planning. The Manager prepares system requirements, evaluates alternatives, and develops specifications while considering the capacity and limitations of integrated platforms and software. Under very general direction, this position is also responsible for ensuring enterprise operations, system availability, and business continuity.

Requirements

  • Bachelor’s degree or equivalent of education and experience.
  • 8 years progressive experience relative to information security.
  • Strong oral and written communication skills.
  • Knowledge of current and emerging security trends and best practices
  • Strong interpersonal and supervisory skills.
  • Ability to visualize and design best in class security models for any system network or system.
  • Fundamental understanding of software, hardware and network design, development, implementation and administration principles.

Responsibilities

  • Design, develop and implement information security policies and procedures.
  • Prepares budgets for area of responsibility and reports on expense variances from approved budgets.
  • Assigns and directs work; provides on-the-job training and coaching; monitors volume, quality, and service; evaluates performance; and communicates wage and salary reviews.
  • Works collaboratively with other areas of IT and the company.
  • Research, propose, develop, implement, and maintain architectures, hardware, and software.
  • Prepare and present well researched proposals for proposed projects.
  • Order required equipment (hardware, software, networking equipment, etc.).
  • Ensure that purchased vendor solutions meet current and future project requirements.
  • Ensure that hardware and software meet user requirements and needs.
  • Provide input on administrative policies and procedures.
  • Perform research and provide input relative to administrative policies and procedures.
  • Provide input to upper management with respect to personnel issues and potential ensuing actions.
  • Oversee the documentation of licensed software.
  • Lead incident response operations, overseeing detection, investigation, containment, digital forensics, and post-incident remediation across security and IT teams.
  • Own the strategy and execution of Data Loss Prevention (DLP) and User and Entity Behavior Analytics (UEBA) programs to detect insider threats, data misuse, and anomalous activity.
  • Direct forensic investigations, including evidence preservation, root-cause analysis, and support for legal, HR, and regulatory requirements.
  • Mature threat intelligence program, integrating into detection and response workflows to improve alert fidelity, anticipate emerging threats, and inform defensive priorities.
  • Mentor and guide security analysts, driving continuous improvement in response readiness, investigative rigor, and overall security maturity.
  • Regular and predictable attendance.
  • Perform other duties as assigned.

Benefits

  • 401(k) contribution
  • medical insurance
  • dental insurance
  • vision insurance
  • life insurance
  • disability insurance
  • paid time off
  • Employee Assistance Program
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service