Senior Manager Technology (Cybersecurity)

Overview

On Site
Full Time

Skills

Security controls
Incident management
Systems analysis/design
Information security
Emerging technologies
IT risk
Risk analysis
ISO/IEC 27001:2005
Cloud computing
Switches
Forensics
Active Directory
Operating systems
Problem solving
Attention to detail
Multitasking
Security+
Cloud security
Network security
Identity management
Database security
Software security
Security management
Proxies
Event management
Endpoint protection
Threat analysis
Information Technology
CA-1
Cyber security
Value engineering
Partnership
Energy
IDEA
Offshoring
Design
Leadership
Network
Roadmaps
Strategy
Evaluation
Planning
Testing
Operations
Research
Management
IMPACT
Documentation
ROOT
System on a chip
Regulatory Compliance
National Institute of Standards and Technology
Firewall
Routers
VoIP
Wireless communication
Microsoft
Communication
Windows PowerShell
Python
SQL
Orchestration
Automation
CISSP
GSEC
SMTP
SIEM

Job Details

JOB DESCRIPTION

Company Overview:

People power our future. That is why advancing a dynamic, inclusive environment, where everyone grows and thrives is critically important to us.

Our ingenuity fuels daily life. Together, we've forged some of the most trusted partnerships across the energy value chain to make what was once just an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing offshore platforms hundreds of miles from shore, and using our expertise to design and build offshore wind infrastructure.

For more than 100 years, we've been making the impossible possible. Today, we're driving the energy transition with more than 30,000 of the brightest minds across 54 countries.

Here, what you do matters.

Job Overview:

This role will help provide leadership for IT Cybersecurity. The Manager Technology will be responsible for monitoring the efficiency and the performance of the company's technology and network systems.

RESPONSIBILITIES

Key Tasks and Responsibilities:
  • Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects.
  • Continuously improve the integration and effectiveness of implemented technologies.
  • Automate incident response playbooks for detected threats.
  • Assist in the analysis, design and development of an Information Security roadmap aligned with business strategies.
  • Inform on strategy and product level roadmap around security features and practical implementation.
  • Maintain awareness of emerging technologies and identify opportunities for improving overall Cybersecurity.
  • Market evaluation of new tools and techniques to enhance the security posture.
  • Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs).
  • Assist with the planning, testing, tracking, remediation for identified cybersecurity operations weaknesses.
  • Identify, create and mature cybersecurity operations processes.
  • Design security solutions and provide requirements for implementation of security solutions.
  • Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects.
  • Serve as an internal trusted advisor providing security services, advice on security, and assist with compensating control alternatives where security requirements cannot be met.
  • Research, identify, deploy, integrate and manage cybersecurity operations technologies.
  • Provide pros/cons of security solutions impact business strategies.
  • Identify cybersecurity operations technology gaps, deficiencies, and recommend corrective actions.
  • Create documentation of findings and recommendations (root cause and risk analysis).
  • Assist with forensic investigations and incident response team (CIRT) activities.
  • Assign work to Cyber SOC for remediation.
  • Escalate pertinent findings in a timely manner.
  • Leverage vendors and internal resources to interface various security tools to automate critical response tasks.
  • Support Compliance managers in providing Cybersecurity artifacts.
  • Align information cybersecurity operations with NIST, and ISO 27001 requirements.


QUALIFICATIONS

Essential Qualifications and Education:
  • Experience with cloud services and APIs
  • Working knowledge of firewall, router, network switch, VOIP, and wireless architecture and operation
  • Experience with forensic investigation experience
  • Experience with security incident and investigation reports/briefings
  • Experience with Active Directory
  • Experience with Microsoft desktop and server operating systems
  • Experience in a team-oriented, collaborative environment
  • Strong analysis and problem-solving skills
  • Strong oral and written communication skills
  • Detail oriented in investigations and communications
  • Able to handle confidential investigations with discretion
  • Ability to multi-task and prioritize workload
  • Familiarity with PowerShell, Python and/or SQL is a plus
  • Familiarity with security orchestration, automation and response (SOAR) is a plus
  • Desired Certification: CISSP, GSEC, Security+, Vendor Certifications

Preferred Qualifications and Education:
  • Working knowledge of the following Information Security domains
  • Cloud Security
  • Network Security
  • Vulnerability and Threat Management
  • Identity and Access Management (IAM)
  • Database Security
  • Application Security
  • 6 years in cybersecurity minimum
  • 7 - 10 years of experience in an cybersecurity architect role
  • 7 - 10 years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall)
  • 7 - 10 years of experience with security information and event management (SIEM) tools
  • 7 - 10 years of experience with endpoint protection tools
  • 7 - 10 years of experience working with threat intelligence feeds and IOCs
  • Bachelor's Degree in Information Technology (minimum)

#LI-DNI

#LI-CA1