Skip to content
  Thursday 22 May 2025
Trending
September 3, 2023Principal Software Engineer, Cybersecurity (Sr. Data Engineer) December 15, 2023CISA Encourages Health Sector to Implement Vital Cybersecurity Measures May 18, 2024Cybersecurity Manager August 3, 2024MBSE Cybersecurity Analyst February 15, 2024Siemens SCALANCE XCM-/XRM-300 | CISA April 7, 2024Artificial Intelligence /Cybersecurity Researcher October 26, 2023CISA Releases Nine Industrial Control Systems Advisories September 30, 2024Watch Out: ‘Never Expire’ Passwords Could Spell Trouble! December 22, 2023NIST Report Highlights Cyber and Privacy Risks Associated with Genomic Data January 1, 2022The 18 Best Cydia Sources For 2022 – List of Repos for iOS 13, iOS 14, iOS 15
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Senior Manager, Cybersecurity
Careers

Senior Manager, Cybersecurity

SecuredyouadmSecuredyouadm—May 6, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Overview:Under general direction, the Senior Manager, Cybersecurity is responsible for interfacing between the CISO’s strategic and process-based activities and the work of the technology-focused administrators, analysts, engineers and architects of the cybersecurity and IT organizations. The Senior Manager, Cybersecurity works with the IT organization and business management to align priorities and plans with key cybersecurity business objectives. The Senior Manager, Cybersecurity will act as an empowered representative of the CISO during IT planning initiatives to ensure that security measures are incorporated into strategic business plans and that service expectations are clearly defined. Responsibilities:

  • Works with the CISO to develop a security program and security projects that address identified risks and business security requirements
  • Helps define department strategic objectives and drives business outcomes in alignment to the organizational strategy. Works with the CISO to develop budget projections based on short- and long-term goals and objectives
  • Monitors and reports on compliance with security policies, as well as the enforcement of policies within the IT department. Coordinates, measures and reports on the technical aspects of security management
  • Proposes changes to existing policies and procedures to ensure operating efficiency and regulatory compliance
  • Manages outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Works as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements
  • Serves as an active and consistent participant in the information security governance process. Provides support and guidance for legal and regulatory compliance efforts, including audit support
  • Works with the CISO and IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program
  • Manages security projects and provide expert guidance on security matters for other IT projects. Consults with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software
  • Designs, coordinates and oversees security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks. Recommends and coordinates the implementation of technical controls to support and enforce defined security policies
  • Works with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirements
  • Develops a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements
  • Leads, influences and manages a team of resources to include all aspects of performance management, conducting talent acquisition activities, coaching and/or mentoring, and identifying training requirements for associates
  • Determines the appropriate staffing mix of contractors and associates to maintain steady work and stay within budget. Creates, manages, and administers an annual departmental budget which may include billable hours and percentage targets

Qualifications:Required Knowledge, Skills, and Abilities:

  • Strong leadership skills and the ability to work effectively with business managers, IT & Cybersecurity and IT staff. Proven ability to interact with internal personnel, build strong relationships at all levels and across all business units and organizations, and understand business imperatives
  • Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management and business personnel. Ability to present technical information to technical and nontechnical audiences using collaborative systems and presentation software
  • In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies
  • Ability to develop and maintain policies, procedures, standards and guidelines.
  • Demonstrates and maintains current knowledge of industry trends and technologies
  • Ability to gather, analyze and interpret business drivers and develop practical security solutions that provide value to security and support the business
  • Ability to work with customers to understand and respond to their information security needs and/or concerns, represent our security program and how the program protects the customers’ data, and discuss the roadmap designed to continuously improve our security posture
  • Ability to quickly learn and understand complex environments, independently reaching stretch goals, and continually improve knowledge and capabilities
  • Advanced technical computer skills as required for technical support specific to functional area and related systems
  • Knowledge and ability to work in HITRUST, NIST and SOC
More stories

Senior Consultant, Cybersecurity – Platinion

July 20, 2024

Director of IT/Cybersecurity Audits

October 28, 2023

Cybersecurity Engineer

July 29, 2024

Cybersecurity Project Manager

February 6, 2024

Experience:

  • 7 years of experience in Information Security
  • 4 years of IT experience
  • 2 years supervisory experience
  • 3 years of experience implementing and enforcing security directives, policies, publications and regulations
  • 2 years of experience conducting risk assessment work, IT auditing of compliance requirements, or framework gap analysis
  • 2 years of experience working with HITRUST, NIST and SOC

Required Training, Certification and Education:

  • Bachelor’s degree in computer science, information systems, Cybersecurity, engineering, business administration or a related field; or equivalent experience

Working Conditions:

  • Travel: None
  • Work environment: Must be able to use equipment at workstation for up to 8 hours daily
  • Location: Home office/remote – Based in Atlanta, Georgia required
  • Must be able to sit and use equipment at workstation for up to 8 hours daily
  • May require after hours work if a system outage and/or security incident occurs
  • May work occasional weekends

Benefits OverviewAt NASCO, we trust our workforce to be fully remote, working from their home. This benefit offers significant, personalized outcomes for each associate including work/life balance, savings on commuting, work clothing, and increased time to spend on personal activities.Our full benefit package is designed to support the physical, mental, and financial health of our associates. We offer:Physical and Mental Health Benefits

  • Choice of Blue Cross Blue Shield Medical, Dental, and Vision Plans
  • Telehealthcare – for Medical and Behavioral visits
  • Generous PTO with buy/sell options
  • 9 Company holidays, a floating day off, and a day off for volunteering
  • Employee Assistance Program
  • Wellness program – earn insurance discounts or credit towards health-related items

Financial Health Benefits

  • 401K Plan with employer matching contributions
  • Company-funded spending/reimbursement accounts to help with out-of-pocket medical expenses
  • Bonus and Recognition programs
  • Tuition Assistance
  • Consultation with financial planner
  • Basic Life & AD&D Insurance, Short and Long-Term Disability Insurance provided, and Supplemental Term Life Insurance is available
  • Group Discount programs – mobile, technology services, etc., to help you save money

Other Benefits

  • E-Learning – Comprehensive and current library of e-learning and performance support assets, available on demand and at no cost

NASCO is an Equal Opportunity Employer/veterans/disability/race/color/religion/sex/sexual orientation/gender identity/national origin. Must have legal authority to work in the US.We will not accept applicants that use AI when answering the screening questions. Applicants who use AI to answer any questions or to complete their application will not be considered for employment.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cybersecurity Staff Engineer
Junior Cybersecurity Analyst / Information System Security Officer (ISSO)
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability
  • Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures