Manager - Cybersecurity operations (Global role – in a virtual working environment) @ Grant Thornton International Ltd | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Manager - Cybersecurity operations (Global role – in a virtual working environment) jobs in United States
65 applicants
company-logo

Grant Thornton International Ltd · 10 hours ago

Manager - Cybersecurity operations (Global role – in a virtual working environment)

ftfMaximize your interview chances
AdviceConsulting
check
Growth Opportunities
check
H1B Sponsor Likelynote

Insider Connection @Grant Thornton International Ltd

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Manage the various cybersecurity operational and monitoring tools for GTIL (and globally where tools extend across Member Firms).
Liaise with the various Business Unit stakeholders, MSSP, and cybersecurity vendors, with regards to planning, provision and maintenance of operational and monitoring tools.
Liaising with the GTIL Security Architect and IT Operations to implement responsibility and accountability across Identity Access Management (IAM) services.
Respond to, redirect or escalate GTIL and Member Firm queries, in relation to impacting cybersecurity operations and potential threats.
Oversee the security training and awareness programmes for GTIL.
Hold various privileged functional roles within cybersecurity and IT operational platforms, as defined by team RACI models.
Function as cybersecurity proxy on the IT/Shared Services Change Advisory Boards (CAB).
Develop and maintain documentation of cybersecurity operations.
Enforce security policies via technical configuration and end user awareness.
Assist in successfully planning, testing, validating, and documenting secure configurations across multiple core platforms.
Manage the identification, classification, labelling and protection of data across various productivity platforms.
Actively participate in industry-specific threat intelligence sharing groups and forums to contribute insights and gain valuable knowledge on emerging threats.
Design and implement advanced threat intelligence capabilities, including the development of automated processes for data collection, analysis, and dissemination.
Assist in improving implementation of automated incident response via SOAR and workflows.
Determine gaps in technology and processes to identify opportunities for further development.
Evaluate and advise on existing systems design and operational functions relative to security best practices and compliance requirements.
Evaluate the security impact of changes to information systems and provide commensurate risk advice.
Engage in complex technical discussions with other technical teams; Provide clear guidance on the security requirements of those issues or projects.
Independently research and analyse emerging cyber threats, vulnerabilities, tactics, techniques, and procedures (TTPs).
Assist in the design and management of appropriate risk management processes to collect, analyse and report on industry wide, imminent and emerging cybersecurity risks to GTIL and member firms.
Liaise with key IT, Business Unit stakeholders and vendors to conduct technical probing and analysis of GTIL’s information security architecture and defensive controls.
Assist in testing methods to identify ways that attackers could exploit weaknesses in security systems.
Assist in the development and maintenance of documentation on vulnerability assessments, threat modelling and risk remediation processes.
Assist in investigating potential security incidents and the degree to which the investigation must happen.
Determine the need to escalate a security incident to Cyber Operations management.
Assist in root cause analysis, evaluate capability maturity and optimise future security incident handling through process improvements.
Assist in development and maintenance of documentation on cyber security incident playbook and runbooks, process workflow, incident handling and response capabilities.
Supporting the Associate Director and other Cybersecurity leadership in meeting and delivering department and strategic objectives.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Cybersecurity OperationsVulnerability ManagementIncident ResponseIdentity Access ManagementCloud ArchitectureCISSP CertificationOSCP CertificationEthical HackingSecurity AutomationSOC AdministrationProject Management Skills

Required

Bachelor’s Degree OR equivalent post high school education and/or work-related experience in Computer Science, Information Systems, or other Information Technology related field.
Solid experience of working in Information Security OR a combination of relevant experience.
Demonstrated operational expertise in the following: Vulnerability management, Application security, Endpoint Detection and Response, Edge defence solutions (Firewalls, WAF, IDS/IPS …etc.), Data protection solutions, Endpoint configuration management, Identity and Access Management, Logging and Monitoring (SIEM, User Behaviour Analytics), Incident response planning and invocation, Windows client, server and hyper-visor operating systems, On-premises architecture (security controls and configurations), Cloud architecture (security controls and configurations).
Effective leadership, communication (verbal and written) and project management skills to work with various levels and divisions within the organization.
Strong organisational and communication skills.
Ability to learn and adapt to a constantly changing technology and threat landscape.
Communication and relationship building is a key requirement.
Provides expertise and solutions for complex initiatives and is capable of making independent decisions.
Cultural awareness, the ability to work well with people from different disciplines and backgrounds.
Ability to be agile, respond positively to change and contribute with an innovative and global mindset.

Preferred

CISSP (Certified Information Systems Security Professional) certification is desired.
OSCP (Offensive Security Certified Professional) certification is desired.
Ethical hacking (red team, penetration testing) experience.
Security Operations Centre (SOC) administration or leadership.
Security automation and orchestration.
Incident response forensic processes.

Benefits

We also recognise the importance of time off at Grant Thornton International. Taking time away can lead to improved wellbeing and better productivity, which is why we don’t cap your leave.

Company

Grant Thornton International Ltd

company-logo
We are Grant Thornton. Going beyond business as usual, so you can too.

H1B Sponsorship

Grant Thornton International Ltd has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (64)
2022 (83)
2021 (101)
2020 (77)

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Peter Bodin
Global CEO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot