Company Overview:
Our ingenuity fuels daily life. Together, we’ve forged some of the most trusted partnerships across the energy value chain to make what was once just an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing platforms hundreds of miles from shore, using our expertise to design and build offshore wind infrastructure, and reshaping the onshore landscape to deliver the energy products the world needs safely and sustainably.
For more than 100 years, we've been making the impossible possible. Today, we're driving the energy transition with more than 30,000 of the brightest minds across 54 countries.
Job Overview:
This role will help provide leadership for IT Cybersecurity. The Senior Manager Technology will be have situational awareness on threat actor attack tactics, techniques, and methods. Drive program level changes to ensure deployed technology can detect and defensing these risks. Assist with communicating and reporting to IT leadership as well as IT peers. Ensure existing technology deployments are adhering to best practice configurations, maintain operational health, and performance. Assist with or manage projects to update or deploy new technology as required. This is not a GRC role. It is a Cyber role requiring a passion and dedication to keep pace with the threat landscape.
Key Tasks and Responsibilities:
- Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs)
- Assist in the analysis, design and development of an Information Security roadmap aligned with business strategies
- Inform on strategy and product level roadmap around security technologies and practical implementation
- Define requirements for the implementation of security technologies
- Perform market evaluation of new tools and techniques to enhance the security posture
- Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects
- Monitor emerging technologies and identify opportunities for improving overall Cybersecurity
- Continuously improve the integration and effectiveness of implemented technologies
- Assist with the planning, testing, tracking, remediation for identified cybersecurity operations weaknesses
- Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects
- Serve as an internal trusted advisor providing security services, advice on security, and assist with compensating control alternatives where security requirements cannot be met
- Assist with forensic investigations and incident response team (CIRT) activities
- Automate incident response playbooks for detected threats
- Leverage vendors and internal resources to interface various security tools to automate critical response tasks
- Assign work to Cyber SOC for remediation
- Escalate pertinent findings in a timely manner
- Support Compliance managers in providing Cybersecurity artifacts
- Align information cybersecurity operations with NIST, and ISO 27001 requirements
Essential Qualifications and Education:
- Attack sequences and tactics, for example MITRE ATT&CK or prior red team experience
- Direct experience and responsibility with network security technologies (firewall, IPS, encryption, etc), risk assessment, incident response, and cybersecurity frameworks (ISO 27001, NIST CSF)
- Project management experience
- Experience with securing cloud services and APIs
- Experience with forensic investigation experience
- Experience with security incident and investigation reports/briefings
- Experience with Active Directory
- Experience with Microsoft desktop and server operating systems
- Experience in a team-oriented, collaborative environment
- Strong analysis and problem-solving skills
- Strong oral and written communication skills
- Detail oriented in investigations and communications
- Able to handle confidential investigations with discretion
- Ability to multi-task and prioritize workload
- Familiarity with PowerShell, Python and/or SQL is a plus
- Familiarity with security orchestration, automation and response (SOAR) is a plus
- Desired Certification:CISSP, GSEC, Security+, Vendor Certifications
Preferred Qualifications and Education:
- Working knowledge of the following Information Security domains:
- Cloud Security
- Network Security
- Vulnerability and Threat Management
- Identity and Access Management (IAM)
- Database Security
- Application Security
- 10 years of direct employment in a cybersecurity full-time role
- 5 years of experience working with threat intelligence feeds and IOCs
- 3 years of experience in a cybersecurity architectrole
- 3 years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall)
- 3 years of experience with security information and event management (SIEM) tools
- 3 years of experience with endpoint protection tools