• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Cyber Security Manager – MTI

Cyber Security Manager – MTI

2021-02-16 by Geo

Mineral Mine

Cyber Security Manager – MTI – Minerals Technologies Inc. Bethlehem, PA

Note: We may earn a commission from products or services when you click on a link and make a purchase.

About the job

Minerals Technologies Inc. (MTI) is a resource- and technology-based company that develops, produces and markets worldwide a broad range of specialty mineral, mineral-based and synthetic mineral products and related systems and services. The Company has four reportable segments: Specialty Minerals, Performance Materials, Refractories and Energy Services. 

MTI provides a business environment and promotes a culture that encourages all employees to contribute to our success. We have long been committed to the recruitment and advancement of the most talented and qualified people. We recognize that MTI’s ability to provide the highest caliber of products and services is enhanced by a workforce that reflects the diversity of the communities and countries in which we work.

SEE ALSO: Google Paid Out $6.7M in Bug Bounty Rewards Last Year

We currently have an exciting opportunity for a Cyber Security Manager at our Bethlehem, PA location.  The Cyber Security Manager ensures that national and local information security and privacy regulations are being followed. Leads IT Risk Assessments to identify key corporate security vulnerabilities that affect the confidentiality, integrity and availability of company confidential data and provides support to systems owners to address and implement solutions to identified security and risk issues. Supports security and privacy audits and develops a mitigation strategy. Protects valuable information and maintains the confidentiality and integrity of data through knowledge of security management, network & protocols, data, and application security solutions.

READ 20 Online Courses for a Successful Career in Cyber Security

Position Details:

  1. Keeps abreast of industry trends and current emerging risks.
  2. Develop and maintain Cyber Security MTI specific program in accordance with leading standards i.e. NIST, CSF and ISO. 
  3. Lead assessments of current security technology and authentication systems and evaluate against Federal and State Information Protection and Privacy regulations, MTI Information Security Policies, and other relevant regulations pertaining to the protection of Enterprise Information assets with respect to information security.
  4. Develop and advance MTI information security policies, standards and procedures in conjunction with the application and technology teams responsible for the day to day systems configuration and operation.
  5. Lead the assessment and review of new and existing technology infrastructure to identify key risk areas, and ensure adequate levels of control are in place to address those risks and develop risk mitigation techniques and processes to ensure that all reviews as actionable by system manager and the operations staff.
  6. Lead the consultative process and advise personnel in IT departments to coordinate information security activities.
  7. Support Information Security Officer in Information Security activities as needed.
  8. Develop and lead activities supporting the IT Risk Management process such as data classification and security controls maintenance.
  9. Lead Collaborative programs with personnel in IT and all business units to ensure that electronic data security is consistently implemented throughout the Enterprise.
  10. Update skills as necessary to support MTI Information Security and remain knowledgeable of industry standards and advancements. 
  11. Assist with the design and administration of Cyber Security Awareness Training, including reporting.
  12. Assist with the coordination and remediation of found vulnerabilities.
  13. Develop presentations and other materials to communicate Cyber Security initiatives to all staff, senior management.
  14. Responsible for other duties as assigned.
OE/Lean
  • Actively participates in the implementation of sustainable improvement processes, such as 5S, Kaizen, Total Productive Maintenance (TPM), Daily Management Control, Standard Work and Problem Solving
Other Related Duties 
  • Participates in the Operation Excellence Program as outlined by the Company.
  • Other duties and special projects as assigned.

Note: Management reserves the right to assign or reassign duties and responsibilities to this job at any time.


  • Introduction to Cybersecurity Tools & Cyber Attacks by IBM
  • Financial Markets by Yale University
  • International Cyber Conflicts from the State University of New York
  • Business Foundations by University of Pennsylvania
  • (sponsored)

Qualifications and Experience:

The requirements listed in the sections that follow are representative of the knowledge, skills and/or abilities required to perform the duties of this job. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform the essential functions (primary duties) of the job.

(May substitute any equivalent combination of education and experience):

Should have clear understanding of all domains on information security and as per ISO27001 guidelines (globally accepted framework) and have relevant experience in auditing information systems from a technology and physical security perspective.

Should have detailed understanding on below technologies.

  • Network Devices (Fortinet Firewall – Hands-on [Mandatory])
  • Anti-Malware solutions (McAfee preferred)
  • Intrusion Prevention Systems
  • Web Content filtering solutions (Umbrella preferred)
  • DLP Technologies – Host, Email, Web
  • Web Application Firewalls
  • SIEM (Security Information and Event Management) Solution (IBM QRadar preferred)

Certifications (Desirable)

  • CISA (Certified Information Security Auditor) OR
  • CISM (Certified Information Security Manager) OR
  • Certified Information Systems Security Professional (CISSP)
  • CompTIA Security+

Knowledge of Cyber Security Framework for e.g. NIST, CSF would be desirable

Experience: Minimum of 7+ years of experience in information services with 5 years of demonstrable and progressive experience operating within Information Security domains. Require in-depth understanding of Information Security practices for network, servers, databases, applications, and advanced use of Information Security assessment techniques.

Education: Bachelor’s Degree in computer science with emphasis on IT security preferred.

Travel: Travel to other work sites may occur.

Knowledge, Skills & Abilities: Incumbent must have a well-developed business understanding, working knowledge of customer requirements and demonstrate a balance between analytical and creative thinking. Incumbent must also be a self-starter who seeks responsibility and is able to work with minimal direction. Incumbent must have demonstrated a willingness to challenge conventional ideas, be flexible, innovative, and be able to function effectively in a team environment and possess superior analytical and problem-solving skills. Incumbent must be proficient in personal computers and related databases. Computer skills required include knowledge of spreadsheets, database and word processing software on PC based systems. Incumbent must possess excellent organizational and communication skills. Incumbent must possess strong interpersonal skills and have the ability to communicate. 

While performing the duties of this job, an employee is typically required to have the ability to coordinate movements, regularly stand, walk, bend, squat, climb, reach, crouch, and kneel during a work shift, have manual dexterity, select and use appropriate equipment/tools to accomplish job duties, read, write, listen, speak and understand English, follow all instructions and other oral/written information, visually inspect equipment/work area, complete paperwork and other documentation accurately, identify, analyze, troubleshoot and solve issues using judgment, react quickly as needed, be organized and detail oriented, be able to identify/judge the urgency of a situation, use judgment in decision making, make decisions in a timely manner, manage multiple priorities, communicate effectively with others, be aware of oneself in relation to surrounding equipment, and work independently. Ability to instruct/transfer job information/knowledge to others is preferred.

The employee is expected to be self-directed, take initiative and be persistent when appropriate to accomplish necessary duties and keep busy without prompting. Additionally, the employee is expected to be adaptable/flexible to changing work assignments, have a high level of integrity, dependability and self control to maintain composure, perform multiple tasks at once, learn and memorize procedures, manage time effectively and efficiently, meet established deadlines, display a cooperative demeanor, read, understand and follow all company, job specific and safety policies/procedures, and attend/use all required training. Ability to travel is required. 

Working Conditions: There is exposure to plant production areas, which may include exposure to outside weather conditions as well as loud noise from equipment and dust from production processes. Exposure to plant areas requires the use of appropriate safety equipment. Personal protective equipment is available for employee use in these circumstances.

Safety Training: A new employee hired to perform the duties of this position is to be provided New Employee Training from a qualified individual, which consists of classroom training and may include a tour of plant area(s). Additional refresher safety training will be required as management deems appropriate and/or as dictated by MSHA/OSHA regulations.

LinkedIn Apply
Apply on LinkedIn

Equal Opportunity Employer

www.mineralstech.com

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version