• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Director, Cyber Threat Intelligence

Director, Cyber Threat Intelligence

2021-05-27 by Geo

Weehawken New Jersey

Director, Cyber Threat Intelligence – Verizon, Basking Ridge, NJ

Note: We may earn a commission from products or services when you click on a link and make a purchase.

When you join Verizon

Verizon is a leading provider of technology, communications, information and entertainment products, transforming the way we connect across the globe. We’re a diverse network of people driven by our ambition and united in our shared purpose to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.

What You’ll Be Doing…

*Open to remote employment, candidate dependent*

The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services.

The Director of Cyber Resilience and Intelligence will be a key leader within the CISO organization facilitating and supporting enterprise security across multiple business units. You will lead a team including Intelligence analysts, Red Team, and Defense Analysts to continuously test and vet the integrity and resilience of Verizon’s cyber posture as well as be the focal organization to collect, analyze, partner, and disseminate tactical and strategic threat intelligence. In order to be successful in this role, the leader must have a keen understanding of the cyber landscape, be highly inquisitive and never stop asking questions or looking for results. The key to success in this role is to have an exceptional background in intelligence and adversarial roles that emulate attackers.

This leader will build and head a world class threat intelligence organization with the intent to provide enterprise wide intelligence as both a part of the CIS team as well as a service provider for other Verizon business units. The selected leader will also have extensive experience in building and leading Red Teams, disruption teams, and continuous defense validation tools & services to have constant vigilance and assurance that Verizon’s defensive measures are working as expected. To round out the organization, the assurance that Blue Teams are appropriately notified and communicated with, all After Action Reviews, Root Cause Analytics, and observational reports will be developed and monitored by this group.

Key Teams/functions Within The Organization

Threat Intelligence

  • Drive the vision, strategy, and mission accomplishment of the entire Threat Intelligence team.
  • Create, document, and implement formal intelligence collection and production plans.
  • Monitor, report, and provide timely alerts regarding any cyber threats with a direct or indirect impact to Verizon, its partners, or clients.
  • Deliver expert cyber intelligence services and materials to internal (TMC / SecOps, NCC, VZ Connect, ASIRT, and external audiences.
  • Actively engage in liaison activities with the cyber threat community to include industry associations, peer financial institutions, and information sharing communities.
  • Evaluate efficacy of existing intelligence sources, effectiveness of the ingestion of indicators and recommend improvements
  • Threat Lifecycle risk management
  • Leverage threat information to maintain a up-to-date threat taxonomy and register and providing updates to the Information Risk Management teams
  • AAR & Post restoral verification
  • Game day and crisis simulation (manual and automated)
  • Oversee the security event simulation (War Gaming) program and conduct security event tabletop exercises at the enterprise level, including exercises with the Executive Committee and the Board of Directors.
  • Continuous, automated validation result monitoring

Red Team And Advanced Penetration Testing

  • Lead a team to initiate ethical hacking of applications and networks to provide a real time view of what a malicious person will see in the IT environment.
  • Oversee testing, reports and presentations to executive leadership.
  • Maintain a program for after action review and post restoral verification
  • Disruption capabilities
  • Reporting & Metrics
  • Produce metrics of risk and performance indicators, such as:
  • Security / business Value of threat intelligence

What We’re Looking For…

  • 15+ years cyber security experience; preferably in fast-paced, high volume, growth environments with both on premise and cloud infrastructures; with at least six years in a significant leadership role
  • 10+ years people management with a proven track record of building, training, and developing a high-performing team; ability to lead and motivate an organization of security professions to achieve tactical and strategic goals, even when only “dotted line” reporting lines exist
  • 5+ years’ experience implementing/supporting threat intelligence programs and tools.
  • 5+ years’ experience leading Red Teams.
  • 5+ years’ experience in tactical support roles requiring rapid response in support of the business.
  • Strategic leader and builder of both vision and bridges, and able to energize the appropriate teams in the organization; proven leadership in advanced information systems combined with broad business acumen, which extends beyond the functional responsibilities of the role
  • A thorough understanding of industry best practices in information security
  • Experience assessing cyber threats and vectors to ensure detection and automated response capabilities are able to rapidly mitigate potential threats.
  • Experience working on cross-functional teams including engineering, products teams, legal and security
  • Experience performing risk and threat assessments as part of product development
  • Experience effectively prioritizing work, juggling competing priorities and meeting deadlines in a fast-paced environment
  • Bachelor’s degree in Security Engineering, Information Technology or Computer Science or equivalent work experience; Master’s Degree in a technical discipline is preferred

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

22CyberOPS

Equal Employment Opportunity

We’re proud to be an equal opportunity employer – and celebrate our employees’ differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. At Verizon, we know that diversity makes us stronger. We are committed to a collaborative, inclusive environment that encourages authenticity and fosters a sense of belonging. We strive for everyone to feel valued, connected, and empowered to reach their potential and contribute their best. Check out our diversity and inclusion page to learn more.

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version