• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Senior Manager, Cyber Security Operations

Senior Manager, Cyber Security Operations

2021-12-08 by Geo

Cyber Security Job DC Metro Area

Senior Manager, Cyber Security Operations – SES Satellites Manassas, VA On-site

Note: We may earn a commission from products or services when you click on a link and make a purchase.

About the job

zAt SES, we cultivate an inclusive and healthy work environment that enables us to drive business success. As a company dedicated to Diversity & Inclusion, we believe our story should reflect those of the millions we serve. We are committed to increasing the number of employees from underrepresented groups and nurturing an inclusive company culture where people can flourish.

Cyber Security Operations has SES-wide responsibility for cyber-security monitoring, cyber-security incident response and vulnerability and configuration compliance management

Are you…?

  • Passionate about cyber-security strategy?
  • Creative and open-minded, always on the look-out for new technologies or new twists on old technologies which could create opportunities for SES
  • Experienced to understand the big picture and take the right decision for cyber-security operations to continuously extend the service portfolio, improve service levels, mature delivery processes?

READ Highest Paying Cyber Security Jobs

If you are interested in becoming part of the SES family, click on ‘read full job description’ to find out more.

Extended Job Description
Primary Responsibilities/Key Result Areas:

  • Manage a team of employees and consultants to develop a strong cyber-security operations function, that supports the entire technical infrastructure of SES (cyber-security monitoring, incident response and vulnerability as well as configuration compliance management)
  • Frame and continuously improve SES’ security incident response and train the incident response team
  • Manage security incidents following SES’ policy and lead incident response teams to ensure a coordinated, timely and effective defense
  • Establish a threat intelligence program with actionable, relevant strategic and tactical threat intelligence from different relevant sources in order to:
  • Leverage threat intelligence information to improve the efficiency and effectiveness of cyber security operations
  • Communicate synthesized intelligence information to SES stakeholders, including senior management and relevant engineering and operations groups
  • Algin with information security management and engineering functions update frameworks and security infrastructure
  • Identify needs, estimate costs, and justify request priorities for budgetary purposes
  • Evaluate new and emerging technologies for introduction and/or integration into the cyber-security operation functions
  • Manage the team to strengthen, enable and grow talent through coaching, continuous feedback, and technical mentoring
  • Prepare a portfolio for providing cyber-security operations services for the SES customers, if required
  • Travel and on-call duty as required

Who We Are Looking For (More About You)
In order to achieve the outcomes described above, we believe you will have the following:

Skills/Competencies
COMPETENCIES

  • Extensive project management skills (incl. budget management and communication plan)
  • Thrive in an international and diverse organization
  • Ability to handle simultaneously multiple projects and leads
  • Excellent communication skills: good listener, ability to understand the perspective of others, to work effectively at all levels of the organization, to mediate in conflicts and resolve issues, to secure stakeholder buy-in to the proposed solution; ability to explain security rationales and controls to non-technical audiences
  • Ability to manage and empower resources by setting priorities that balance short-term support requirements and long-term strategic goals of the company
  • Ability to balance risks and opportunities in order to provide modern, efficient IT solutions for business while the risk for SES is identified and managed adequately
  • Strong analytical and problem-solving skills: the ability to frame complex problems or business issues and can elaborate and articulate alternative solutions that address the root cause of the issue

Learn Cyber Security Skills Online at Your Own Pace

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Preferred Education & Experience (a combination of education and experience will be considered):

  • Master’s degree in computer science or equivalent
  • Minimum ten years of relevant professional experience in cybersecurity monitoring, incident response, computer forensics, malware analysis, vulnerability management, and threat intelligence
  • Strong knowledge of and experience in running cybersecurity operations teams
  • Excellent understanding of the latest tactics, tools, and techniques used by modern threat actors as well as effective prevention and detection strategies
  • In-depth cloud security knowledge (O365, Azure), system security knowledge (multiple operating systems, including Windows platforms, and Linux), and application security knowledge, including a clear understanding of their vulnerabilities, exploits, and how to secure them
  • Knowledge of and experience with security technologies, such as EDR, Antivirus, Network, and Host Intrusion Detection Systems, Web Proxy/Content Filtering, Authentication technologies, Security Information and Event Management systems, and SOAR solutions
  • Fluency in English
  • NATO/EU SECRET clearances are considered a strong asset. The candidate must be willing to undergo a security clearance procedure as this position might require holding a security clearance
  • Willingness to travel internationally

READ CISSP Certification Comparable to Master’s Degree

What’s In It For You

  • Flexible working policy
  • Bonus and equity plans
  • Comprehensive and competitive benefits plans
  • A range of wellness activities and employee assistance programs (varies by location)
  • An employer that values all aspects of Diversity and respects every individual’s story

The contents of this job description are subject to change. SES and its Affiliated Companies are committed to hiring and retaining a diverse workforce. We are an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, ancestry, national origin, gender, sex, sexual orientation, gender identity, marital status, religion, age, disability, veteran status, or other characteristic protected by local, state, or federal law.

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version