Published: Nov 04, 2025 - The Information Technology (IT) Security Manager is responsible for designing and maintaining the organization’s cybersecurity architecture, policies, and training programs to ensure compliance and risk mitigation. This role involves leading governance structures, conducting technical assessments, managing audits, and aligning security measures with business operations and infrastructure. The manager also oversees risk registers, drives continuous improvement, and ensures all activities adhere to organizational financial and regulatory policies.

Tips for IT Security Manager Skills and Responsibilities on a Resume
1. IT Security Manager, NexaTech Solutions, Charleston, SC
Job Summary:
- Ensure ongoing activities are aligned with the strategy and objectives of the program
- Assess the adequacy, timeliness and appropriateness of project plans to meet their strategic goals and regulatory requirements
- Develop and enhance management reporting and metrics to ensure key status, risks, issues, dependencies, decisions, etc., are highlighted, escalated and tracked
- Coordinate program-level workshops to reassess status, risks, issues, and alignment to not only the strategy or regulation, but also to other interdependent projects and initiatives
- Facilitate meetings from scheduling, capturing meeting minutes, to sending appropriate levels of communications
- Assist in designing, maintaining, and monitoring security controls at the network, OS/DB and application layer for an enterprise system
- Show the ability to develop and maintain security programs that are collaborative, executable and result in trackable success metrics
- Prepare justifications and business cases for recommendations on Cybersecurity initiatives
- Develop and maintain good relationships with internal stakeholders in Doha Bank to facilitate functional operational needs
Skills on Resume:
- Strategic Alignment (Hard Skills)
- Project Evaluation (Hard Skills)
- Risk Management (Hard Skills)
- Program Coordination (Soft Skills)
- Meeting Facilitation (Soft Skills)
- Security Controls (Hard Skills)
- Program Development (Hard Skills)
- Stakeholder Relations (Soft Skills)
2. IT Security Manager, IronGrid Networks, Boise, ID
Job Summary:
- Assist the Information Security team with the deployment of the JTC Information Security strategy
- Either directly or indirectly support the implementation of Information Security standards and best practices with the view of achieving relevant IT Security accreditation
- Mentor, coach and provide sound advice to JTC employees in relation to any security-related matters and best practices
- Perform, maintain and update the Information Security Awareness program, including periodic face-to-face presentations, ethical phishing tests, annual training, bespoke Cyber Corner, annual staff quizzes and surveys
- Ensure that JTC continually and consistently performs the necessary proactive Information Security Assessments
- Identify any control gaps, threats and vulnerabilities, then, with the applicable stakeholders to agree on risk action plans in line with the group's risk appetite and tolerance levels
- Maintain and update the Information Security Risk Register
- Perform the necessary updates and escalations
- Manage and guide the implementation of Information Security Control solutions and requests such as phishing emails, website categorization and unblock requests, USB unlocks, privileged access management and Anti-Virus investigations
Skills on Resume:
- Security Strategy (Hard Skills)
- Awareness Training (Soft Skills)
- Risk Assessment (Hard Skills)
- Control Management (Hard Skills)
- Vulnerability Detection (Hard Skills)
- Stakeholder Engagement (Soft Skills)
- Program Coordination (Soft Skills)
- Technical Solutions (Hard Skills)
3. IT Security Manager, BluePeak Systems, Tulsa, OK
Job Summary:
- Manage the user access recertification and acceptable use attestation process, keeping auditable records on access rights and reviews
- Assist and advise Information owners to define and implement the appropriate access rights for the user roles
- Ensure that both external and internal IT security audits and client due diligence assessments are conducted consistently and to a high standard
- Coordinate the development, gathering and drafting of all relevant IT security procedures to meet the Information Security Policies and Standards
- Aid the Senior Information Security Manager with the monthly analytical reporting which measures and tracks all IT security-related information and initiatives and is delivered to key stakeholders
- Work with the JTC Business, the wider IT team and external service providers/vendors to promote and improve information security and provide security advice on any new solutions, projects and new initiatives
- Research and keep up to date with the latest information technology security trends, threats, vulnerabilities and control measures
- Perform other Information Security duties as requested by the Senior Information Security Manager or Management
- Adhere to Risk and Compliance procedures in relation to regulatory requirements and AML legislation
- Adhere to JTC core values and expected behaviors
Skills on Resume:
- Access Governance (Hard Skills)
- Audit Coordination (Hard Skills)
- Policy Drafting (Hard Skills)
- Security Reporting (Hard Skills)
- Vendor Engagement (Soft Skills)
- Threat Research (Hard Skills)
- Compliance Awareness (Soft Skills)
- Security Advising (Soft Skills)
4. IT Security Manager, CoreVista Technologies, Reno, NV
Job Summary:
- Contribute to all levels of the architecture from a security perspective and Research the latest information technology security trends
- Monitor their organization’s networks for security breaches and investigate violations when they occur
- Help to design, implement, and maintain the organization’s cybersecurity plan
- Perform system analysis, risk assessments and research best practice security solutions and advise
- Acting on privacy breaches and malware threats to identify critical IT security issues
- Direct the installation and use of security tools to protect sensitive information
- Promote and improve company policies and practices
- Research security enhancements and make recommendations
- Help computer technicians, end users when they need to install or learn about new security products and/or procedures
- Ensure that IT security audits are conducted periodically (e.g., when a security breach occurs)
Skills on Resume:
- Security Architecture (Hard Skills)
- Breach Investigation (Hard Skills)
- Risk Assessment (Hard Skills)
- System Monitoring (Hard Skills)
- Policy Improvement (Soft Skills)
- Security Research (Hard Skills)
- User Support (Soft Skills)
- Tool Implementation (Hard Skills)
5. IT Security Manager, DeltaWave IT, Little Rock, AR
Job Summary:
- Manage the development of appropriate IT Security and Systems Continuity policies and plans
- Develop and deliver a program of reviews to ensure that policies are put in place and remain in force to ensure the Group has appropriate IT Security/Cyber Security protection and Systems Continuity plans
- Ensure compliance with necessary legislation and regulations and develop IT sector practice and the cyber security threat landscape
- Design input and technical review of secure configurations for hardware and software on mobile devices, laptops, workstations, and servers
- Implement and monitor information security controls and management strategies
- Setting a security roadmap for IT and corporate security, including new and ongoing projects, tool selection, team training, etc.
- Working closely with the IT team to define, develop and implement security solutions and defining roles and responsibilities on day-to-day security activities and gaining visibility to BU-related activities
- Work with Security Teams in other divisions and cooperate to achieve the Security Group’s overall objectives
- Managing a team of IT security engineers
- Provide KPI for executive management on the progress of roadmap execution, along with risk mapping
Skills on Resume:
- Policy Development (Hard Skills)
- Roadmap Planning (Hard Skills)
- Security Compliance (Hard Skills)
- Configuration Review (Hard Skills)
- Team Management (Soft Skills)
- KPI Reporting (Hard Skills)
- Cross-Team Coordination (Soft Skills)
- Threat Awareness (Hard Skills)
6. IT Security Manager, BrightLayer Innovations, Fargo, ND
Job Summary:
- Create and maintain documentation including standards, diagrams, drawings, deployment plans, and asset tracking
- Support users with internal technology needs
- Installation and configuration of workstations and servers
- Manage Cisco-based phone system, firewalls and VPN devices
- Interface with Global IT in planning and implementation
- Provide network infrastructure solutions based on application needs and anticipated growth
- Working with all functional areas of the IT environment anb ensuring all escalated service requests and incidents are resolved in a professional and timely manner
- Maintain IT equipment on premises and off-site
- Maintain and review Active Directory accounts for the business unit
- Communicate any changes to stakeholders
- Create plans for business continuity
- On-site network planning and maintenance
Skills on Resume:
- System Installation (Hard Skills)
- User Support (Soft Skills)
- Network Planning (Hard Skills)
- Device Management (Hard Skills)
- IT Documentation (Hard Skills)
- Issue Resolution (Soft Skills)
- Active Directory (Hard Skills)
- Stakeholder Communication (Soft Skills)
7. IT Security Manager, SecurePath Consulting, Mobile, AL
Job Summary:
- Leading technical vulnerability assessments of IT systems and processes
- Identifying potential vulnerabilities and making recommendations to control any identified risks
- Leading and responding rapidly to IT security incidents
- Managing the process with a professional manner, including computer forensics for evidence gathering and preservation
- Coordinating regular Information Security Reviews in the Council and with partners in the YHWARP
- Leading and coordinating high-quality Information Security guidance, documentation and training
- Liaising with external security agencies
- Ensuring that any information requested is provided on a timely and secure basis
- Overseeing the design, effectiveness, implementation and embedding of Information Security policies and procedures
- Overseeing the escalation, investigation and communication or reporting of Information Security issues including data protection breaches
Skills on Resume:
- Vulnerability Analysis (Hard Skills)
- Incident Response (Hard Skills)
- Forensic Handling (Hard Skills)
- Policy Oversight (Hard Skills)
- Security Training (Soft Skills)
- Agency Liaison (Soft Skills)
- Risk Reporting (Soft Skills)
- Data Protection (Hard Skills)
8. IT Security Manager, QuantumTier IT Group, Wichita, KS
Job Summary:
- Develop and execute information risk controls and management strategies
- Carry out risk assessment within a defined functional or technical area of business
- Use consistent processes for identifying potential risk events, quantifying and documenting the probability of occurrence and impact on the business
- Refer to domain experts for guidance on specialized areas of risk, such as architecture and environment
- Govern information risk management services for customer operations
- Specialize on a specific technology and/or risk management discipline
- Coordinate the development of countermeasures and contingency plans
- Apply standard procedures to enhance security or resilience to system interruptions
- Take immediate action in an incident to limit business impact and escalate the event to a higher authority
- Apply and maintain specific risk management controls as required by organizational policy and local risk assessments
Skills on Resume:
- Risk Management (Hard Skills)
- Incident Response (Hard Skills)
- Control Planning (Hard Skills)
- Security Governance (Hard Skills)
- System Resilience (Hard Skills)
- Expert Consultation (Soft Skills)
- Compliance Oversight (Hard Skills)
- Stakeholder Coordination (Soft Skills)
9. IT Security Manager, NetVerge Solutions, Lubbock, TX
Job Summary:
- Maintain confidentiality, integrity and availability of business information systems
- Determine when issues should be escalated to a higher level
- Demonstrate effective communication of risk management issues to business managers and others
- Maintain knowledge of specific technical specialisms, provide detailed advice regarding their application, and execute specialized tasks
- Implement and administer risk management technologies and process controls in a given specialism and conduct compliance tracking
- Carry out risk assessment within a defined functional or technical area of business
- Use consistent processes for identifying potential risk events, quantifying and documenting the probability of occurrence and the impact on the business
- Refer to domain experts for guidance on specialized areas of risk, such as compliance, architecture, finance and environment
- Coordinate response to quantified risks, which may involve acceptance, transfer, reduction or elimination
- Assist with the development of agreed countermeasures and contingency plans
Skills on Resume:
- Risk Assessment (Hard Skills)
- Compliance Tracking (Hard Skills)
- System Integrity (Hard Skills)
- Issue Escalation (Soft Skills)
- Risk Communication (Soft Skills)
- Technical Advisory (Hard Skills)
- Control Implementation (Hard Skills)
- Contingency Planning (Hard Skills)
10. IT Security Manager, CyberNova LLC, Rochester, NY
Job Summary:
- Monitor the status of risks, and report the status and need for action to senior management
- Apply procedures to assess the security of information and infrastructure components
- Identify risks of unauthorized access, data loss, compromise of data integrity, or risk of business interruption
- Review compliance with information security policies and standards
- Apply procedures to assess compliance of hardware and software configurations to policies, standards, legal and regulatory requirements
- Communicate information assurance issues effectively to users and operators of systems and networks
- Develop and maintain knowledge of the technical specialism
- Reading relevant literature, meeting and maintaining contact with others involved in the technical specialism and through taking an active part in appropriate learned, professional and trade bodies
- Maintain an awareness of current developments in the technical specialism
- Apply and maintain specific security controls as required by organizational policy and local risk assessments
Skills on Resume:
- Risk Monitoring (Hard Skills)
- Security Assessment (Hard Skills)
- Compliance Review (Hard Skills)
- Access Control (Hard Skills)
- Assurance Communication (Soft Skills)
- Policy Enforcement (Hard Skills)
- Technical Expertise (Hard Skills)
- Industry Engagement (Soft Skills)
11. IT Security Manager, IronLeaf Data Services, Akron, OH
Job Summary:
- Maintain confidentiality, integrity and availability of business information systems
- Determine when security issues should be escalated to a higher level
- Analyze incidents and problems to show trends and potential problem areas, so that actions can be taken to minimize the occurrence of incidents and to improve the process of problem reporting, analysis and clearance
- Assess and report the probable causes of incidents and the consequences of existing problems and known defects
- Conduct security control reviews in well-defined areas
- Provide advice, both reactively and proactively, to those engaged in activities where the technical specialism is applicable, including those in areas such as budgetary and financial planning, litigation, legislation, and health and safety
- Identify opportunities to apply the technical specialism within employing organizations and closely associated organizations, such as customers, suppliers and partners, and advise those responsible
- Carry out specific assignments related to the technical specialism, either alone or as part of a team
- Maintain knowledge of the technical specialism at a detailed level, and is responsible for their own personal growth and technical proficiency
Skills on Resume:
- Incident Analysis (Hard Skills)
- Security Escalation (Soft Skills)
- Control Review (Hard Skills)
- Root Cause Assessment (Hard Skills)
- Technical Advisory (Soft Skills)
- Knowledge Growth (Soft Skills)
- Process Improvement (Soft Skills)
- System Confidentiality (Hard Skills)
12. IT Security Manager, FortiFi Systems, Des Moines, IA
Job Summary:
- Lead operational planning and projects for the IT department in an Agile environment
- Take ownership of Xello’s information security roadmap
- Ensure that Xello complies with regulations, best practices, and customer data sharing agreements, including PIPEDA, FERPA, COPPA, GDPR, and CCPA
- Help build a security-first organization by conducting organization-wide security awareness training
- Working with engineers to ensure best practices are met in the SDLC, and staying on top of the latest threats and security practices
- Liaise with Xello’s sales department and customers to assist with the security-focused aspects of RFPs and review customer data sharing agreements for compliance
- Oversee reporting and documentation related to network and systems operations
- Work with stakeholders to define business and system requirements for new technology implementations
- Develop maintenance schedules for network and systems equipment
- Analyze existing operations and make recommendations for the improvement and growth of the network infrastructure and IT systems
- Coordinate all major incidents by ensuring the correct resources are involved as quickly as possible, updating senior management and the business in a timely fashion, conducting post-mortem reviews, and following up on action items
- Provide leadership to team members through coaching, performance evaluations, training plans, and career development plans
- Serve as the key interface with internal and external auditors for security compliance-related activities
Skills on Resume:
- Security Compliance (Hard Skills)
- Agile Leadership (Soft Skills)
- Stakeholder Engagement (Soft Skills)
- Incident Coordination (Hard Skills)
- Awareness Training (Soft Skills)
- Infrastructure Planning (Hard Skills)
- SDLC Oversight (Hard Skills)
- Team Coaching (Soft Skills)
13. IT Security Manager, RedCrest Digital, Billings, MT
Job Summary:
- Architect and deliver cloud-based technology solutions that provide efficiency, security, and scalability for a rapidly growing organization
- Monitor performance of the IT systems to determine cost and productivity levels, and to make recommendations for improving the IT operations
- Assess overall security posture, including within the corporate network, hosted Cloud environment and software products
- Establish and maintain corporate information security policies, standards, and procedures in alignment with Leadership
- Identify new security compliance requirements, emerging threats and cyber risks to incorporate into the Cybersecurity, Risk and Compliance Programs
- Collaborate seamlessly with stakeholders at all levels throughout the business
- Work with outside auditors from customers and certification agencies to address questions in Cybersecurity audits
- Work in collaboration with Product Development and Product Management to coordinate and architect a culture of Security by Design within Software Products
- Oversee the annual planning and execution of all Cybersecurity certification and compliance programs, including PCI-DSS and SSAE18 SOC 2 and others
Skills on Resume:
- Cloud Architecture (Hard Skills)
- Security Compliance (Hard Skills)
- IT Optimization (Hard Skills)
- Risk Assessment (Hard Skills)
- Stakeholder Collaboration (Soft Skills)
- Audit Coordination (Hard Skills)
- Security Strategy (Hard Skills)
- Security by Design (Soft Skills)
14. IT Security Manager, ByteSecure Systems, Augusta, GA
Job Summary:
- Develop, implement and enforce suitable and relevant information security policies, standards and procedures which are reviewed on an annual basis
- Ensure these are compliant with the Data Protection Act and other legislation and regulations related to information security
- Research, develop, implement, test and review the company’s information security to protect information and prevent unauthorized access
- Kept all staff informed on security measures, explained potential threats, installed software, implemented security measures and monitored networks
- Coordinate the development and delivery of an education and training program on information security, data protection and privacy
- Investigate suspected and actual breaches of security and undertake reporting/remedial action
- Maintain a log of any incidents and remedial recommendations and actions
- Provide expert advice to the organization on ISO27001 and, generally, on information risk analysis/management
- Keep up-to-date with the latest security and privacy legislation and security-enhancing technologies and brief colleagues to enable measures to be implemented
- Conduct the information security risk assessment program
- Review compliance with the information security policy and associated procedures
- Continuously assess the shortfall between both actual security measures in place and being effective and those established at a policy level, thus highlighting deficiencies for remedial action
Skills on Resume:
- Policy Management (Hard Skills)
- Data Compliance (Hard Skills)
- Security Training (Soft Skills)
- Incident Handling (Hard Skills)
- ISO27001 Advisory (Hard Skills)
- Risk Assessment (Hard Skills)
- Threat Awareness (Soft Skills)
- Remediation Planning (Hard Skills)
15. IT Security Manager, HarborView IT, Spokane, WA
Job Summary:
- Build, maintain and ensure adherence to the IT and InfoSec Risk and Compliance framework and monitor the processes, policies, procedures and standards applicability, effectiveness and efficiency
- Ensuring governance of the organization's Information Security Policy and Standards across all Business units and support functions based on ISO27001 and other mandatory checks
- Processing continual improvement of documented IT, InfoSec and ISMS processes from a risk perspective
- Respond to departments' execution, goals and objectives, assuring processes, policies and standards provide measurable results while complying with business goals and regulatory requirements
- Work along with the team in monitoring risk management processes and collaborating for any required remediation, coordination of IT responses to internal and external audits
- Ensuring an appropriate level of risk oversight is provided over outsourcing partners and other strategic suppliers, in particular the infrastructure, application and operational services providers, as required by group standards
- Develop reports for the executive audiences on standards governance activities and assist management in monitoring IT audit remediation efforts
- Design, implement and manage cyber threats detection and protection solutions (technologies/processes/SOC, etc.)
- Design, implement and manage threat response process and drive security forensic investigations
- Managing Information Security Projects such as requirement gathering, coordination, Creation and maintenance of the Project Plan, Project documentation, and implementation of effective knowledge transfer
- Developing and delivering security awareness training sessions to the existing employees and to the new joiners in the organization
- Provide timely and accurate InfoSec, ISMS-related reporting (monthly, quarterly and ad-hoc) for key stakeholders
- Report daily, weekly and monthly as per project requirements
Skills on Resume:
- Risk Governance (Hard Skills)
- Policy Oversight (Hard Skills)
- Audit Coordination (Hard Skills)
- Threat Detection (Hard Skills)
- Incident Response (Hard Skills)
- Supplier Oversight (Soft Skills)
- Security Training (Soft Skills)
- Compliance Reporting (Hard Skills)
16. IT Security Manager, GreyMatter Technology, Allentown, PA
Job Summary:
- Establish/enhance the standard incident response plan to ensure the bank can react quickly in the event of an incident
- Determine a non-incident, operate efficiently during an incident, and improve after an incident
- Advise on information security issues and provide effective recommendations to mitigate the risk at an acceptable level
- Plan, coordinate and implement incident response exercises regularly based on the designed scenario and report exercise results with lessons learn
- Ensure the readiness of a well-managed incident response team can detect and react to incidents effectively and timely manner
- Establish and organize a forensics capability which be able to determine the root cause of an incident and follow the standard investigation process or industry-accepted forensic methodologies
- Ensure the forensic team is well-trained and capable of performing inspections, in-depth analysis of suspected cases and security breaches
- Ensure any related forensic manual(s) and procedure(s) are in place and regularly updated
Skills on Resume:
- Incident Planning (Hard Skills)
- Response Readiness (Hard Skills)
- Risk Advisory (Soft Skills)
- Exercise Coordination (Hard Skills)
- Forensics Setup (Hard Skills)
- Root Cause Analysis (Hard Skills)
- Team Training (Soft Skills)
- Procedure Maintenance (Hard Skills)
17. IT Security Manager, CitadelBridge IT Services, Lexington, KY
Job Summary:
- Help develop, manage, audit and enforce security-related policies and procedures
- Manage compliance and respond to security assessments and audits by ISO, clients, etc.
- Manage periodic security vulnerability and penetration testing
- Manage the patch management program
- Manage system logs and security-related infrastructure
- Manage incident response and support systems
- Manage and review infrastructure technology vendor contracts and risk assessments
- Work with IT Management to ensure that Business Continuity program components are current, effective, and address business requirements
- Participate in the design and deployment of new software systems, services, components, features, etc.
Skills on Resume:
- Policy Enforcement (Hard Skills)
- Compliance Audits (Hard Skills)
- Vulnerability Testing (Hard Skills)
- Patch Management (Hard Skills)
- Log Monitoring (Hard Skills)
- Incident Handling (Hard Skills)
- Vendor Risk Review (Soft Skills)
- BCP Support (Soft Skills)
18. IT Security Manager, SkyLink SecureTech, Shreveport, LA
Job Summary:
- Design and establish the IT Compliance policies, procedures and best practice guidelines
- Build, maintain, and drive adherence to a central IT controls framework mapped to industry best practices and regulatory requirements that defines the key and operational IT controls performed across Zalando´s IT landscape
- Consulting on IT-Compliance questions for stakeholders
- Managing operational tasks, e.g., 3rd party risk assessments and data sharing requirements (DPAs and TOMs)
- Build and coordinate a global network of peers among R&ED research sites to continuously improve IT Security
- Harden the day-to-day IT Security in collaboration with the research labs
- IT Security sparring partner on existing and new lab systems
- Contribute to solutions of IT security problems relevant in the research department
- Responsible for minimizing the risk to the Trust's IT systems, networks, services and information through proactive and reactive management of all aspects of IT security
- Ensuring that information management and security best practice is designed in from the outset, feeding into a balanced and manageable security strategy
- Act as a subject matter expert for information management and security on business and technology projects
- Providing consultancy and support from a governance, risk, compliance, audit and technical standpoint to assist and provide direction to project managers, the business and IT
- Responsible for increasing trust-wide employee awareness and individual responsibilities in the area of IT security, looking to achieve permanent cultural change to better safeguard business operations
Skills on Resume:
- Compliance Design (Hard Skills)
- Control Frameworks (Hard Skills)
- Stakeholder Consulting (Soft Skills)
- Risk Assessment (Hard Skills)
- Security Strategy (Hard Skills)
- Security Culture (Soft Skills)
- Governance Support (Soft Skills)
- Lab System Security (Hard Skills)
19. IT Security Manager, AtlasWave Systems, Manchester, NH
Job Summary:
- Responsible for creating and implementing processes and routines based on expectations from internal and external stakeholders
- Work continuously to see which measures are to be implemented and how and when they are to be implemented
- Take ownership of developing and implementing continuity plans and security routines
- Work with new regulations regarding information security (such as DORA), and contribute as part of the team working on applications for permits and licenses
- Create, maintain and align PKI management policy, processes and standards with industry best practices and business needs
- Find and create solutions to optimize enterprise certificate management in a PKI security team, including PKI security training
- Responsible for PKI solutions in the field of connected home appliances, including operational incident and response management
- Conduct IT security risk assessments and analyses
- Define, implement and monitor resulting security measures
Skills on Resume:
- Continuity Planning (Hard Skills)
- Security Implementation (Hard Skills)
- Regulatory Compliance (Hard Skills)
- PKI Management (Hard Skills)
- Incident Handling (Hard Skills)
- Stakeholder Alignment (Soft Skills)
- Risk Analysis (Hard Skills)
- Process Ownership (Soft Skills)
20. IT Security Manager, BlueIron Solutions, Springfield, MO
Job Summary:
- Coordinate and execute IT security assessment audits and manage remediation
- Coordinate response to information security incidents
- Develop and publish Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance requirements
- Conduct data classification assessment and security audits and manage remediation plans
- Collaborate with IT management, the legal department, safety and security, and law enforcement agencies to manage security vulnerabilities
- Create, manage and maintain user security awareness
- Conduct security research in keeping abreast of the latest security issues
- Prepare security notification, alerts and procedures for handling security incidents
- Creating, testing and implementing network disaster recovery plans
- Performing risk assessments and testing of data processing systems
- Installing firewalls, data encryption and other security measures
- Training staff on network and information security procedures
Skills on Resume:
- Security Auditing (Hard Skills)
- Incident Response (Hard Skills)
- Policy Development (Hard Skills)
- Risk Assessment (Hard Skills)
- Awareness Training (Soft Skills)
- Disaster Recovery (Hard Skills)
- Vulnerability Management (Hard Skills)
- Security Research (Hard Skills)
21. IT Security Manager, CyberCore Analytics, Fort Wayne, IN
Job Summary:
- Lead and develop a small team of Information Security Specialists
- Ensure that all technical controls adopted by the company are in place and effective
- Ensure all technical controls are effectively monitored, administered, and maintained
- Provide advice in a consulting capacity to other aspects of the business about the securing and protection of any information assets stored, processed or transmitted
- Participate in the investigation of Information Security Incidents, providing subject matter expertise and lead all technical aspects of the Investigation
- Lead the efforts in retaining current Information Security certifications and standards adopted by the Company (PCI-DSS 3.2 ( Level 1 - Service Provider), SOC-I, SOC II, HIPAA) and the adoption of new standards
- Manage 3rd party suppliers involved in security assessment activities
- Proactive monitoring, analysis and initiation of action based upon observed infosec events and behaviors
- Timely implementation of any remediation activities identified
Skills on Resume:
- Team Leadership (Soft Skills)
- Control Monitoring (Hard Skills)
- Security Consulting (Soft Skills)
- Incident Investigation (Hard Skills)
- Compliance Management (Hard Skills)
- Vendor Oversight (Soft Skills)
- Threat Monitoring (Hard Skills)
- Remediation Execution (Hard Skills)
22. IT Security Manager, PinnaclePoint IT, Huntsville, AL
Job Summary:
- Performs the Security Operations Center (SOC) and Cybersecurity Operations Center (CSOC) Senior Manager function in accordance with client requirements
- Supports the Head of IT regarding SOC and CSOS activities and facilitates decisions by way of recommendations and information
- Ensures the effective and efficient Management of the Security Operations Center (SOC) and a dedicated Cybersecurity Operations Center (CSOC)
- Collaboration with other entities in the organization to ensure seamless interaction with all relevant IT systems
- Cost-effective development and operations of the SOC and CSOC according to benchmarks and best practices and within defined cost frameworks
- Collects information on security incidents, performs analysis, responds to protect the data and systems and raises staff awareness regarding cybersecurity
- Establishes a systems architecture for the Cybersecurity Platform (CSP) and additional components, that guarantees a reliable protection against attacks, fast and efficient development, systems integration, operations and incremental improvements
- Develops and implements a Cyber Security strategy as an integral part of the IT strategy
- Selects, implements and optimizes all required systems, tools and processes
Skills on Resume:
- SOC Management (Hard Skills)
- Strategy Development (Hard Skills)
- Threat Response (Hard Skills)
- System Architecture (Hard Skills)
- IT Collaboration (Soft Skills)
- Tool Optimization (Hard Skills)
- Cyber Awareness (Soft Skills)
- Cost Control (Soft Skills)
23. IT Security Manager, TridentLogic, Sioux Falls, SD
Job Summary:
- Tracks and evaluates the latest technology trends and implements them to optimize the cybersecurity protection level
- Manages the SOC/CSOC and plans, organizes, controls, evaluates and improves the systems implementation, development and operations
- Consults and collaborates with senior-level stakeholders across the entire organization as well as the contracting authority, to identify business and technology needs, innovations and to optimize the protection level
- Acts in alignment with user needs and system functionality to contribute to organizational policy
- Ensures the awareness of all staff regarding cyber fraud and cyber attacks
- Implements a strong, collaborative culture and procedures to continuously improve the cybersecurity capabilities
- Audits SOC/CSOC systems and assesses their outcomes
- Supports in carrying out inspections or audits by Contracting Authorities
- Draws added value from lean principles, agile methods and modern forms of collaboration (DevOps)
Skills on Resume:
- SOC Oversight (Hard Skills)
- Cyber Strategy (Hard Skills)
- Stakeholder Consulting (Soft Skills)
- Incident Analysis (Hard Skills)
- Security Awareness (Soft Skills)
- System Auditing (Hard Skills)
- Agile Practices (Soft Skills)
- DevOps Integration (Hard Skills)
24. IT Security Manager, NovaSphere IT Group, Bismarck, ND
Job Summary:
- Manage servers and other related equipment in the IT operations including data center equipment, network peripherals and appliances, printers, telephone system, and scanning machines
- Planning and implementation of network security policies using the identified tools such as Active Directory group policies, router, firewall and network management
- Monitor and review server health and system logs regularly and recommend solutions to improve system efficiency and performance
- Performs vulnerability and patch management in accordance with the prescribed timelines of the Global Security Group
- Preserve assets by implementing disaster recovery and back-up procedures with communication, hardware, desktops, laptops and servers
- Assist in the migration process and ensure business continuity during the system changeover
- Ensure that company data, server software and databases are backed up daily and back-ups are tested for recoverability every quarter
- Manage e-mail and user accounts in all business applications
- Coordinate with partners, merchants and vendors regarding network infrastructure planning and security roll-outs
- Troubleshoot and repair hardware and software problems
- Eliminate single points of failure in the IT infrastructure such as servers, server operating systems, telephone system hardware and software
- Ensure that all IT documents are up to date including inventory of hardware, software, network topology, service requests and others
- Ensure that security and monitoring systems such as CCTV, biometric door access and server room temperature alert system are working at all times
- Performs security assessment for all projects that will pass through the Sodexo network
- Performs regular IT audit of all assets, credentials and user access, and reports any anomalies and discrepancies to the Regional Security Head
Skills on Resume:
- Server Management (Hard Skills)
- Network Security (Hard Skills)
- Patch Management (Hard Skills)
- Disaster Recovery (Hard Skills)
- System Monitoring (Hard Skills)
- Vendor Coordination (Soft Skills)
- IT Auditing (Hard Skills)
- Access Control (Hard Skills)
25. IT Security Manager, LogicHaven Solutions, Erie, PA
Job Summary:
- Direct and control the management of information security risks
- Create awareness of the importance of information security to be a part of daily life within the business
- Create awareness of and give guidance in Information Security-related policies, procedures, and guidelines
- Ensure the implementation of, and adherence to, Information and IT security policy, procedures towards information owners, system owners and IT service providers
- Provide support to the systems and information owners in defining business requirements regarding availability, confidentiality, and integrity, especially in demands and projects
- Conduct risk reviews of business-critical applications
- Ensure business risks related to IT are identified in and collected in relevant parts of the organization
- Ensure that assets (IT systems and other repositories of personal data) as well as processing activities that include processing of personal data, are mapped and assessed
- Assist the Central Privacy Team with investigations of local data breaches and reporting as well as remedial action
Skills on Resume:
- Risk Management (Hard Skills)
- Security Awareness (Soft Skills)
- Policy Enforcement (Hard Skills)
- Stakeholder Support (Soft Skills)
- Risk Assessment (Hard Skills)
- Asset Mapping (Hard Skills)
- Privacy Compliance (Hard Skills)
- Incident Collaboration (Soft Skills)
26. IT Security Manager, CloudHarbor IT, Montgomery, AL
Job Summary:
- Responsible for defining and communicating the Information Security strategy for Aroundhome as well as the Online Platform
- Taking ownership of the development of the Incident/Crisis Management Process by staying in close contact with different stakeholders and successfully communicating Information Security topics at all levels
- Actively drive Information Security risk assessments, analyze the results and conduct proper mitigations in the context of the business
- Conduct Security Awareness initiatives and make sure Information Security is on the roadmap of all departments
- Own and run an Information Security Management System (ISMS) based on ISO27001
- Provide cross-functional support to other departments on Information Security-related topics
- Work closely with the top management and therefore contribute to the further development of Aroundhome
- Managing the areas of infrastructure or application support, and development
- Ensuring that the organization is PSN and PCI DSS compliant
- Managing a team of technical security specialists who provide an on-call service and work out of hours, including weekends
- Set wider policies and standards and manage any security incidents
- Make sure the confidentiality, integrity and availability of information, data and services
Skills on Resume:
- Security Strategy (Hard Skills)
- Crisis Management (Hard Skills)
- Risk Mitigation (Hard Skills)
- Awareness Training (Soft Skills)
- ISMS Operation (Hard Skills)
- Compliance Oversight (Hard Skills)
- Team Management (Soft Skills)
- Executive Collaboration (Soft Skills)
27. IT Security Manager, SureNet Systems, Evansville, IN
Job Summary:
- Support and ensure compliance related to IS risk management and resolution within the cluster
- Implement a governance structure around IS management and compliance while confirming stakeholders are indeed compliant with the target security model, following up on improvement actions
- Provide visibility of ongoing activities/projects/programs related to Information Security as well as current compliance figures across the cluster organization
- Take the lead in relation to Information Security incidents, managing overall handling and resolution of the issue as well as scoping the impact and establishing corrective action
- Service Level Management and Contract Compliance
- Ensure service management and contract compliance controls are met and applied across the cluster
- Develop and review information security policy, standards and build the security practice of the organization
- Define information security strategies and propose them to senior management
- Source and work with a security solution integrator for cybersecurity solution implementation, and review the architecture provided by the vendors
- Responsible for all IT security matters, inquiries and responses
- Prepare and perform the disaster recovery plan and business continuity plan management
- Keep updating the market and internal security standards and new frameworks
Skills on Resume:
- Risk Management (Hard Skills)
- Governance Structure (Hard Skills)
- Compliance Oversight (Hard Skills)
- Incident Handling (Hard Skills)
- Service Management (Soft Skills)
- Security Strategy (Hard Skills)
- Vendor Coordination (Soft Skills)
- Continuity Planning (Hard Skills)
28. IT Security Manager, WestGuard Cyber Solutions, Topeka, KS
Job Summary:
- Assist in a current state analysis of the environment (3+ regions/teams/tools) to move to one global tenant
- Development, implementation and enforcement of global security policies, procedures and framework
- Development, implementation and enforcement of global data loss prevention program
- Development and implementation of the Global Security Incident Response and Investigation Program
- Developing ongoing vulnerability management and monitoring programs, working closely with each of the local regions in regular testing and gap resolutions
- Development and implementation of Global and Regional key security KPI's and reporting
- Work with local regions to engineer and design, implement and monitor security measures for the protection of computer systems, networks and data
- Design, develop and implement computer/systems security architecture and cybersecurity designs
- Responsible for the development of a global security working group to share knowledge, report incidents and develop Global security best practices and standards
- Participate in Global and local projects to ensure security measures, processes and design align with global IT Security policies and procedures
- Support of eCommerce security principles in design and implementation to ensure electronic transactions and consumer trust (while partnering engineering group)
- Ensure all local security regulations are considered in all design and the local regions are compliant and meet those
- Responsible for the development, execution and reporting on email phishing attacks and the development of regular simulation tests to the wider business
- Responsible for developing regular auditing processes and conducting regular security audits
- Conducting proactive research to analyze security weaknesses and recommend appropriate strategies
Skills on Resume:
- Security Architecture (Hard Skills)
- Global Compliance (Hard Skills)
- Policy Development (Hard Skills)
- Incident Response (Hard Skills)
- Phishing Simulation (Hard Skills)
- Cross-Team Collaboration (Soft Skills)
- Audit Management (Hard Skills)
- eCommerce Security (Hard Skills)
29. IT Security Manager, VigilantAxis IT, Columbia, SC
Job Summary:
- Ensure chain-of-custody is present and updated
- Ensure that IT applications are given on a need-to-know basis
- Manage IT vendors and providers to provide services
- Ensure that vendors are readily available for BCP/DRP purposes
- Continuous monitoring of the audit logs of the IT application
- Provide in-house technical support and maintenance for all hardware and software
- Provide hardening and support for domains, such as DNS and cPanel
- Ensure applications have the right security controls in place and are updated or reviewed when there are new functionalities of the applications
Skills on Resume:
- Access Control (Hard Skills)
- Vendor Management (Soft Skills)
- BCP Readiness (Hard Skills)
- Log Monitoring (Hard Skills)
- Technical Support (Hard Skills)
- System Hardening (Hard Skills)
- Domain Management (Hard Skills)
- Security Review (Hard Skills)
30. IT Security Manager, WhiteOak Cybersecurity, Cheyenne, WY
Job Summary:
- Work with the compliance team to craft, administer and enforce MAS’s Technical Risk Management requirements throughout the business, in charge of the data protection for all aspects of the business
- Ensure that the company adheres to all PDPA requirements set out by regulatory bodies
- Conduct a bi-annual review of BCP, DRP or whenever the company requires
- Conduct annual BCP, DRP Test and IT audits
- Liaise on VAPT with vendor(s)
- Update and review IT policies and SOPs, and ensure staff are educated on the updates
- Ensure staff are sufficiently trained on IT security and keep abreast of the shifting security landscape
- Set up staff access to laptops and remove access
- Keep abreast with cyber health requirements set out by MAS and other regulatory bodies
Skills on Resume:
- Regulatory Compliance (Hard Skills)
- Data Protection (Hard Skills)
- BCP Testing (Hard Skills)
- Policy Review (Hard Skills)
- VAPT Coordination (Hard Skills)
- Staff Training (Soft Skills)
- Access Management (Hard Skills)
- Cyber Readiness (Hard Skills)
31. IT Security Manager, CyberTrail Systems, Wilmington, DE
Job Summary:
- Develop technical IT security concepts in compliance with applicable information security guidelines and requirements
- Conception, implementation and support of weak point analyses, intrusion tests, penetration tests and other measures
- Implementation and coordination of IT security concepts in projects within the IT / OT environment
- Support and implementation of information security risk analyses
- Responsibility for the implementation and development of awareness training measures regarding IT and information security
- Support in the creation and implementation of IS and IT security guidelines
- Vulnerability management, analysis and reporting
- Development of preventive measures to protect the IT infrastructure
- Acting as technical interface regarding IT security for the international BU functions, TK CERT, operations and business
- Responsibility for the implementation and coordination of the new Information Security Management System (ISMS) in specific regions
- Planning and execution of IT projects for the whole BU within the described fields of activity
- Ensure communication and collaboration with the respective IT coordinators in other international Bilstein locations as well as with the leading IT Architect / Network Specialist
- Create and maintain documentation for the described fields of activity
Skills on Resume:
- Security Design (Hard Skills)
- Penetration Testing (Hard Skills)
- Risk Analysis (Hard Skills)
- ISMS Coordination (Hard Skills)
- Vulnerability Management (Hard Skills)
- Awareness Training (Soft Skills)
- Cross-Regional Support (Soft Skills)
- Documentation Management (Hard Skills)
32. IT Security Manager, IronClad Technologies, Asheville, NC
Job Summary:
- Develop, test and analyze the organization’s business continuity and disaster recovery plan to ensure operations will continue in the event of a cyber-attack or natural disaster
- Generates documentation of network security infrastructure
- Interface with counterparties and vendors
- Assists in managing and ensuring system backups with end users
- Plans and implements necessary security measures to help protect data, computer systems, networks, etc.
- Stays up-to-date with system updates, patches, and release notes to help prevent breaches
- Stays up-to-date with current security architectures and the community
- Coordinates and conducts end-user security training
- Generates reports and manages alerts on varied systems to ensure correct configuration best practices are being used
- Performs scheduled audits of accounts on various systems
Skills on Resume:
- BCP Planning (Hard Skills)
- Disaster Recovery (Hard Skills)
- Security Patching (Hard Skills)
- System Auditing (Hard Skills)
- End-User Training (Soft Skills)
- Backup Management (Hard Skills)
- Vendor Coordination (Soft Skills)
- Security Monitoring (Hard Skills)
33. IT Security Manager, EastGate Security Group, Lafayette, LA
Job Summary:
- Performs testing of security measures on schedule
- Assists in tracking vulnerabilities affecting internal systems
- Assists in managing security remediation efforts
- Assists in responding to security events and proactively analyzes identified events
- Aids in any corporate-led security measures as well as any compliance needs
- Implement organization-wide security best practices to protect the business against existing, new and emerging security threats
- Works closely and manages the MSP
- Problem solver and resolves difficult situations
- Responsible for onboarding, off-boarding and software provisioning to staff members
Skills on Resume:
- Vulnerability Tracking (Hard Skills)
- Remediation Support (Hard Skills)
- Event Response (Hard Skills)
- Security Compliance (Hard Skills)
- MSP Management (Soft Skills)
- Problem Solving (Soft Skills)
- User Provisioning (Hard Skills)
- Security Testing (Hard Skills)
34. IT Security Manager, GraniteState Cyber Defense, Concord, NH
Job Summary:
- Identify protection goals, objectives and metrics consistent with IT and corporate risk management strategy
- Ensure proper documentation on critical IT systems and services to facilitate disaster recovery
- Analyze system security risk and compliance, access control, backup recovery procedures and IS organization and administration practices
- Participate in the development of standards and procedures for IT Security quality activities
- Managing oversight of IT regulatory compliance and ensuring compliance gaps are tracked and remediated promptly
- Ensure that the IT control framework complies with MCIS policies or any other compliance directives and industry standard operating guidelines
- Monitor and track best practices and emerging compliance changes/impacts for continuous improvement opportunities
- Coordinate management responses to audit findings with corresponding evidence
- Advise management of IT risks and best security practices
- Work with business management to prioritize IT security risk initiatives and spending based on appropriate risk management and/or financial methodology
- Conduct periodic vulnerability assessment on application systems, system management, network and communication infrastructure, and security infrastructure
- Ensure compliance with BNM Guideline, audit guidelines, IT Security Policy, Procedures and Standards
- Analyze from a risk and compliance perspective including the security-related logs of the various systems including firewalls, intrusion detection/prevention systems, SIEM, systems, databases, etc and to initiate preventive and/or corrective measures
- Accountable for management reporting for ITSC, GRCC and BRMC
Skills on Resume:
- Risk Analysis (Hard Skills)
- Compliance Oversight (Hard Skills)
- Audit Coordination (Hard Skills)
- Disaster Planning (Hard Skills)
- Security Metrics (Hard Skills)
- Log Analysis (Hard Skills)
- Executive Reporting (Soft Skills)
- Spending Prioritization (Soft Skills)
35. IT Security Manager, ShadowBridge IT Services, Boise, ID
Job Summary:
- Create and maintain the enterprise’s cybersecurity architecture design, security awareness training program, and policies and procedures
- Establish a governance structure to develop a Cyber Security Program
- Keep up to date with security trends, threats, and control measures
- Carry out technical vulnerability assessments of IT systems and processes, identifying potential vulnerabilities, and make recommendations to control any risks identified
- Responsible for the regular Information Security Reviews with partner organizations by conducting assessments of company systems, policies, processes and infrastructure
- Act as a point of contact between Internal/external auditors and business stakeholders on scheduled IT Operations Audit
- Review, remediate and contain CAAS/SQ ITD-sanctioned info/cybersecurity threats, IT security breaches related to company infrastructure, IT operations and networks
- Support and ensure core business applications (infrastructure/systems/applications) deployment efforts are aligned to meet the company's established security baselines and advise internal and external service application providers
- Oversee the information security risk register and carry out actions to mitigate risks identified
- Undertake continuous personal and professional development, and support it for any staff managed through effective use of Planning
- Carry out the Review and Appraisal scheme and staff development opportunities
- Conduct all financial matters associated with the role by the Company's policies and procedures, as laid down in the Financial Regulations
Skills on Resume:
- Security Architecture (Hard Skills)
- Awareness Training (Soft Skills)
- Risk Mitigation (Hard Skills)
- Vulnerability Assessment (Hard Skills)
- Audit Liaison (Soft Skills)
- Governance Structure (Hard Skills)
- Baseline Alignment (Hard Skills)
- Team Development (Soft Skills)
36. IT Security Manager, LibertyMatrix Security, Reading, PA
Job Summary:
- Manages the ongoing vulnerability scanning and assessment process and partners with other IT teams to resolve vulnerabilities promptly to maintain compliance
- Keep up with security technology and trends
- Monitors and routinely audits compliance with all information security procedures and policies
- Ensures consistency of internal controls across departments
- Partners with the Infrastructure team with management of security tools, systems and processes including Logging / IDS / IPS / Endpoint Protection / Web filtering and Proxy / MDM / DLP and Vulnerability Assessment
- Reviews and recommends firewall changes
- Owns and maintains PCI compliance and the IT Security-related portions of GDPR compliance standards to ensure standards are met in an ongoing compliant manner
- Assist other IT teams in system and software architecture and design to ensure that assets and implementations are appropriately secure
Skills on Resume:
- Vulnerability Management (Hard Skills)
- Compliance Monitoring (Hard Skills)
- Security Tools (Hard Skills)
- Control Consistency (Soft Skills)
- Firewall Review (Hard Skills)
- PCI Compliance (Hard Skills)
- Secure Design (Hard Skills)
- Security Trends (Soft Skills)
37. IT Security Manager, HorizonVault IT, Charleston, WV
Job Summary:
- Works closely with the internal legal team to perform risk assessments in the IT Infrastructure space to identify and mitigate potential gaps
- Stays current on threats applicable to the environment and brand
- Recommends mitigating actions or risk-reduction configurations or solutions
- Identifies and incorporates opportunities for improvements to the Security and Compliance program, and communicates such opportunities effectively to management
- Monitors and escalates all intrusion detection and network incidents
- Provides oversight, guidance and development of requirements for vendor selection for new and replacement technologies within the IT Security footprint
- Participates in the review of relevant Information Security aspects of RFP, Contract, Policy and Process documentation
- Act as the primary interface for client and third-party IT security audits, providing oversight and guidance and ensuring compliance
- Assists with the Security Awareness program and ensures that the user community understands and adheres to the necessary procedures to maintain security
Skills on Resume:
- Risk Assessment (Hard Skills)
- Threat Monitoring (Hard Skills)
- Mitigation Planning (Hard Skills)
- Audit Support (Soft Skills)
- Vendor Evaluation (Hard Skills)
- Contract Review (Soft Skills)
- Awareness Training (Soft Skills)
- Compliance Oversight (Hard Skills)