The Director of Vulnerability Management and Continuous Control Monitoring leads a team of cybersecurity professionals that provide continuous internal and external vulnerability scanning and reporting, continuous configuration monitoring in on-premise, multi-cloud, and customer network environments, and design and maintenance of a platform that continuously monitors and reports on the state of CCIs critical cyber controls.
The scope of this role is CCI wide and includes enterprise IT, product technologies and customer facing networks (critical infrastructure), and adjacent business units’ environments. This leader directs the strategy and operational approach of vulnerability management, including identification and reporting of technical vulnerabilities and misconfigurations across infrastructure supported by application, server, database, network, and product teams. Additionally, this leader will direct the strategy and day to day operations of the cybersecurity team’s continuous control monitoring platform for measurement of ongoing compliance with critical cyber controls across all technology environments.
PRIMARY RESPONSIBILITIES AND ESSENTIAL FUNCTIONS :
Vulnerability Management
- Lead and mentor a team of cybersecurity professionals that:
- Deliver continuous scanning, identification, and reporting of the external facing attack surface throughout on-premise and cloud-based environments across enterprise, product technologies and network.
- Provide continuous scanning, identification, and reporting of vulnerabilities throughout on-premises and cloud-based environments across both enterprise and product technologies.
- Recommend, socialize, and gain consensus on minimum patching and vulnerability mitigation standards and policies across both enterprise, product and network technology teams and acquisitions.
- When imminent threats or relevant zero-day vulnerabilities are identified, escalation of rapid vulnerability response efforts.
- Monitor vulnerability mitigation progress and partner with teams to provide recommendations for efficient risk remediation or mitigation.
- Provide regular reporting on the current state of vulnerabilities and configurations throughout the entire environment including acquisitions.
- Partner with M&A teams to ensure rapid deployment of vulnerability scanning and related visibility tools to acquisitions.
Continuous Control Monitoring
- Define and execute the vision and strategy for our continuous control monitoring platform and data model that supports our overall critical cybersecurity objectives and priorities.
- Lead and mentor a team of engineers who are responsible for developing, testing, and maintaining the continuous control monitoring platform and related data models that integrate data from various cybersecurity and technology sources to report on the current state of critical cyber controls.
- Partner with cybersecurity, enterprise, product, and network technology teams on the development of appropriate scoring algorithms and measurement criteria, including defining and setting policies where needed.
- Collaborate with engineering and architecture leaders, other cybersecurity leaders, and broader CCI leaders to socialize security requirements for meta data or technical integrations necessary to provide relevant critical cyber control reporting to all layers of the organization.
- Design and build consumable and audience appropriate reporting of the state of critical cyber controls for consumption by technology owners, technology managers and directors, cybersecurity leaders, and senior technology and business leaders.
Common Responsibilities Across All Focus Areas
- Lead and coordinate large-scale information security projects, including implementation and delivery of infrastructure security scanning, correlation of new cybersecurity data sources and reporting, and workflow and orchestration solutions.
- Identify, propose, and influence business solutions, negotiate deliverables and requirements across multiple business customers or organizations.
- Partner with other functional groups to develop, manage, track, and analyze operational support structures, tools, methods and procedures to improve process efficacy, inter-team communications, and the customer experience.
- Provide leadership and strategic direction for the function, including budgeting capital and operating expenses.
- Oversee and lead contract negotiations and vendor management for vulnerability management, continuous control monitoring, and other security capabilities as appropriate.
- Responsible for staying abreast of industry leading vulnerability and software security vendors and informing their product roadmaps.
- Consult with senior leadership on security threats and incident response practices.
- Working knowledge/experience of network systems, security principles, and applications. Fundamental understanding of defense-in-depth and intelligence-driven strategies.
- Detailed knowledge of vulnerability management, configuration management, software security, red team concepts, tools and trends.
- Develop a training program to ensure ongoing education vulnerability management and continuous control monitoring resources.
QUALIFICATIONS AND EXPERIENCE:
Minimum
- BS/BA degree in a related discipline with 10+ years of experience in a related field, OR a MS/MA degree in a related discipline with 8+ years of experience in a related field, OR a Ph.D. in a related discipline with 5+ years of experience in a related field.
- 10+ years of experience required in the field of information security with a demonstrated path of increasing scope and management responsibilities.
- 5+ years managing or leading an Information Security vulnerability management function.
- Ability to drive consensus and collaboration among many diverse teams, individuals and functional groups to achieve desired business results.
- Excellent interpersonal, leadership, presentation, and collaborative skills to work effectively with teams throughout organization.
- Demonstrated track record of both project and operational delivery.
- Demonstrated knowledge and expertise in vulnerability assessment, risk management, and cybersecurity frameworks and standards (e.g., NIST, ISO, CIS, OWASP).
- Strong knowledge of vulnerability scanning and analysis and attack surface management tools (e.g., Qualys, Nessus, Rapid7, Tenable, Veracode, Shodan, etc.)
- At least one relevant industry certification – CISSP, SANS GIAC, C|EH, CISM, CRISC, CISA, CPA.
#J-18808-Ljbffr