Education and Experience | Bachelor’s degree in Information Technology or Business Administration, Business Management; at least eight (8) years of experience leading comparable information security or technology teams with at least six (6) years of management/supervisory experience. Operational experience configuring and managing a security Information and Event Management (SEIM) platform. Operational experience monitoring cloud computing (e.g., AWS, Azure, etc.) and SaaS environments. Experience with leading the response to crises, incidents, and investigations. Operational experience managing in a regulated environment (e.g., classified networks, healthcare, finance, banking, etc.). Experience reporting on CDOC activities and deliver recommendations in accordance with government and contractual requirements. |
Special Skills, Licenses and Certifications | Strong understanding of networking and communication protocols (such as TCP/IP, UDP, SSL/TLS, IPSEC, HTTP/S, etc.). Exceptional operational rigor with extensive real-world experience in SOC methodologies and frameworks for I.T. operations (e.g., Information Technology Infrastructure Library (ITIL), National Institute of Standards and Technology (NIST), etc.). Demonstrated ability to manage complex projects in an effective manner. Must possess a strong service mindset. Ability to provide threat and vulnerability analysis security advisory services. Excellent verbal, written communication and presentation skills. Has experience in DarkWeb knowledge and search methodologies. Strong knowledge and skills with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments. Demonstrated ability to foster teamwork and unity among team members that allows for disagreement over ideas, conflict and expeditious resolution, and the appreciation of diversity. Broad and deep technical knowledge and experience across varying infrastructure requirements, development, design, and reengineering. Either a Certified Information Systems Security Professional (CISSP) or Certified Information Security Director (CISM) is required. The following certifications are preferred: Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator (CHFI), GIAC Certified Detection Analyst (GCDA) or Offensive Security Certified Professional (OSCP). |
Performance Based Competencies | Ability to quickly acquire in-depth knowledge of Partnership’s infrastructure and managed care issues. Ability to self-manage and develop timelines for projects required. Ability to work effectively with employees at all levels in the organization. Ability to maintain complete confidentiality of member, employee, and Partnership information. Strong written and oral communication skills with ability to interpret and understand technical requirements. Excellent analytical skills to troubleshoot and resolve systems problems. |
Work Environment And Physical Demands | More than 80% of work time is spent in front of a computer monitor. May be required to lift, carry, or move equipment of varying size, weighing up to 50 lbs. May be required to bend, stoop, kneel, crawl, or work in other non-standing and non-sitting positions. |