Posted 2d ago

Information Systems Security Manager

@ REE Medical
United States
$125k-$150k/yrRemoteFull Time
Responsibilities:Oversee security controls, Lead incident response, Monitor threats
Requirements Summary:5-6 years in IT security with leadership, CS/IT/Cybersecurity degree, CISSP, cloud and DevSecOps, NIST/ISO27001 knowledge.
Technical Tools Mentioned:AWS, Azure, Google Cloud, SIEM, IDS/IPS, DLP, DevSecOps, NIST, ISO 27001
Save
Mark Applied
Hide Job
Report & Hide
Job Description

Job Summary:

The IT Security Manager is responsible for developing, implementing, and maintaining the organization’s cybersecurity policies, procedures, and systems to safeguard sensitive data and ensure compliance with regulatory standards. They lead a team of security professionals, manage risk assessments, and respond to security incidents to protect the organization’s IT infrastructure.

Responsibilities:

  • Oversee the design, implementation, and management of security controls, including firewalls, intrusion detection/prevention systems, and endpoint protection.
  • Lead incident response efforts, including investigation, containment, and recovery from security breaches or incidents.
  • Monitor and assess emerging threats, vulnerabilities, and industry trends to maintain a robust security posture.
  • Develop, implement, and enforce IT security policies, standards, and procedures.
  • Ensure compliance with relevant regulations and standards (e.g., GDPR, PCI-DSS, ISO 27001).
  • Coordinate audits and assessments to validate security controls and address gaps.
  • Conduct regular risk assessments and vulnerability scans to identify and prioritize security risks.
  • Develop and maintain a risk management framework to mitigate threats to data and systems.
  • Collaborate with legal, compliance, and business units to address risk-related issues.
  • Evaluate and implement advanced security technologies, such as AI-driven threat detection, zero-trust architecture, and cloud security solutions.
  •  Stay abreast of emerging technologies and their implications for cybersecurity