Job Details

Director, Cyber Security Operations

Advertiser
Little Caesars Pizza
Location
Detroit, Michigan, United States
Rate
-

Build a Bigger, Better, Bolder Future

Imagine working for a company that measures its success based off the growth of its colleagues, a company that invests in its future by investing in you. Little Caesars is a company where our colleagues make an impact.


Your Mission

The main objective of the Security Operations Director is to define, communicate and drive the deployment and adoption of a Security Operations program that will protect our organization from cyber threats against its network, system, and information assets. The Security Operations Director will oversee security operations across the Ilitch Holdings entities and will be responsible for aligning capabilities, standardization and providing oversight and guidance across entities to ensure a consistent and unified approach. The Security Operations Director will lead the Security Operations Center and oversee/support offensive and defensive Security Operations functions, including security monitoring, incidence response, digital forensics, vulnerability management, threat intelligence and pen-testing.


How You'll Make an Impact

  • Define and drive the deployment of a security monitoring program in an effort to promptly detect cyber incidents and mitigate their impact to the organization.
  • Design security monitoring requirements and ensure security monitoring at data, application, and network levels.
  • Oversee the development and continuous improvement of security monitoring playbooks and develop escalation procedures and workflows for security events.
  • Collect and aggregate performance metrics for all entities and establish a regular reporting process.
  • Define, communicate, and drive the deployment and adoption of a consistent and well-organized incident response program.
  • Develop and conduct regular incident response training and testing to ensure readiness across entities.
  • Report critical incidents as appropriate to VP of Information Security based on designated reporting requirements.
  • Establish digital forensics for incident response activities, incorporating best practice processes and technologies.
  • Define and drive the deployment and adoption of a vulnerability management program.
  • Implement and oversee the integration and operation of a threat intelligence program to curate and analyze information in business context to enable a course of action that can be undertaken to improve security or supports decision making.
  • Respond to requests for information by stakeholders and provide briefings as needed.
  • Establish and operate a pentesting program to assess the security posture and identify weaknesses of enterprise systems, networks, and applications, including assessing externally hosted environments.

Who You Are

  • Understands basic security-centric technology, like Domain Name System (DNS), routing, authentication, Virtual Private Network (VPN), proxy services and Distributed Denial of Service (DDoS) mitigation technologies; ethical hacking and threat modeling; and firewall and intrusion detection/prevention protocols.
  • Minimum of 10 years of relevant work experience in security operations including threat intelligence, security monitoring and incident response.
  • Experience planning, implementing, and maintaining security operations functions.
  • Experience managing a Security Operations Center.
  • Experience producing and reviewing cyber-related intelligence products from multiple sources and incorporating into a Security Operations program.
  • Experience overseeing monitoring of security events using a variety of tools.
  • Experience overseeing incident response processes through to successful remediation.
  • Stay updated on the latest malware and security threats.
  • Excellent written and verbal communication skills and high level of personal integrity. Solid ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal and written means. Ability to communicate with all levels of the organization.


What Makes You Stand Out

  • Experience implementing and operating leading-edge technologies.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Solid ability to lead incident handling processes.
  • Deep knowledge of cyber kill chain.
  • Strong process execution, efficiency, time management and organizational skills.
  • Strong work ethic, leadership skills, initiative, and ownership of work.
  • High proficiency with common cybersecurity management frameworks, regulatory requirements, and industry-leading practices.
  • At least one of the following certifications is required or must be obtained within your first 12 months of employment CISSP, CEH, OSCP and/or the following SANS certifications GCIH, GCFE, GCFA, GREM, GPEN, GWAPT, GXPN.

Send application

Mail this job to me so I can apply later

Apply With CV

You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!

latest videos

Upcoming Events