[Close] 

Information Security Operations Manager

Perrigo is looking for an Information Security Operations Manager to join their Information Security team located in Allegan, MI.  The Information Security Operations Manager will be responsible for maintaining and advancing the enterprise-wide information security operations program to ensure that data, information assets and critical infrastructure are adequately protected.  This role will provide strategic direction, policy and standard development and process mapping for Information Security, leveraging quality and risk as key components to the overall program. Acts as a point of escalation for the team and collaborates with enterprise teams in the event of an incident Assists in the facilitation of risk based gap assessments, treatments, and mitigation plans Facilitates penetration testing and remediation with outsourced vendors Facilitates and participates in eDiscovery and forensic investigations with outsourced vendors Prepares reports or necessary documentation for leadership to detail security evaluations and/or incidents Handles and escalates security incidents as defined in the incident response procedures Assists in proactively identifying emerging cyberthreats within the environment and PLS industry Maintains relationship with Infrastructure, Application, and Business Owners Manages relationship with and requirements of the Security Operations Center Monitors SLAs and performance of vendors for outsourced services Approves access exceptions and assists in user access reviews Monitors operations of all security tools and technologies Provides on-callsupport for broken or disrupted security technologies Provides technical supervision for and guidance to the TVM and TechOps team Required Experience: Experience operating security technologies including Network Devices, IAM Tools, Cloud Security Tools, and Application Tools Expertise in industry standard threat and vulnerability controls as well as metrics reporting on TVM controls Experience using a variety of sources to supportthreat intelligence analysis Experience managing operations support and an understanding of service level agreements Understanding of investigations into a breach of information security using all relevant sources including access logs, systems logs, etc. Ability to provide technical support or consultation for securityarchitecture, engineering, and compliance Applicable Certifications: GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified Network Intrusion Analyst Bachelors Degree in related field plus 8+ years of experience in cybersecurity or information technology
Salary Range: NA
Minimum Qualification
8 - 10 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.