Pyramid Consulting, Inc

Cyber Security Manager

Posted: 1 days ago

Boost Your Application

Stand out with our professional, ATS-friendly resume templates designed to get you noticed by recruiters.

Download Resume Templates

Job Description

Key Responsibilities1. Manages individuals by developing individual development and training plans, assisting with skills development and improvement, monitor individual performance, and leverage feedback and performance appraisal processes2. Establish, drive, and track team effectiveness to meet team goals, alignment with organizational objectives, performance targets, and other criteria established by leadership3. Manage team administrative tasks including on-boarding, shift scheduling, knowledge management, training and exercise participation, audit/compliance support, investment project support, and team business continuity/disaster recovery planning4. Translate business plans into tactical action items; overseeing the completion of work assignments; building accountability for and measuring progress in achieving results; identifying and addressing improvement opportunities; removing obstacles that impact performance; and guiding performance and developing contingency plans accordingly.5. Ensures cyber security team(s) proactively monitor and/or respond to known or emerging threats against the KP enterprise6. Pursues professional growth and provides developmental opportunities for others by soliciting and acting on performance feedback; building collaborative, cross-functional relationships; training and developing talent for growth opportunities; delegating tasks and decisions; fostering open dialogue amongst team members; supporting execution of performance management guidelines and expectations; and working closely with employees to set goals and provide open feedback and coaching to drive performance improvement.7. Effectively communicates investigative findings to non-technical audiences.8. Oversees regular operations meeting with organizational teams as needed.9. Provides guidance and feedback on continuous improvement to CSTS members and/or leadership.10. Manages information fusion procedures across operations and engineering, including activities such as Use Case planning/ development, Use Case quality assurance validation, and response procedure documentation.11. Manages partnerships between stage teams and upper management to ensure the identification and resolution of issues, improvement areas, or security/architectural gaps.12. Assists with the development of process or procedure improvements, consulting on training sessions, and assisting with the development of new training documents.13. Builds partnerships with key KP teams to foster collaborative approaches for improving KP cybersecurity posture.14. Ensures the proper deployment of incident response plans which may include after-hours support and coordination amongresponsible teams.15. Partners and establishes productive, effective working relationships with multiple key stakeholders, working cross-functionally across departments, functions, or business lines.16. Clearly and concisely communicates verbally and in writing. Speaks up by offering input and suggestions, asking questions and raising concerns. 17. Communicates goals, monitors progress, and manages people and resoures to achieve quality outcomes for the team. 18. Gives direct, constructive feedback to improve team performance and grow capability. 19. Ability to learn new applications to support the execution of team business objectives.20. Pursues professional growth and provides developmental opportunities for others by soliciting and acting on performance feedback; building collaborative, cross-functional relationships; training and developing talent for growth opportunities; delegating tasks and decisions; fostering open dialogue amongst team members; executing performance management guidelines and expectations; and working closely with employees to set goals and provide open feedback and coaching to drive performance improvement.21. Manages designated work unit by translating business plans into tactical action items; ensuring all policies and procedures are followed; delegating tasks to meet goals and objectives; overseeing the completion of work assignments; aligning team efforts; building accountability for and measuring progress in achieving results; identifyingand addressing improvement opportunities; removing obstacles that impact performance; and guiding performance and developing contingency plans accordingly.22. Manages the development, implementation and maintenance of assigned ITRM process and/or service portfolio by influencing leadership in the development of the ITRM strategy; ensuring the development and implementation of efficient, effective, measurable, and sustainable ITRM processes and controls within the governance framework; and managing team members in the development and implementation of performance metrics and measurement tools.23. Organizes plans for the execution of ITRM compliance assessments and consulting projects by monitoring the progressof ongoing assessments and projects; performing quality control and review of project deliverables; managing intake,planning and coordination activities for new or revisions to technology systems or services; and driving the design and implementation of appropriate controls through the sustainment phase.24. Manages the delivery of multiple ITRM service delivery and engagements by managing multiple workstreams, includingstakeholder communications and team mentorship; managing and monitoring financials of assigned ITRM servicedelivery and engagements; and managing the allocation of resources, schedules, and task assignments. Preferred Qualifications1. Two (2) years supervisory experience managing cross-functional teams2. Three (3) years experience working with information systems and security technologies.3. Two (2) or more cybersecurity certifications (Security+, CISSP, CISA, etc.).4. Two (2) years of work experience in a role requiring interaction with senior leadership (e.g., Director level and above)5. Three (3) years work experience requiring the development of technical documents or presentations.6. Master's degree in Business Administration, MIS, Information Security, Audit, or related field, or related field.7. Two (2) years managing Information Technology projects.

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period