Create Email Alert

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.

Similar Jobs

  • Esolvit

    Information Security Manager

    Austin, TX, United States

    Title: Information Security Manager Location : Austin, TX Duration: Long Term You may either create a user id and sign up under the arytic link or go in without signing up to access the job/open roles on our Arytic platform. https://candidate.arytic.com/Ijobdetail/1004147 Level Description8 or more years of experience, relies on experience a

    Job Source: Esolvit
  • Esolvit

    Information Security Manager

    Austin, TX, United States

    • Ending Soon

    Title: Information Security Manager Location : Austin, TX Duration: Long Term You may either create a user id and sign up under the arytic link or go in without signing up to access the job/open roles on our Arytic platform. https://candidate.arytic.com/Ijobdetail/1004147 Level Description 8 or more years of experience, relies on experience

    Job Source: Esolvit
  • PEOPLECORP AMERICA INC

    Information Security Manager

    Austin, TX, United States

    • Ending Soon

    Information Security Manager Austin, TX 6+ Months Job Description Our Direct Client is seeking an experienced, full-time, on-site, dedicated Candidate, with skills and expertise as described in below requirement. Responsibilities: Client is seeking an Information Security Manager that serves as a liaison between IT architects and information securi

    Job Source: PEOPLECORP AMERICA INC
  • Abacus

    Information Security Manager 3

    Austin, TX, United States

    • Ending Soon

    Solicitation Reference Number 537400642 Customer Name Texas Health and Human Services Commission Category Security Customer Entity Name Health and Human Services Commission Title Information Security Manager Level Information Security Manager 3 Posted Date 8/9/2023 Estimated Hours 2,000 SSR Status Posted Number of Positions 1 Status New #

    Job Source: Abacus
  • The University of Texas at Austin

    Information Technology & Security Manager

    Austin, TX, United States

    Job Posting Title: Information Technology & Security Manager ---- Hiring Department: Applied Research Laboratories ---- Position Open To: All Applicants ---- Weekly Scheduled Hours: 40 ---- FLSA Status: Exempt ---- Earliest Start Date: Immediately ---- Position Duration: Expected to Continue ---- Location: PICKLE RESEARCH CAMPUS ---- Job De

    Job Source: The University of Texas at Austin
  • LanceSoft

    Information Security Manager 3

    Austin, TX, United States

    • Ending Soon

    Title: Information Security Manager Location: Texas, TX Years Required/Preferred Experience 8 Required Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers' methodologies, in order to anticipate breac

    Job Source: LanceSoft
  • LanceSoft

    Information Security Manager 3

    Austin, TX, United States

    • Ending Soon

    Title: Information Security Manager Location: Texas, TX Years Required/Preferred Experience 8 Required Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers' methodologies, in order to anticipate breac

    Job Source: LanceSoft
  • DLA Piper

    Information Security Analyst_

    Austin

    _DLA Piper is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Job applicant poster viewing center (om/?LicenceId=09b17fa3-b781-4022-bfdd-ec61a570463c&Prod

    Job Source: DLA Piper

Information Security Manager

Austin, TX, United States

Company Description

Job Description

Design, build and implement enterprise-class security systems for a production environment

Align standards, frameworks and security with overall business and technology strategy

Identify and communicate current and emerging security threats

Design security architecture elements to mitigate threats as they emerge

Create solutions that balance business requirements with information and cyber security requirements

Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.

Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.

Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data.

Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.

Employ secure configuration management processes.

Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines

Identify and prioritize critical business functions in collaboration with organizational stakeholders.

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Provide advice on project costs, design concepts, or design changes.

Provide input on security requirements to be included in statements of work and other appropriate procurement documents.

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.

Analyze candidate architectures, allocate security services, and select security mechanisms.

Develop a system security context, a preliminary system security Concept of Operations (CONOPS) and define baseline system security requirements in accordance with applicable cybersecurity requirements.

Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.

Write detailed functional specifications that document the architecture development process.

Analyze user needs and requirements to plan architecture.

Develop enterprise architecture or system components required to meet user needs.

Document and update as necessary all definition and architecture activities.

Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

Translate proposed capabilities into technical requirements.

Assess and design security management functions as related to cyberspace.

Qualifications Proven work experience in security architecture, demonstrating solutions delivery, principles and emerging technologies - designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions.

Experience consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements

Proven expertise in security considerations of cloud computing: This includes data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks

Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.

Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards

Knowledge and experience working with ISO27001 - specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management

Experience delivering/managing Identity and access management (IAM) solutions - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources

Experience working with security management tools (e.g., vulnerability scanners, file integrity monitoring, configuration monitoring, etc.) and perimeter technologies (e.g., router, firewalls, web proxies and intrusion prevention, etc.)

Knowledge of configuration management, change control/problem management integration, risk assessment and acceptance, exception management and security baselines (e.g. CIS Baselines, NIST, vendor security technical implementation guides, etc.)

Strong awareness of networking and internet protocols, including TCP/IP, DNS, SMTP, HTTP and distributed networks

Knowledge of web services, API, REST and RPC

Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively

Excellent communication and organizational skills, and the ability to stay focused on completing tasks and meeting goals within a busy workspace

Extensive skill in effective verbal and written communications with other computer professionals, clients, and stakeholders

Knowledge of software development life cycle methodologies

Ability to analyze and problem solve

Ability to establish and always maintain effective and professional working relationships with others in the course and scope of conducting business

CISSP-ISAAP or equivalent certification

Ability to obtain required certification within 6 months and maintain approved baseline certification for position (i.e. CISSP-ISAAP or equivalent)

Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field is generally preferred.

GSEC, CEH, CISA, CCSP desired

Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus)

Additional Information

All your information will be kept confidential according to EEO guidelines.

Apply

Create Email Alert

Create Email Alert

Information Security Manager jobs in Austin, TX, United States

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.