a dynamic information technology staffing firm

Careers - Job Details

Information Security Operations Supervisor

BGI has the following contract opportunity with our direct client located in NY, NY
Job ID/Number:
Posted Date:
Job Location:
New York, NY
Position Type:
Information Technology
Supervise a staff of tier 1-3 information security analysts through the daily tasks of monitoring and defense of all corporate information technology infrastructure. 
Assist in the ongoing development of information security operations KPI's. Report metrics monthly. 
Identify chronic issues that impact the security of our information systems and drive remediation of those issues. 
Monitor the performance and effectiveness of information security tools employed to defend  infrastructure. Maintain the functionality of those tools. 
Serve as focal technical lead on incidents and security events. 
Lead the investigative process for all types of cybersecurity incidents to determine the extent of compromise. 
Summarize incidents and events effectively to different parties such as legal counsel, law enforcement, executive leadership and technical staff in both written and verbal forms. 
Consult with central Human Resources, Office of Student Affairs, Office of Public Safety, and other related departments and Schools to investigate incidents involving technology resources (computer compromise, exposure of private data, harassment, law suit against University). 
Participate fully in the management of security operations staff including hiring, training, evaluating performance, distribution of duties and determination of appropriate staffing levels. 
Technical skills required 
- Utilization of Splunk to investigate system activity and security incidents 
- Perl and Python scripting 
- Puppet administration 
- Experience with Palo Alto Firewalls and threat feed aggregation 
Experience mitigating and addressing threat vectors including Advanced Persistent Threat (APT), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc. 
Intermediate understanding of network technologies such as TCP/IP, IDS/IPS, firewalls, LAN/WAN, routing and switching. 
Intermediate knowledge of the following platforms in an enterprise environment - Microsoft Windows, Solaris, Linux. 
Knowledge of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks, compromise, and exfiltration. 
Ability to understand and weigh business risks and communicate appropriate information security measures. 
Excellent organizational, communication, and problem-solving skills. Excellent communication, leadership, interpersonal, influence and negotiation skills. Ability to build consensus and lead groups through decision making process. Knowledge of IT Security regulations and best practices.
close (X)