Director, Cyber Fusion Centerother related Employment listings - Keyport, NJ at Geebo

Director, Cyber Fusion Center

Job Description It's an exciting time to join International Flavors & Fragrances' (IFF) Information Security Team.
As Director, Cyber Fusion Center (CFC), you will lead all aspects of Cyber threat management, including Security Analysis, Threat Intelligence, Email Security, and Endpoint Security.
Reporting into the Chief Information Security Officer (CISO), you will oversee the design, build, deployment, maintenance, and use of next-generation Cyber Fusion Center capabilities.
In leading the 24x7 team, you will be involved in threat modeling, threat intelligence, incident detection, kill chain interruption, and damage control.
You will be accountable for establishing an enterprise Information Security stance in these domains through policy, architecture, tool selection/implementation, and change management processes.
You will lead projects and initiatives in these domains to provide enterprise solutions that are scalable and adaptable with the ever-changing business needs and industry demands.
You will significantly impact by interfacing with Information Technology peers and with business leaders to both share the Cyber Fusion Center vision with those individuals, and to solicit their involvement in achieving enterprise security through information sharing and cooperation.
You will be expected to interact with all levels of business leadership to communicate preparedness against attacks and the impact of attacks that do occur.
You will deal with highly confidential and sensitive information and are expected to both define appropriate handling of such information for the enterprise and to implement best handling practices.
About You:
To be successful in this role you must have significant experience in Cyber Fusion Center operations, specifically Security Analysis (including SIEMs), Threat Intelligence, Email Security, and Endpoint Security.
You must have some experience in Information Security Architecture strategy/planning and technology innovation/acquisition.
You will be expected to demonstrate strong strategic agility, business acumen, creative thinking, stakeholder management, collaboration tendencies, and influence skills.
Job Requirements You will spend your time Stopping and mitigating complex attacks to protect IFF, including making emergency decisions in response to active attacks outside of routine technology processes.
Executing on key operational decisions with potentially high impact affecting attacks and threats facing IFF (e.
g.
spam campaigns, malware campaigns, criminal operations, and nation-state operations).
Ensuring the planning, development, implementation, and maintenance of our Cyber Fusion Center (including our Security Analysis, Threat Intelligence, Email Security, and Endpoint Security programs), including partnering directly with stakeholders in a multi-disciplined team structure to design and deploy strategies and solutions across a variety of vendor platforms.
Acting as a Cyber Fusion Center thought leader, consistently researching new ways to improve operations and overall strategy.
Ensuring adherence to Information Security Controls, Policies and Standards with a focus on automation and control, for the Cyber Fusion Center.
Assessing the current IT architecture, business needs, and future requirements as they relate to the Cyber Fusion Center.
Determining Information Security requirements by evaluating business strategies and requirements, researching information security standards, conducting system security and vulnerability analyses and risk assessments, studying architectures/platforms, identifying integration issues, and preparing cost estimates.
Verifying that processes and systems comply with any laws or regulatory requirements from local or national governments.
Preparing for, and potentially presenting at, the Information Security Steering Committee, Executive Committee, and Board of Directors meetings.
Preparing senior-level technical reports for executive management.
Engaging in ongoing communications with peers in Information Technology and the various business groups (e.
g.
Legal, HR, Security) to ensure enterprise wide understanding of Information Security goals, to solicit feedback and to foster cooperation.
Managing relationships with third party service providers, including negotiation of contract language.
Maintaining up-to-date knowledge of the Information Security industry, including awareness of innovative information security solutions/processes, emerging standards, and new threat vectors by reading professional publications, maintaining personal networks, and participating in professional organizations.
Required Skills:
Strong interpersonal communication skills, analytical abilities, detail focused, quality focused, and problem-solving skills, as well as broad knowledge of business functions, information technologies, and security and compliance practice on a global level.
A demonstrated ability to integrate various information security, network and data protection technologies and controls into a cohesive solution that sufficiently mitigates risk.
Long Description Required
Experience:
Demonstrated experience in enterprise solutions and implementation of technology and process solutions to reduce the potential risk of data compromise and network viability.
Significant experience in information security, including hands on experience in SIEM, Email Security, and Endpoint Security tools, Threat Intelligence platforms, and potentially additional experience in forensics, offensive/defensive technologies, intelligence gathering, and/or reverse engineering.
Proven working experience in Security Analysis, Threat Intelligence, Email Security, and/or Endpoint Security.
Demonstrated experience in delivering comprehensive solutions to complex security issues on a global scale.
Confidence in leading diverse matrix teams independently, making decisions daily as it relates to the successful delivery of the program.
Ability and insight to know when critical decisions must be raised to senior level and/or business unit management quickly to ensure that the program remains on track.
Strong knowledge of Threat Intelligence frameworks (e.
g.
MITRE ATT&CK).
10
years of demonstrated Information Security experience.
Preferred:
Bachelor's and/or Master's degree in Information Security, Computer Science, Engineering, Technology or a related technical field.
Preferred:
CISSP or similar information security certificate (e.
g.
CRISC, CISA, CEH, CISM).
Preferred:
Experience in pharmaceuticals, manufacturing, or other regulated industries.
Leadership Behaviors DRIVE INNOVATION.
Generate new/unique solutions and embrace new ideas that further secure our business.
OWN.
Deliver results, creating value for our brands, our systems, our customers, and our key stakeholders.
INSPIRE OTHERS.
Inspire people to deliver our mission and vision, demonstrate passion, and enable our customers to believe in our vision too.
COLLABORATE.
Enhance Information Security team accomplishments and competency by supporting/mentoring less experienced team members, teaching improved processes, and managing engineers, outsource vendors, partners, auditors, and other persons tasked with maintaining Information Security.
We are IFF.
We are the catalyst for discoveries that spark the senses and transform the everyday.
IFF is a leading innovator of sensorial experiences that move the world.
At the heart of our company, we are fueled by a sense of discovery, constantly asking what if? That passion for exploration drives us to co-create unique scents and tastes in fine fragrances and beauty, detergents and household goods, as well as beloved foods and beverages.
Our thousands of team members globally take advantage of leading consumer insights, research and development, creative expertise, and customer intimacy to develop differentiated products.
Nearest Major Market:
New Jersey Recommended Skills Agility Analytical Architecture Automation Business Requirements Certified Ethical Hacker Estimated Salary: $20 to $28 per hour based on qualifications.

  • Type: Other
  • Company: International Flavors and Fragrances

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.