Security Job – Director Cyber Security / NERC CIP Solutions & Business Development

Job Type: Full-time employee
Job Location:  Either TX or could be based anywhere USA. Call for details
Compensation: Base of $120,000 up to mid $100,000 plus bonus.  (Call for details)
Telecommute: Possibly –  this is an option for the right candidate.
Education: Strongly prefer a BS Degree. MBA a plus
Travel %: 30%
Relo Paid: Yes – case by case basis
Status: US Citizen or Green Card – Sorry, no Visa Sponsorship
Insurance / Benefits:  Available day one
SecurityHeadhunter.com, a Security Search Firm, has been engaged to conduct an exclusive search for a Director Cyber Security / NERC CIP Solutions & Business Development. My global reaching client is a leader in providing innovative software solutions and services to industrial facilities worldwide. Their software solutions and services not only improve Human Reliability, but enhance regulatory compliance, increase safety and improve facility profitability. My client, who has a reputation of engineering several industry first solutions, has now developed a very unique NERC CIP / cyber security solution that will truly improve a company’s ability to be in compliance with their Security & NERC CIP regulations, and other guidelines in a much more effective and time efficient manner.

The candidate I seek will have a solid Cyber Security background coupled with both a solid understanding of NERC CIP. They will also be someone who is engaged in  and business development experience to be able to help drive my client’s cyber security solution to the power industry and other markets from a technical and business platform.  Having experience with automation such as SCADA, DCS, PLC is a plus.

Role Description

In this role, you will have responsibility to further define and market this unique cyber security solution.  Tasks will include:

  • Assisting / leading development of a business plan and marketing plan to educate the market on this unique solution.
  • Determine software and services requirements for the solution to be delivered.
  • Work to become a recognized industry expert on Cyber Security and NERC, attending multiple trade group related events and so forth.

Qualifications

The successful candidate should have the following qualifications:

Minimum 5 to 10 years experience in the field of cyber security, with solid experience in NERC CIP and business development.

  • Prefer a 4 year Bachelor degree in related technical field (Computer Engineering, Electrical Engineering, Computer Science, etc.).  MBA a plus but not a requirement
  • Preference will be given to candidates with automation experience (DCS, PLC, SCADA, etc.)
  • Excellent written and verbal communication skills, experienced in delivering technical presentations to industry groups.
  • Experience in both technical “hands-on” work, as well as business roles (sales, marketing, business development, etc.).

To confidentially discuss many more details of this position, please contact Wils Bell directly at 407-365-2404 or email a confidential resume to: Bell@SecurityHeadhunter.com

Wils Bell
President
SecurityHeadHunter.com

POB 620298 * Oviedo, FL32762
Direct: 407-365-2404
Bell@SecurityHeadhunter.com l SecurityHeadhunter.com

 

Follow me on Twitter for the latest news, jobs, and breaches.

Security Breaches & Security News

To follow Security Breaches and Security News throughout the day, follow me on Twitter

Council data breaches increase by ‘alarming’ 1,600 per cent

BMO Harris warns customers after laptop stolen

Bank vs. Customer Claims Rejected

Cyber-espionage Mahdi virus spreads further in Middle East

Hacker collective leaks one million records, vows ‘hellfire’

Frankenstein malware: a monster stitched together from trusted code

Virus on virus – set a thief to catch a thief

Oracle Releases Fix For Java CVE-2012-4681 Flaw

Latest SAP Security News

How Do You Change an Unhealthy Compliance Culture?

Link spotted between Wiper virus and Stuxnet, Duqu

Kaspersky looks at the wreckage of Wiper malware

More password problems from Windows Registry

Survey Tracks Security’s ‘Bad Mood’ Trend, Need for Improvement

Researchers Identify Second New Java Bug

Second LulzSec Member Arrested for Sony Pictures Attack

Analysis Shows Traces of Wiper Malware, But No Links to Flame

REALLY – Most firms do not protect sensitive data in databases, survey finds

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches & Security News

Follow me on Twitter @Security_REC for news, jobs and…

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Security Job: AVP Infosec

 

AVP Information Technology Security

 

Job Type: Full-time employee

Job Location:  Boston, MA area

Compensation: Base of mid $100’s plus bonus plans. (call for specific details)

Telecommute: No

Education: BS Degree and a Masters is a plus

Travel %: minimal

Relo Paid: Yes – case by case basis

Status: US Citizen or Green Card – Sorry, no Visa Sponsorship

 

 SecurityHeadhunter.com, a Security Search Firm, has been selected to conduct a search for a top shelf AVP candidate to manage the Security Operations Center (SOC) for a fortune 500 organization.

As the selected candidate, you will have knowledge of INFOSEC best practices and be responsible for overseeing the overall state of security for the organization and for working with management to ensure that INFOSEC objectives are aligned with corporate risk tolerance and strategic goals. You will also be responsible for developing and keeping up to date security policies and procedures to ensure operational compliance.

You will need a minimum of 8+ years of IT experience with at least 5 years developing and implementing security policies / best practices within a multi-platform environment. You will need good project management skills and excellent oral and written communication skills. Managing staff for at least 4 years in technical leadership roles is required.

Additional responsibilities and duties include:

  • Managing and mentoring a staff (2 direct and 25+ indirect) and developing them for future growth within the security department in additional to conducting performance appraisals, interviewing and proper discipline.
  • As relate to the needs of the SOC and OGC (operational governance groups), oversee the development and management of RFP’s, expense budgets and business plans.
  • Contributing to the design, maintenance and execution of Corporate Security Policy and Incident Response Plans.
  • Reporting on the state of Security of the computing environment to the executive level.
  • Must be knowledgeable of INFOSEC systems including SIEM platforms, firewalls, virus protection and vulnerability testing.
  • Must be knowledgeable in a broad range of technologies including OS, mainframes, mid ranges and client server.
  • Must be knowledgeable in SOX and PCI and understand how to deal with regulators when needed.
  • Must be able to make appropriate recommendations (and coordinate implementation) on the design / purchase of security tools to be utilized by the SOC, Operational Governance and the Security Intelligence groups.
  • Directing and creating remediation priorities based on level of vulnerability / scope of impact.
  • Implementing policies that will ensure there are correct levels of scanning, monitoring, and incident response when needed.
  • Developing procedures which will ensure there is as minimal impact and disruption to business operations and systems during any remediation of vulnerability issues.
  • Providing the appropriate direction and methodology for forensic analysis and reporting.
  • Developing and implementing security standards and procedures for controlling access / authentication to many systems and applications.
  • Must maintain or create procedures to continually evaluate security administration standards and procedures to ensure compliance with best practice standards and audit requirements.
  • Ability to partner with other departments and groups to understand the user needs for access to corporate data and applications and ensuring that data has been appropriately classified as public, private, sensitive, or confidential.
  • Reviewing and evaluating projections on the needed resources for INFOSEC projects (i.e. capital costs, FT staff, contractors, etc.)
  • Reviewing and prioritizing INFOSEC projects portfolio.
  • Partnering and/or working with other IT groups to secure participation from key people /contributors from other departments and notifying senior management for additional resources. Allocating resources as needed to support strategic company goals.
  • Collaborating and working with other departments (App Dev, Systems, Infrastructure, Architecture, etc) to clarify INFOSEC expectations for securing systems to ensure adherence to policies and standards.

To be considered for this position, please contact Wils Bell directly at 407-365-2404 or email a confidential resume to: Bell@SecurityHeadhunter.com

Wils Bell
President
SecurityHeadHunter.com

POB 620298 * Oviedo, FL32762
Direct: 407-365-2404
Bell@SecurityHeadhunter.com l SecurityHeadhunter.com

 

 

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Security Breaches & Security News

To follow Security Breaches and Security News throughout the day, follow me on Twitter 

Massachusetts hospital to pay $750,000 for 2010 data breach

Senator wants more info on data breach at federal government’s retirement plan

Malicious PowerPoint File Targeting Flash Player Vulnerability

California IT technician sentenced to nearly five years for identity theft

Survey Shows Consumers Still Openly Risking ID Theft

Linkedin Hacked: A Few App Suggestions For Protecting Your Online Passwords

LinkedIn Investigating Password Leak That Could Affect 6.5 M

Top 4 Malware-Related Issues for 2012

What’s the Meaning of This: Flame Malware

DHS To Critical Infrastructure Owners: Hold On To Data After Cyber Attack

Hackers Don’t Like to Work Weekends

Serco: ‘Sophisticated’ Attack On U.S. Govt. Pension Plan Nets Info On 123k

N.J. Mayor, Son Accused of Hacking Political Web Site

Company Fined for Distributing Malicious Android Apps

WHMCS victim of social engineering; over 500,000 client records stolen, deleted from server, and dumped publicly

IXESHE Malware Avoids Easy Detection to Remain a Persistent Threat

FBI Tells You Everything You Wanted To Know About Online Frauds But Were Too Afraid To Ask

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Latest Infosec News

Follow my Twitter feeds for daily breach and security news.

Researchers uncover causes of MilitarySingles.com hack

NASA denies Iranian cyberattack

Absinthe 2.0 Jailbreak for iOS 5.1.1 Devices Released

New York Lawmakers Want Anonymous Comments Banned

FBI Warns Top Firms Of Anonymous Protest Hacks on May 25

The Virtual Sky is Falling!

Internet Fraudster Back in US After Being Fugitive for 12 Years

Join the Fight Against Cyber Spying Proposals in the Senate   

UK’s new cookie law came into effect Sunday

Yahoo and TalkTalk confirm human error as weakness security link

Flame proves cyberwarfare is active

Why Boards of Directors Don’t Get It

Mass. Hospital Pays Breach Settlement

Insider Case Exposes Security Lapses

Fighting Hackers With Public Relations

Olympic-themed spam emails carries malicious PDF  

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Where’s that document I signed?

Several years ago when you started that new position it was a very exciting time.  That first  morning down in Human Resources getting ready for your orientation and filling out and signing paperwork.   There was the health insurance paperwork,  the life insurance paperwork, the tax withholding paperwork, the retirement account paperwork, and perhaps  the employee conduct handbook. Was there anything else that you signed?

Hey, what about that Non Compete Agreement / Non Disclosure Agreement paperwork. Did you sign one of those also? Chances are you did, but what exactly did it say?

Now, fast forward to present day. Do you know where your signed copy of your agreement is located? Just what were those restrictions or limitations you’re subject to if /when you leave this employer.

According to a lot of people I have asked that question to recently, very few people know the exact location and can put their hands on the agreement today. Some folks have no idea where it is or did they even keep a copy, while others think maybe they might be able to  find it, but aren’t sure.

These type agreements should be considered a very important document to you for many reason.

Most people who know exactly where it is , simply scanned it after they took it home and it’s on the hard drive AND backed up. Others have it in the safety deposit box. It doesn’t really matter where you keep it as long as it is safe and you can put your hands on it when needed.

Having to call your employer’s HR department and ask for a copy just might alert someone as to your career plans.

The point of this whole article is that it only takes you a minute to save your signed agreement securely so you’ll be able to access if and when the times comes. It could and can save you a lot of headaches and other issues down the road when you decide it is time for a change and you need to know just what it says.

Just my 2 cents worth.

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)