Cybersecurity Technical Account Manager

Service Delivery Mettawa, Illinois


DOT Security Logo

DOT Security’s mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. DOT Security will implement processes, technology, and provide subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, DOT Security will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.

DOT Security is seeking team members to fill the role of Technical Account Manager (TAM). Individuals will have the opportunity to join based on their knowledge and skills demonstrated during the interview process including testing. DOT Security has developed a career progression path, that challenges our team to grow as cybersecurity professional consultant knowledge and providing excellent customer service as a member of the DOT Security – Services team.

As a TAM, you will act as a Cybersecurity Manager for DOT clients. 

The role of the TAM is challenging and rewarding. It requires a business acumen and effective communication skill set. The ability to communicate highly technical concepts to non-technical users is critical to client success. 

The Technical Account Manager is not a remote position. The TAM is required to be on-site at the DOT Security Operations Center.


  • Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.
  • Collect and maintain data needed to meet system cybersecurity reporting
  • Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. 
  • Facilitate security improvement actions are evaluated, validated, and implemented as required.
  • Facilitate cybersecurity inspections, tests, and reviews are coordinated for the network environment.
  • Confirm that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
  • Review and recommend improvements of baseline security safeguards are appropriately installed.
  • Identify information technology (IT) security program implications of new technologies or technology upgrades.
  • Interpret security requirements relative to the capabilities of new information technologies.
  • Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program.
  • Align and recommend information technology (IT) security priorities with the security strategy.
  • Review the monitoring of information security data sources to maintain organizational situational awareness.
  • Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.
  • Oversee the information security training and awareness program

Things We Are Looking For

  • Computer networking concepts and protocols, and network security methodologies.
  • Risk management processes (e.g., methods for assessing and mitigating risk).
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Applicable business processes and operations of customer organizations.
  • Resource management principles and techniques.
  • Supply chain risk management practices (NIST SP 800-161)
  • Critical information technology (it) procurement requirements.
  • Creating policies that reflect system security objectives.
  • Determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Evaluating the trustworthiness of the supplier and/or product.
  • Apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • Integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).
Other Desire Attributes
  • Public Trust background check (Limited Requirement).
  • Must be able to do some light lifting.
  • College degrees may be a substitute for up to two years’ experience for Bachelor’s degrees. 4 Years for master’s degrees.


  • 20 days of PTO
  • 12+ paid holidays
  • Flexible Sick Day Policy
  • Paid Maternity & Paternity Leave
  • Comprehensive Health, Disability Life, Dental and Vision Plans
  • 401(K) match & retirement plans
  • Student Loan reimbursement
  • On-going training & development opportunities