Manager, Threat Intelligence

Software Engineering Overland Park, Kansas Yarmouth, Maine Troy, Michigan Plano, Texas


Description

The Manager, Threat Intelligence Operations is responsible for overseeing the processes and personnel that research, correlate, curate and produce cyber threat intelligence for Tyler.  The threat intelligence manager is expected to possess in-depth knowledge relating to one or more of the domains of responsibility for the Cyber Threat Intelligence Team.

Responsibilities

  • Oversee cyber threat intelligence team members that …
  • Provide regular reports to management regarding existing or potential risks to Tyler business operations.
  • Delegate responsibilities and assignments to team members.
  • Manage vendor relationships.
  • Assist in Corporate Security policy development
  • Assist in planning, architecture, implementation, documentation and maintenance of security standards for IT infrastructure components
  • Support internal customers and employees with security related matters
  • Provide support in threat intelligence and incident response activities
  • Assist in the development of security awareness program
  • Support the Senior Director of Information Security in the definition and communication of the cyber threat intelligence services.
  • Perform the planning, architecture, implementation, documentation and maintenance of security tools and procedures to support the cyber threat intelligence services.
  • Identify and recommend new techniques, capabilities and tools related to expanding the cyber threat intelligence capabilities.
  • Develop and maintain a multi-year plan or concept of operations plan for the cyber threat intelligence services and communicate this plan to the Senior Director of Information Security and CSO.
  • Support the Senior Director of Information Security with the annual budgeting process as it relates to application security services.
  • Interview portals and assess the delivery of the cyber threat intelligence services to determine if the services are meeting the needs of the consumers of those services.

Qualifications

  • Bachelor’s degree in IT, Cybersecurity, or related area of study, or comparable work experience
  • Certified Information Systems Security Professional (CISSP)
  • Additional certifications such as CEH, GPEN, GWAPT, GCFA, etc. are preferred
  • SANS FOR-578 and the accompaning CIAC certification or their equivalent are highly desirable.
  • Formal training as an intelligence analyst in any discipline – graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, DHS BITAC (Basic Intelligence and Threat Analysis Course), etc. is highly desirable.
  • Typically requires 10+ years of related job experience in Information Systems security including leadership experience in team development and growth
  • Solid knowledge of the following:
    • Perimeter Security (firewalls, intrusion detection, etc.).
    • Application Securityo   Vulnerability Assessments
    • Penetration Testing Methodologies
    • Operation systems hardening
    • Malware Detection and Antivirus
    • Regulatory compliance: PCI-DSS, SOX, HIPAA
  • Strong UNIX (Linux, Solaris, etc.) and Microsoft Windows skills
  • In-depth familiarity with Internet communication protocols (HTTP, SMTP, TCP/IP, etc.)
  • Knowledge of security configuration methods and procedures for hardware and O/S components Excellent communications skills, including good verbal and written abilities
  • Strong organization, prioritization and management skills
  • Self-motivated and strong sense of accountability
  • A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.
  • An understanding of how to effectively lead teams within fast paced, ever-changing cyber operations environments
  •  A forward-thinking view of how Tl processes and systems integrate across an organization to drive cyber operations by providing situational awareness of and enabling active defense against cyber threats.
  • On call and after-hours duties, as requested

The Manager, Threat Intelligence must be able to:

  • Build rapport with division leadership while actively influencing events and negotiating changes to achieve project goals.
  • Handle the people aspect of threat intellicence team leadership.
  • Oversee multiple projects with hard deadlines.
  • Work collectively with management and team members to drive security initiatives forward.
  • Ensure detailed documentation, diagrams or reference architecture are provided.