7 Eagle Group

Cybersecurity Threat Intelligence Program Manager - Up to $100K - Remote|Washington D.C.

Full Time


PLEASE NOTE: You will need to register and create an account to apply online or send a resume. If you need help, please send an email to Lucy. If you already have an account, click here to login.


The Cybersecurity Threat Program Manager leads a comprehensive cyber threat management program across the enterprise; and develops and leads the activities related to detection, correlation, and analysis of internal and external cybersecurity threats to institutional assets, data, systems, and infrastructure.
Please apply online
This position is a hybrid role, so the candidate must reside within a one-hour radius of Washington, DC.

Cyber threat coordination occurs across departmental units to ensure those parties responsible and accountable for data are kept consulted and informed. The Program Manager collaborates as needed with multiple stakeholders, including human resources, system and data owners, legal, physical security, SOC/CIRT, and technology support groups.

They apply their technical competence and business acumen to foster and maintain strong relationships with departmental units, as well as their constant up-to-date familiarity with cyber threat tactics, techniques and procedures (TTPs) across all lines of business in complex environments.

Work Interactions  
Reporting directly to the Director of the Cybersecurity Operations Center, the Cybersecurity Threat Program Manager an essential member of the University cybersecurity team.
Because the CSOC Director contributes to the organizational cybersecurity strategy and roadmap, the Cybersecurity Threat Program Manager serves as a high-level advisor, and is an excellent facilitator, partner, and communicator at both the staff and the leadership levels.

Candidate Qualifications  
Capability of working with diverse teams and promoting an enterprise-wide positive security culture
Ability to organize, prioritize, and complete tasks within defined SLAs
Excellent judgment and the ability to make quick decisions when working with complex situations
Self-starter requiring minimal supervision
Outstanding written and verbal, business and cybersecurity communication skills
Highly organized and efficient, with strong project management, multitasking and organizational skills
Demonstrated understanding and comprehension of a wide range of network and host cybersecurity solutions
Ability to motivate teammates to achieve excellence and willingly share knowledge
Ability to maintain a high degree of integrity, trustworthiness and confidence; and to represent the organization and its management team with the highest level of professionalism
Trustworthy and leads by example for others to follow
Track record of successful personnel management

Position Requirements
Experience managing a cyber threat program
Excellence in communicating business risk from cybersecurity topics
Strong understanding and demonstrated use of best practices following NITTF, NIST and CERT guidance
Proficiency with driving measurable improvement in detection and response capabilities at scale.
Experience managing SIEM, UEBA, IAM, vulnerability management, data loss prevention (DLP), threat intelligence, MITRE ATT&CK framework mapping, security orchestration automation and response (SOAR), and other network and system monitoring tools
Experience supporting investigations using formal chain-of-custody methods, forensic tools and best practices
Proficiency with security analytics and threat data management
Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating well
Highly-effective, action-oriented communication up and down the leadership scale
Analytical and problem-solving mindset
Strategic and tactical thinking, along with decision-making skills
Understanding of one or more of the following: ISO 27001, NIST, PCI, HIPAA/HITECH, FERPA, GDPR, CIS
Benchmarks, NITTFExperience
At least 5 to 7 years of cybersecurity experience (or information technology coupled with cybersecurity), with at least 3-5 of those years in a threat intelligence or incident response practitioner role, and including a) 5+ years of cybersecurity or information technology practitioner experience; and b) 3+ years of threat intelligence experience.
At least 2+ years cloud computing – for example, Amazon Web Services, Google Cloud Platform or Microsoft Azure) – preference for security configuration experience
Advanced familiarity with Tenable, Qualys, and/or CrowdStrike

Education  
Bachelor's degree in computer science, information assurance, MIS or related field, or the equivalent (preferred but not required)

Preferred certifications
CISSP
SANS
CERT ITPM and/or ITVA (current or willingness to obtain)

Benefits:
Includes medical, dental, vision, disability and life insurance, retirement savings, tuition assistance, work-life balance benefits, employee discounts, and an array of voluntary insurance options.

Please apply online
Our Recruiting Manager, Kiko San Pedro, will review your application immediately!
If there is a mutual interest, we will respond within 48 hours to tell you all about the hiring company and answer any questions so you can determine if this is a career you'd like to pursue.
Feel free to follow up if you don't hear back within two business days by emailing [LOGIN BELOW TO APPLY]

Cybersecurity Threat Intelligence Program Manager - Up to $100K - Remote|Washington D.C.