Cyber Security Operations Manager

Telesure Investment Holdings

Gauteng, South Africa

Permanent

Oct 3

The Cyber Security Operations Manager role forms part of the TIH Cyber Security Team, and will be responsible for providing direction, planning, overseeing execution, analyzing and measuring, and reporting on dedicated cyber security operations function. This includes ensuring centralized and dedicated cyber security technologies and operations functions operate at the right level of maturity, are effective and optimized; operations functions adequately support TIH's cyber security outcomes; operations functions produce relevant measurements and metrics to support TIHs cyber security decisions; and operations functions continue to mature and adequately adapt to the changing threat landscape. Operations ManagementOversee an operational area with guidance from senior colleagues. Could involve responsibility for development or delivery (or both). Provide input, participate and collaborate on cyber security related projects, specifically within the technology domain, towards ensuring appropriate operations representation and to allow for more seamless operationalization and handover. Assist in establishing and generating mature cyber security operations metrics and indicators. Report on key cyber security operations metrics and indicators to management, the executive and relevant oversight forums. Implement improvements and continuously mature cyber security operations functions.Information SecurityDefine business impact of security incidents and identify and drive recommendations for change to prevent similar incidents. Take ownership of and drive maturity of information and cyber security operations within TIH, and specifically as it pertains to centralized operation of cyber security technologies and activities directly related thereto. This includes technologies across the following areas, whether on-premise or cloud hosted such as Internet and dark web cyber threat exposure; network security; endpoint security; identity and access management; application security (proactive and reactive technology protections); vulnerability management; data security; cyber security incident detection and response; and manage, maintain and oversee administration of various cyber security technology components and systems and keep in operating order.Operational ComplianceMonitor and review performance and behaviors within area of responsibility to identify and resolve non-compliance with the organization's policies and relevant regulatory codes and codes of conduct. Ensure, through appropriate planning, execution, oversight of implementation and management of centralized and dedicated operations, TIH is able to appropriately identify, protect, detect, respond and recover to cyber security threats. Additionally, this role should strengthen TIHs prediction capability, where possible, as a lead-in to further enhancing and optimizing said lifecycle.Policies and Procedures DevelopmentDevelop policies, procedures, and related guidelines for an important area of responsibility within a function, ensuring compliance with external requirements and integration with the broader functional policy framework. Collaborate with risk, compliance and forensic functions to ensure that; controls comply with various internal and external requirements, cyber risks are measured, managed and communicated, and digital forensic capabilities are maintained and improved. Take ownership of, manage and optimize operation of dedicated and centralized cyber security technology. This includes establishing relevant structures, operating procedures and other mechanisms to ensure consistent execution, quality outcomes and alignment to TIH security governance and international best practice. Participate and positively contribute to governance forums, committees or groups within TIH.Stakeholder EngagementIdentify and manage stakeholders up to management level, finding out their needs/issues/concerns and reacting to these by leading and coordinating the development of stakeholder engagement plans to support the communication of business information and decisions. Build and maintain relationships with teams and areas within TIH towards ensuring collaboration and overall successful functioning of cyber security operations across the organization.Horizon ScanningIdentify new external developments and / or emerging issues within an area of technology or business function and evaluate their potential impact on, or usefulness to, the organization. Have a clear and sound understanding of the information security operationslandscape, both current and as it continues to evolve. Collaborate with the Information Security Architecture function around strategic cyber security technology selection and investment, or technologies with an impact on cyber security.Analysis of "As Is" and "To Be"Document complex "as is" and "to be" processes and describe the changes required to migrate to the "to be" capability to record accurately the change required. Maintain visibility of emerging information and cyber security threats and trends and adjust operations activities to best defend against such threats. Participate in and provide leadership and direction during cyber security incident response activities, as well as provide post-incident reporting and root cause analysis.Business Requirements IdentificationCollect business requirements using a variety of methods such as interviews, document analysis, workshops, and workflow analysis to express the requirements in terms of target user roles and goals.Insights and ReportingPrepare and coordinate the completion of various data and analytics reports. Identifying and interpreting complex patterns and trends, and translating those insights into actionable recommendations. Design and perform appropriate metrics that will enable monitoring, diagnosing, and correcting performance issues.Leadership and DirectionCommunicate the actions needed to implement the function's strategy and business plan within the team; explain the relationship to the broader organization's mission, vision and values; motivate people to commit to these and to doing extraordinary things to achieve local business goals. Provide leadership and effectively run the centralized and dedicated cyber security operational team(s).Provide direction and leadership, contract and engage, maintain oversight of, and manage relationships and output of service providers, providing cyber security operations functions. Provide cyber security operations leadership and direction, including in the context of cyber security related forums and groups within TIH.Performance ManagementDevelop and propose own performance objectives; take appropriate actions to ensure achievement of agreed objectives, using the organization's performance management systems to improve personal performance. OR Manage and report on team performance; set appropriate performance objectives for direct reports or project / account team members and hold them accountable for achieving these, taking appropriate corrective action where necessary to ensure the achievement of team / personal objectives.Building CapabilityImplement the formal development framework for a team, with guidance from senior colleagues. Provide informal coaching to others throughout the organization in area of expertise. Grow, upskill, manage and mentor the operations team members to ensure skills and capabilities continue to mature with an evolving threat landscape.

Apply for this position Back to job

You must be logged in to apply for this job.

Apply

Your application has been successfully submitted.

Please fix the errors below and resubmit.

Something went wrong. Please try again later or contact us.

Personal Information

Profile

View CV

Details

{{notification.msg}}