Jobs

Manager, Threat & Vulnerability (Remote)

United States (U.S.)United StatesNorth AmericaApril 30, 2024

Company Overview

ID.me simplifies how people securely prove and share their identity online. The company empowers people to control their data through a portable and trusted login, which means they don’t need to create a new password when visiting sites that have the ID.me button.

The COVID-19 pandemic accelerated digital migration for many critical services. Those services require a trusted identity to safeguard against fraud and help ensure people are who they claim to be. With ID.me, login and identity credentials move with people, which can reduce the time and frustration of having to verify at multiple sites and set up multiple passwords.

ID.me is a credential service provider compliant with federal standards for digital identity verification. 

In addition to helping people control their credentials and data, the company’s “No Identity Left Behind” initiative strives to expand access and inclusion for all people. The company offers multiple pathways to verification – online self-serve, live video chat agents, and in person. ID.me is passionate about building a robust identity network that does not compromise access for traditionally underserved groups.

Role Overview

ID.me is looking for a Manager of Threat and Vulnerability. This role reports to the Director of Cybersecurity and is responsible for the development, management and execution of Threat Intelligence and Vulnerability Management functions. This role will oversee the staff, processes and infrastructure that provide Vulnerability Management and Threat Intelligence services to the organization. This role will be responsible for driving intelligence driven defenses throughout the organization, ensuring that cyber risk is effectively communicated, prioritized and addressed in accordance with business objectives. 

Responsibilities

  • Manage team of security experts and provide hands-on expertise over the areas of Cyber Threat Intelligence and Vulnerability Management
  • Manage security efforts including but not limited to, patch management, configuration management, vulnerability management, and risk management
  • Build and maintain an effective threat ingestion and analysis function to support an intelligence driven defense operation; ensuring that all relevant sources of information are collected, correlated, analyzed and ingested into monitoring workflows for context and prioritization
  • Ensure technical and operational security controls are incorporated into new systems and applications through participation in planning groups and the review of new systems, installations and other major changes
  • Review and propose changes to systems and processes in order to drive proactive ongoing risk mitigation. Recommend appropriate threat mitigation and remediation steps
  • Contribute to the development of security policies, procedures, guidelines, and best practices used to ensure company compliance
  • Engage with Information Sharing and Analysis Centers (ISACs) and other external sources stay abreast of emerging trends and best practices within the community of network and security professionals
  • Assist in the development of key security objectives and corresponding strategic plan to safeguard the company’s computer systems and data
  • Assist in the support of internal and external audits and risk assessment activities, including any required remediation of audit issues or mitigation of risk
  • Establish and maintain management reporting, through the use of metrics and KPI’s on the effectiveness of Threat Intelligence, Vulnerability and Patch Management programs

Ideal Qualifications

The qualifications below are ideal, but not all are required.  We encourage candidates to apply if they satisfy some, but not all of the qualifications.

  • 3+ years of experience directly managing a team of security professionals
  • 7+ years of experience in information security
  • 3+ years of experience supporting a Vulnerability Management Program, Cyber Threat Intelligence, Security Operations Center (SOC) or similar
  • Hands-on experience with SIEM and centralized logging technologies (e.g. Splunk, Elastic, etc)
  • Hands-on experience with Threat Intelligence Platforms and Vulnerability Scanning tools. 
  • Strong capabilities leveraging scripting languages to automate work or build features (Bash, Python, and/or Ruby)
  • Experience securing cloud environments such as AWS, GCP, and/or Azure
  • Ability to work core EST hours 
  • Must have ability to influence, advise and collaborate with cross-functional groups such as IT, DevOps, Software Engineering regarding risk analysis and patch management.
  • Working knowledge of Infrastructure Security Concepts (Firewalls, DMZ’s, Intrusion Detection / Prevention Systems, Network Security, Cloud Security, End Point and mobile).
  • Working knowledge of Application Security Concepts (Identity Management, Password Management, RBAC, provisioning, decommissioning, data and code security management).
  • Knowledge of Data Protection Policies, Procedures and Products (Privacy rules & regulations, data security, encryption, digital rights management, Data Loss Prevention).
  • Working knowledge of IT Security Concepts (Disaster Recovery, Penetration/Vulnerability Assessment, Task Organization, Role Segregation, Role Engineering, Security Centric QA).
  • Strong Analytical/Organizational/Time Management skills. Must be able to quickly conceptualize and explain new methods, processes and procedures for practical application.
  • Strong Interpersonal and Communication Skills. Must be able to explain complex systems and technical topics to others who may have minimal technical knowledge using Oral, Written and Visual presentations.
  • Must be self-directed, with the ability to work within and manage a remote workforce.
  • Bonus: Experience with Information Security Compliance, (SOC, FedRAMP, ISO, etc)
  • Bonus: Industry security certifications, such as CISSP, CISM, or related

Ideal candidate will thrive in the following culture:

  • Must have an obsession for data and Intelligence Driven Defenses
  • Ability to thrive when there are changing priorities and shifting of gears
  • Strong oral and written communication skills
  • Must be a team player with a strong, self-managing work ethic
  • Must be a self-starter with a passion for learning and continuous improvement

Note that candidates must be located in the continental U.S.

#LI-JS1

#LI-REMOTE

Cyber Security Jobs by Category

Cyber Security Jobs by Location

Cyber Security Salaries