Manager, Threat Operations at Ivanti

We are redirecting you to the source. If you are not redirected in 3 seconds, please click here.

Manager, Threat Operations Ivanti. . Who We Are:. . . In today’s work environment, employees use a myriad of devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. . . While our headquarters is in the U.S., half of our employees and customers are outside the country. We have 36 offices in 23 nations, with significant offices in London, Frankfurt, Paris, Sydney, Shanghai, Singapore, and other major cities around the world. . . Ivanti’s mission is to be a global technology leader enabling organizations to elevate Everywhere Work, automating tasks that discover, manage, secure, and service all their IT assets. Through diverse and inclusive hiring, decision-making, and commitment to our employees and partners, we will continue to build and deliver world-class solutions for our customers. . . Our Culture - . Everywhere Work Centered Around You. . . At Ivanti, our success begins with our people. This is why we embrace Everywhere Work across the globe, where Ivantians and our customers are thriving. We believe in a healthy work-life blend and act on it by fostering a culture where all perspectives are heard, respected, and valued. Through Ivanti’s Centered Around You approach, our employees benefit from programs focused on their professional development and career growth. . . We align through our core values by locking arms in collaboration, being champions for our customers, focusing on the outcomes that matter most and fighting the good fight against cyber-attacks. Are you ready to join us on the journey to elevate Everywhere Work? . . Why We Need you!. . . As part of the leader of the US Threat Operations team, you will work with Threat Operations analysts to help defend Ivanti and its resources from threats foreign and domestic, enforce safe computing standards and policies, and be part of larger incident response teams as well as support Threat Operations daily activities and functions. . . The primary focus of this position in Information Security is to lead, coordinate, and inspire a blue team of various experience and skills levels and collaborate with internal stakeholders, IT, and product engineering teams to present a unified security posture to our customers and the world. You will be expected to lead and mentor analysts and staff and act as a subject matter expert in conjunction with other Threat Operations and Infosec managers. . . What You Will Be Doing:. . . . . Oversee Threat Operations US staff during US business hours. . . . . Manage analyst performance and metrics for the Threat Operations US staff. . . . . Collaborate with other Information Security management to help achieve departmental goals and design objectives. . . . . Respond to and act as an escalation point for security notifications from our internal monitoring tools, users, and MSSP and implement an appropriate containment and remediation response to the threat. . . . . Manage our relationship with our MSSP/MDR vendor to provide feedback and ensure services evolve along with the needs of the organization and threat landscape. . . . . Monitor . cloud. and physical environments for security incidents, assess their severity, and initiate the incident response process. . . . . Participate in and lead incident response teams, as required. . . . . Lead the Digital Forensic & Investigations Team in high tech investigations in the form of electronic evidence, computer forensic analysis, e-mail analysis, data recovery and network assessments in support of our Legal, Talent, Confidentiality, and Insider Threat organizations. . . . . Assist in post-incident analysis and documentation to improve incident response processes. . . . . Update and maintain documentation, including . Incident Response. playbooks, tooling documentation, etc. . . . . Perform testing and tuning of detection and response security tools, EDR, Spam, IPS/IDS, and other security tools. . . . . Create detection and alerting content for various security tools based upon current events, research, and personal knowledge. . . . . Support the implementation of new security tools, as required. . . . . Participate in hypothesis-driven threat hunting exercises using existing and alternative toolsets. . . . . Perform research on emerging threats and update detection rules, threat models, and other tools. . . . . Support audit and verifications projects to ensure detection/response tools and vulnerability management tools to verify systems are operating appropriately. . . . . Support compliance and audit teams in standards-based audits and evidence gathering to maintain Ivanti’s various certifications. . . . . Act as a mentor for other analysts in learning new skills and growing their careers. . . . . Self-direct and operate with reduced oversight in day-to-day tasks. . . . . Observe day-to-day operations and devise and implement improvements to processes and technologies that increase our efficiency and security. . . . . Evaluate new technologies and processes that enhance security capabilities. . . . . Collaborate with cross-functional teams to prioritize and address identified vulnerabilities and other security issues. . . . . Stay updated on the latest trends and developments in cloud security and related technologies and teach others about them. . . . . Organize and lead hypothesis driven threat hunting exercises using existing and alternative toolsets. . . . . Manage, share, and generate threat Intelligence on relevant threat groups. . . . . Contribute to metrics to verify the program is operating correctly. . . . . To Be Successful in The Role, You Will Have:. . . . . Experience leading a team of differing skill levels with a mission of multi-discipline approaches to blue teaming. . . . . An understanding of cloud computing concepts and a familiarity with major cloud platforms such as AWS and Azure. . . . . An interest in solving puzzles and problems in unconventional ways. . . . . Familiarity with common security vulnerabilities, threats, and attack vectors. . . . . . . Some experience with security tools such as vulnerability scanners, . SIEM. , IDS/IPS, EDR and antivirus systems. . . . . Some knowledge of scripting languages (e.g., Python, PowerShell) to automate the boring stuff. . . . . . . At Ivanti, we are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and teammates without regard to race, color, religion, sex, pregnancy (including childbirth, lactation and related medical conditions), national origin, age, physical and mental disability, marital status, sexual orientation, gender identity, gender expression, genetic information (including characteristics and testing), military and veteran status, and any other characteristic protected by applicable law. Ivanti believes that diversity and inclusion among our teammates is critical to our success as a global company, and we seek to recruit, develop and retain the most talented people from a diverse candidate pool. . . . pwdnet. . If you require special assistance for the best interview experience, please contact us at . [email protected]. .. . .