IT Security Manager - remote at Sterlington, PLLC

We are redirecting you to the source. If you are not redirected in 3 seconds, please click here.

IT Security Manager - remote at Sterlington, PLLC. . Location: Remote. . Position Title:. IT Security Manager. . Contract:. Interim / Contra. ctor. . Reports to: . Head of Technology. .  . . Our Firm. :.  .  .  . . Sterlington is an international law firm that combines legal and commercial excellence with modern ways of practicing. Our high-caliber partners work on complex business matters with a tailored approach to client service and a focus on financial flexibility and innovation. Learn more at:.  . www.sterlingtonlaw.com. ..   . . .  . .  . . Responsibilities:. . . The role involves overseeing cybersecurity operations, ensuring compliance with security policies, and managing a team of security personnel.  . . . . Collect and maintain data needed to meet system cybersecurity reporting.  . . . . Ensure daily report and any other cyber or system security reporting deadlines are met.  . . . . Escalate or oversee the escalation of cybersecurity issues in accordance with organizational policy.  . . . . Ensure cybersecurity procedures and best practices are properly documented, formatted, and disseminated using standard operating procedure templates.  . . . . Ensure cybersecurity requirements are integrated into the continuity planning for the system(s) and/or organization(s).  . . . . Evaluate and execute security tool development efforts to ensure that baseline security safeguards are appropriately installed.  . . . . Manage the monitoring of information security data sources to maintain organizational situational awareness.  . . . . Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.  . . . . Responsible for managing a team of security personnel, advising senior leadership of threats to security, and proposing changes to the company's policies to reduce the organization's risk.  . . . . Exhibit technical skill in configuring and maintaining cybersecurity tools.  . . . . Oversee ongoing operations of security assets to ensure that a defense in depth security model is in place.  . . . . Ability to review logs for unusual or suspicious activity, interpret and make recommendations for resolution.  . . .  . .  . . Required experience.  . . . Minimum of 10 years IT experience, with at least 5 years in an information security role and at least 3 years of management/supervisory experience.  . . . . Proficiency in security frameworks including ISO27001, Cyber Essentials, SOC2, NIST CSF ad CIS.  . . . . Active CISSP/CISM certification.  . . . . Proven experience managing or working closely with Security Operations Centres (SOC) including incident response and threat detection..  . . . . Strong technical hands on experience working with MS security solutions, including Defender, Entra ID and Microsoft Purview..  . . . . BS in Cybersecurity or related field.  . . . . A strong understanding of the business impact of security tools, technologies, and policies.  . . . . Excellent customer service with an ability to 'translate' security and technical terminology so the customer can understand.  . . . .