Overview:
The Cybersecurity Manager is a hands-on leader responsible for directing Alterman’s information security program while maintaining deep technical expertise across security disciplines. This role blends people leadership with direct execution of security engineering, identity management, and compliance activities. The Manager, Cybersecurity develops and enforces security strategies, policies, and controls to protect organizational data and systems, leads a team of security professionals, partners with business stakeholders to manage risk, and ensures compliance with regulatory and industry standards. Thorough documentation of security processes, configurations, and decisions is a core responsibility of this role.
Essential Functions:
1. Team Leadership & Management: 20%
- Oversees day-to-day operations of the Cybersecurity team, including supervision, mentoring, training, performance management, and career development of direct reports.
- Serves as the technical escalation point and works alongside team members to resolve complex security and identity-related issues.
- Manages and coordinates escalation paths for security and identity incidents.
- Fosters a culture of security awareness, accountability, documentation, and continuous improvement.
- Recruits, develops, and retains cybersecurity talent.
2. Security Engineering & Architecture: 20%
- Designs, implements, and maintains security solutions and architecture, including SIEM, EDR, DLP, network security technologies, and related documentation and standards.
- Evaluates, selects, and integrates security tools and technologies for new and existing systems, applications, and infrastructure.
- Implements automation to support security operations, detection, and incident response.
- Leads advanced threat hunting, detection engineering, and incident response activities, including developing and tuning detection rules, alerts, and correlation logic.
- Conducts security assessments and penetration testing.
3. Access Controls & Identity Management: 15%
- Designs, implements, and manages enterprise identity and access management solutions, including directory services, SSO, MFA, PAM, and hybrid identity environments.
- Develops, enforces, and governs access control frameworks, including RBAC models, conditional access policies, and identity governance processes such as access reviews and certifications.
- Partners with HR and business units to support joiner, mover, and leaver processes.
- Troubleshoots complex authentication, authorization, and identity-related issues.
4. Risk Management & Compliance: 15%
- Oversees the enterprise risk management and compliance programs, including risk assessments, treatment plans, audits, and maintenance of the risk register.
- Ensures compliance with regulatory requirements and industry standards, including CMMC, SOC 2, and NIST frameworks.
- Manages audit activities, including evidence collection, documentation, interviews, and certification processes.
- Supports vendor risk management activities, including third-party assessments and questionnaires.
- Partners with legal, HR, and business stakeholders on security and privacy matters.
5. Security Strategy & Program Management: 15%
- Develops, implements, and maintains the enterprise information security strategy, policies, standards, and procedures aligned with business objectives.
- Manages the cybersecurity budget, resource planning, and vendor relationships.
- Reports on security posture, risk exposure, and program effectiveness to executive leadership.
- Leads organization-wide security awareness and training initiatives.
- Develops and maintains business continuity and disaster recovery plans from a security perspective.
- Stays current with emerging threats, technologies, and industry best practices.
6. Vulnerability Management: 10%
- Leads the vulnerability management program, including scanning, analysis, prioritization, remediation tracking, and reporting.
- Partners with IT teams to ensure timely patching and remediation of identified vulnerabilities.
- Tracks and reports vulnerability metrics, trends, and risk reduction progress.
7. Performs other duties as assigned. 5%
Education and Experience:
- Bachelor's degree in Computer Science, Information Security, Information Technology, or related field preferred; equivalent combination of education and experience will be considered.
- Minimum of 8+ years of experience in information security, cybersecurity engineering, identity management, or related IT disciplines required.
- Minimum of 3+ years of security management or leadership experience required.
- CISSP, CISM, or CISA certification required.
- Additional certifications preferred (e.g., CRISC, CCSP, Security+, Microsoft Identity SC-300).
- Deep familiarity with compliance frameworks required (NIST, ISO 27001, SOC 2, CMMC).
- Demonstrated ability to perform technical security work across multiple disciplines (security engineering, identity management, compliance).
Skills/Abilities:
- Strong ability to communicate complex security concepts to executive leadership and board-level audiences, translating technical risk into clear business impact and actionable decisions.
- Demonstrated leadership and people management capability, with the ability to motivate, develop, and hold technical security teams accountable.
- Strategic mindset with the ability to align security initiatives, architectures, and controls with organizational goals and risk tolerance.
- Proven ability to perform and lead technical security work, including scripting and automation using Python, PowerShell, Bash, and Microsoft Graph API to improve efficiency and consistency.
- Advanced understanding of modern attack techniques, threat actors, and defensive strategies, including the use of threat intelligence platforms to inform detection and response efforts.
- Strong knowledge of security monitoring, detection, and response capabilities, including SIEM platforms (e.g., Splunk, Microsoft Sentinel), EDR solutions, SOAR workflows, and packet-level network analysis.
- Deep understanding of identity and access management concepts and technologies, including Active Directory, Entra ID, SSO and federation, MFA, PAM, IGA, conditional access, and zero trust architectures.
- Solid expertise in authentication and authorization protocols, including SAML, OAuth, OIDC, and Kerberos, and their application across enterprise and cloud environments.
- Experience securing hybrid and cloud environments using Azure and AWS security services, vulnerability management tools, penetration testing methodologies, and encryption and data protection technologies.
- Strong technical writing skills with the ability to develop clear, accurate security policies, standards, procedures, and compliance documentation using GRC platforms and workflow tools.
- Strong project management and organizational skills, with the ability to manage multiple priorities, coordinate cross-functional initiatives, and drive security programs to completion.
- Excellent analytical and problem-solving skills, with the ability to assess risk, identify root causes, and recommend practical, scalable security solutions.
- Able to support security awareness initiatives and risk management activities using appropriate platforms and tools to promote a security-conscious culture.
Work Environment:
Physical Demands:
- Prolonged periods of sitting at a desk and working on a computer.
- Must be able to lift up to 15 pounds at times.
- Manual dexterity associated with computer data entry required.