5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Information Services
IT Operations Security Lead
(This job is no longer available)
Grad Date

Not sure what types of jobs you are interested in?

Explore Jobs
Based on Your Education

Follow This Company

Job Description

IS Operations Security Lead

Salary: $140k to $150k + 15%

Location: Schaumburg, IL - preferred or Tulsa, OK, Knoxville, TN or Madison, WI

Role Specific Responsibilities

  • Proactively identifies gaps, makes plans, implements, updates, maintains, manages, monitors, and supports enterprise Security Tools.
  • Leads change control and device configuration management activities on all security technologies
  • Identifies the need for and provides management level reporting of all critical intrusion or vulnerability detection tools.
  • Invokes the security incident response process including security response team activities as well as providing and implementing tactical risk mitigation to incidents
  • Actively protects the availability, confidentiality, and integrity of customer, employee, and business information
  • Helps to lead in the Risk Assessment Program including identifying and scoring risk.
  • Provides vulnerability and threat management monitoring and mitigation response
  • Helps to lead in tactical and operational planning of vulnerability assessment activities
  • Contributes to Enterprise security team effectiveness by accomplishing additional security related results as needed
  • Mentors Senior and Lead Security Engineers in the review, development, testing and implementation of security plans, products and control techniques
  • Helps to lead the execution of EIS projects and initiatives
  • Participates in operations and tactical planning
  • Can act as a backup for the Security Operations manager in non-HR related scenarios

People Management

  • Manage individual workload to deliver to agree upon project milestones
  • Influence result driven tasks within the IS Security Team to complete successfully on time and on budget
  • Proactively promote consistent project-based performance measurement and skill development of junior staff
  • Model behaviors that demonstrate commitment to corporate values

Key Competencies

  • Information Seeking - Information Seeking is driven by an underlying curiosity and desire to know more about things, people, or issues. Asks a series of probing questions to get at the root of a situation or a problem, or a potential opportunity below the surface issues presented, including calling on others who are not personally involved.
  • Teamwork and Collaboration - Teamwork and Collaboration imply working collaboratively with others, to be part of a team, to work together, as opposed to working separately or competitively. Confidently shares own ideas, values others' input and expertise, displays willingness to learn from others and solicit ideas and opinions.
  • Organizational Awareness - Organizational Awareness is the ability to understand and learn the power relationships, to identify who the real decision-makers are and who can influence them and to predict how new events or situations will affect the organization. Recognizes unspoken organizational limitations, what is and is not possible at certain times and uses the corporate culture (language, etc.) that will produce the best response.
  • Drive to Achieve - Drive to Achieve is a concern for working well or for surpassing a standard of excellence. The standard may be one's own past performance, an objective measure, outperforming others or doing what no one else has ever done before. Sets and works to meet challenging goals.
  • Customer Focus - Customer Focus is focusing one's efforts on discovering and meeting the needs of external and internal customers. Makes self fully available, makes concrete attempts to add value to the client and takes action beyond normal expectations.
  • Innovative Thinking - Innovative Thinking is working to improve performance by taking a novel approach to how work is done, or problems approached within the organization. Looks beyond the facts in order to develop solutions that have not been used in the organization before.


  • 10 - 12 years relevant work experience preferred
  • Solid understanding of technology, operations and key business processes.
  • Member of SANS or other leading security organizations preferred
  • Proven change management skills
  • Highly flexible and able to adapt to change
  • At least two (2) of the following Industry certificates CEH, CISSP, or OCSP required
  • Influencing and negotiation skills
  • Solid understanding of UNIX/Linux operating systems.
  • Solid Understanding of the common UNIX and Windows utilities, diagnostic and monitoring tools.
  • Scripting experience with Perl, Shell and/or Java
  • Strong verbal and written communication skills
  • Strong organizational and interpersonal skills
  • Strong team player with proven collaboration skills
  • Strong critical thinking and problem solving skills
  • Proven change agent who consistently delivers results
  • Solid understanding of network protocols, LAN, WAN, SSL, Firewall, Load Balancer, and DMZ configurations.
  • Understanding of the PCI (Payment Card Industry) data security standard and other regulatory concerns (SOX, FCRA, FISMA, etc.)

Relevant Technical Skills - Expert Knowledge of most items listed:

  • Information Risk Management: Content filtering technologies, application Firewalls, vulnerability scanners, LDAP, SAML, forensics software, security incident response
  • O/S: Linux (Red Hat, SUSE), Windows Desktop (XP, Win7, Win10) and Server (2000, 2003, 2008, and 2012), and UNIX (HP/UX, AIX, etc...)
  • Network: Firewall and Switching technologies (Cisco ASA, Juniper SRX, Checkpoint, etc...) OSI Model, VPN, IDS/IPS, Proxy/Reverse Proxy, WAF, Two Factor Authentication, RADIUS, Netflow, Anti-SPAM, Vulnerability Scanning/Reporting (Qualys, Rapid7, Nessus, NMAP, etc. )
  • Software Languages: Perl, PowerShell, Python, SQL.
  • End Point: Anti Malware, HIPS, Client based Firewall, Whitelisting/Blacklisting technologies, GPO, WMI, BASH.


Applicants must be eligible to work in the specified location