Sr Manager Global Information Security and Compliance-US Law Enforcement & Security - Pittsburgh, PA at Geebo

Sr Manager Global Information Security and Compliance-US

With over 80 years as an industrial technology leader, Kennametal Inc.
delivers productivity to customers through materials science, tooling and wear-resistant solutions.
Customers across aerospace, earthworks, energy, general engineering and transportation turn to Kennametal to help them manufacture with precision and efficiency.
Every day approximately 9,000 employees are helping customers in more than 60 countries stay competitive.
Kennametal generated nearly $1.
9 billion in revenues in fiscal 2020.
Learn more at www.
kennametal.
com.
Follow @Kennametal:
Twitter, Instagram, Facebook, LinkedIn and YouTube.

Global Job purpose (A brief statement indicating the basic purpose of the global job)

The Security Operations Center Manager conducts essential cyber security incident handling activities for Kennametal.
This is accomplished by leading security monitoring and incident response activities, including conducting event and incident analysis, and coordinating incident containment and remediation actions.
In addition, the SOC Manager is instrumental in cyber threat and vulnerability analysis and response.
The jobholder will be responsible for coordinating work across the Kennametal Security Operations Center to receive alerts and determine appropriate action, shaping detection criteria and developing operational guidelines.

Geographical scope

Global

Major tasks and responsibilities

  • Serve as a senior-level technical resource for cyber security incident handling
  • Manage junior CSIRT/SOC team members
  • Support the Kennametal Managed Security Service Provider relationship
  • Provide qualified guidance on and coordinate execution of identification, analysis, response and monitoring of cyber threat and vulnerabilities
  • Monitor and consult on technical vulnerability remediation

Incident Management and Monitoring

  • Manage Security incidents.
    Assist in developing concepts for efficient and effective security response activities.
  • Be a trusted point of contact and expertise for incidents and manage all the incident response activities including escalation to upper management.
  • Provide qualified guidance on SOC alerting conditions and necessary data sources

Note:
this role requires some on-call duty

Vulnerability Management

  • Analyze and interpret results of vulnerability management activities using standard frameworks (CVSS)
  • Research and investigate new and emerging vulnerabilities, to include 0Day events
  • Identify and resolve false positive findings in assessment results
  • Assess compensating controls and validate their effectiveness
  • Partner with stakeholders to streamline, standardize and document vulnerability remediation procedures
  • Monitor vulnerability remediation activities
  • Integrate information from disparate sources and create tactical intelligence that is relevant to protecting the business.

Threat Management

  • Research and investigate new and emerging cyber threats and vulnerabilities through participation in external security communities.
  • Manage the collection, analysis, and dissemination of cybersecurity threat information, including controlling the quality of intelligence suppliers
  • Manage relationships with global stakeholders to identify business needs and design appropriate security controls.
  • Analyze and interpret threat information using standard frameworks (Cyber Kill Chain, MITRE ATT&CK framework)
  • Generate timely business cyber threat intelligence assessment reports to business owners and management stakeholders
  • Generate timely technical cyber threat intelligence assessment reports to IT management and stakeholders

Other Areas of Effort

  • Support the achievement of the Global IT Strategy
  • Support the implementation of ISO 27001 requirements
  • Support efforts related to the corporate Enterprise Security Dashboard

Work relations

Internal:

  • Global Business stakeholders (process owners, key users, management)
  • Teams and team/department leads within IT

External:

  • Service providers and partners
  • Industry peers
  • Information sharing organizations

Qualifications (Education, skills, experiences)

  • Master s degree in information assurance (or related field) with minimum 3 years experience or B.
    S in information assurance (or related field ) with minimum of 5 years experience
  • Minimum 2 years experience on a computer security incident response team
  • Expertise of security concepts and best practices related to incident management, threat and vulnerability management
  • Practical experience with identifying, analyzing, and communicating cyber threat and vulnerability information
  • Experience applying threat and vulnerability analyses models, including the LM Cyber Kill Chain, the Diamond Model of Intrusion Analysis, the Mitre ATT&CK Framework and the Common Vulnerability Scoring System (CVSS)
  • Understanding of ITIL/ service management concepts
  • Familiarity with enterprise risk management and how cyber threats and vulnerabilities integrate into ERM efforts
  • Exemplary verbal and written communication skills (English business fluent spoken and written)
  • Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation
  • Intercultural experience
  • Proven project management experience
  • Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff
  • Ability to work under pressure and deal with ambiguous situations
  • Ability to travel globally

Ideal, but not required

  • Experience in a global corporation
  • Experience with incident response across a multi-provider cloud environment
  • SANS Certified Incident Handler, CERT-Certified Computer Security Incident Handler certification or equivalent

As part of our core values, Kennametal is committed to providing an inclusive and welcoming environment for all people.
We are an Equal Opportunity employer.

.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.