Cybersecurity Operations Leader

Offsite Remote Work - UHealth IT

University of Miami

A private research university with more than 16,000 students from around the world, the University of Miami is a vibrant and diverse academic community focused on teaching and learning, the discovery of new knowledge, and service to the South...

View company page

Current Employees:

If you are a current Staff, Faculty or Temporary employee at the University of Miami, please click here to log in to Workday to use the internal application process. To learn how to apply for a faculty or staff position using the Career worklet, please review this tip sheet.

The University of Miami Health System, "UHealth", IT Department has an exciting opportunity for a Cybersecurity Operations Leader. The Cybersecurity Operations Leader oversees all aspects of security operations and support services and leads all cybersecurity incident response related activities. The incumbent directs internal teams in the execution of initiatives as they relate to threat analysis, monitoring, systems, and applications, responding to all related cybersecurity alerts, and supporting strategic IT initiatives. The Cybersecurity Operations Leader exercises considerable judgment by making decisions in unprecedented situations.

  • Supervises the performance management of all assigned staff including making decisions as they pertain to hiring, training, evaluation, promotion, and termination.

  • Manages daily operations and directs staff to achieve departmental goals and objectives.

  • Assumes responsibility for campus-wide initiatives involving computer support services.

  • Develops, promotes, and maintains standards as they relate to technical support services and devices, including manufacturing and architectural standards.

  • Designs improved work systems by revising work standards, policies, and procedures.

  • Directs and manages project plan development, risk assessment, communications, budget tracking, status reporting, vendor management, and successful project completion.

  • Conducts network monitoring and intrusion detection analysis using various Computer Network Defense (CND) tools, such as Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, Host-Based Security System (HBSS), etc.

  • Correlates network activity across networks to identify trends of unauthorized use.

  • Reviews alerts and data from sensors and documents formal, technical incident reports

  • Researches emerging threats and vulnerabilities to aid in the identification of network incidents.

  • Provides network subscribers with incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary.

  • Tests new computers, software, switch hardware and routers before implementation to ensure Security.

  • Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results and making changes necessary to address deficiencies.

  • Manages projects with support staff by giving them a clear understanding of the departmental mission.

  • Assumes responsibility for enterprise-wide IT projects and ensures an efficient and timely conclusion.

  • Contributes to strategic plan and assists in providing short- and long-term solutions to help meet campus-wide strategic and tactical planning initiatives.

  • Communicates with administration and staff regarding the efficient and timely delivery of services.

  • Performs follow-up investigations on inquiries, complaints, and problems.

  • Assists in the determination of critical milestones.

  • Seeks ways to improve operations and oversees the preparation of productivity reports.

  • Establishes departmental goals and objectives, identifies areas of improvement, and implements action plans to meet these.

  • Attends professional meetings, workshops, conferences, and seminars to keep abreast of technological market advancements.

  • Establishes and continuously assesses the effectiveness of the internal controls within the unit and compliance with University policies and procedures.

  • Ensures employees are trained on controls within the function and on University policy and procedures.

This list of duties and responsibilities is not intended to be all-inclusive and may be expanded to include other duties or responsibilities as necessary. 

MINIMUM QUALIFICATIONS:  

  • Bachelor's degree in relevant field; Master’s in Computer Science, Information Security or related field preferred.

  • Certified Information Systems Security Professional (CISSP) 

  • Certified Information Security Manager (CISM) 

  • Security + 

  • Certified Ethical Hacker 

  • Cloud Security certification 

  • 7+ years of experience in information security, especially on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)

  • 7+ years of experience in another IT function, especially IT Audit

  • 7+ years of experience with regulatory compliance and information security management frameworks (e.g., IS027000, COBIT, NIST 800, etc.)

  • Ability to react quickly, decisively and deliberately in high-stress, high-impact situations.

  • Ability to lead, motivate, develop, and train others. 

  • Skill in collecting, organizing, and analyzing data. 

  • Knowledge of business and management principles. 

  • Ability to direct, manage, implement, and evaluate department operations. 

  • Ability to establish department goals, and objectives that support the strategic plan. 

  • Ability to effectively plan, delegate and/or supervise the work of others. 

Any appropriate combination of relevant education, experience and/or certifications may be considered.

#LI-AS1

The University of Miami offers competitive salaries and a comprehensive benefits package including medical, dental, tuition remission and more.

UHealth-University of Miami Health System, South Florida's only university-based health system, provides leading-edge patient care powered by the ground breaking research and medical education at the Miller School of Medicine. As an academic medical center, we are proud to serve South Florida, Latin America and the Caribbean. Our physicians represent more than 100 specialties and sub-specialties, and have more than one million patient encounters each year. Our tradition of excellence has earned worldwide recognition for outstanding teaching, research and patient care. We're the challenge you've been looking for.

Patient safety is a top priority. As a result, during the Influenza ("the flu") season (September through April), the University Of Miami Miller School Of Medicine requires all employees who provide ongoing services to patients, work in a location (all Hospitals and clinics) where patient care is provided, or work in patient care or clinical care areas, to have an annual influenza vaccination. Failure to meet this requirement will result in rescinding or termination of employment.

The University of Miami is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities are encouraged to apply. Applicants and employees are protected from discrimination based on certain categories protected by Federal law. Click here for additional information.

Job Status:

Full time

Employee Type:

Staff

Pay Grade:

H17
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CERT CISM CISSP Cloud CND COBIT Compliance Computer Science Firewalls Forensics IDS Incident response Intrusion detection IPS Monitoring NIST Risk assessment SOC Teaching Vendor management Vulnerabilities

Perks/benefits: Career development Competitive pay Conferences Health care

Region: Remote/Anywhere
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.