Security Operation Manager

India

Family Description

Customer Services (CS) covers customer service in different areas such as technical support, account support, operations, maintenance, network design / deployment / integration / transformation, and education. Generates revenue and the increase of customer satisfaction through planning, designing, deploying, integrating, optimising, operating, and maintaining phases.

Subfamily Description

Managed Services (MSE) is responsible for keeping the network running and proposing / conducting network upgrades based on business requirements. Covers technical managing and operating of agreed components of IT and telecommunications services provided to end users of Nokia customers, within contracts agreed with those customers.

 



• Recognised expert in one or more Managed Security Services (MSS) functional area, at a regional or global level.

• Addresses and resolves highly complex MSS operations performance issues or challenges including through technical leadership of highly-skilled teams.

• Interprets internal and external MSS operational and technology challenges and recommends how they should be overcome.

• Takes a leadership role in the development of innovative practices to improve MSS operations.

• Is responsible for leading the design, build, test and implementation of security systems within an organisation’s IT and telecom network and shall be owner for Performance & Quality Management of Security Operations & Administration . Approves new and / or changes to guidelines and procedures for the function.

• Contributes to strategic decisions for not only Managed Services operations, but also MSS business.

• Contributes to development of concepts to determine professional direction of Managed Services delivery operations personnel.

• Acts as a professional leader for Managed Services operations, mentoring senior Service Operations Engineers.

• Often leads longer-term MSS complex improvement projects with moderate resource requirements, risk and complexity.

 

Impact

Impact is short-term through individual and team contributions. Scope is primarily within own subject area in a function/unit. Actions and errors impact on program, project or function. Provides measurable input into new products, processes, standards or operational plans in support of the organisation's business strategies, with some impact on business unit/ function overall results.

Scope & Contribution

Individual Contributor: Operates autonomously in own subject area. Can analyze, develop and implement concepts and solutions as a subject matter expert. Increased awareness of and involvement outside of own subject area. Distills big picture. Makes decisions about and prioritizes own work. Managerial/Supervisory: Clear managerial responsibilities for people. Typically first level of solid line management. Interprets policies. Ensures existing plans are put into operation. Executes and/or oversees processes to meet customer needs. Responsible for analysis, design & development of policies, plans, programs. 

Innovation

Carries out specialised activities/projects according to general direction. Influences others to support decisions. Works mostly independently. Analyze situations or data that requires review of relevant factors. Solutions can often be checked and proved. Demonstrates success in multiple roles and is adaptable to manage complex changing business environments.

Communication

Communicates with parties within and outside of own job function and teams, and typically has responsibilities for communicating with parties external to the organisation, which may include customers or vendors.Works to influence others to accept job function’s view/practices and agree/accept new concepts, practices, and approaches.Has cross-cultural knowledge and global mindset Requires ability to communicate with executive leadership regarding matters of significant importance to the organisation. May conduct briefings with senior leaders within the job function. May at times be required to negotiate regarding operational issues.

Knowledge & Experience

Management Experience / Achieved well-advanced skills of a specific professional discipline combining deep knowledge of theory and organisational practice or expertise. Recognised expert in their field (depth & breadth). Typically requires 10+ years extensive relevant experience and/or a graduate / postgraduate equivalent degree.

Security Specialist in areas of Security Monitoring & Response services, responsible for development, implementation & delivery. Performs & implements threat detection, hunting, incident monitoring, investigation & response activities are effectively delivered and enhanced for future.

  • Having more than 10 years of relevant experience in a combination of security operations (managed detection and response),threat intelligence and threat hunting.
  • Professional security management certification is desirable, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Computer Hacking Forensic Investigator (CHFI)
  • Proven track record and experience in Security Operations Management, Managed detection and response, Threat modelling & Use case development, Threat Intelligence & Threat hunting, Investigation and Digital forensics
  • Can determine the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of risk areas.
  • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels
  • Strategic leader and builder of both vision and bridges, and able to motivate the appropriate teams in the organization
  • Knowledge and understanding of relevant legal and regulatory requirements e.g. Country specific telecom security conditions, CII (Critical Information Infrastructure) regulations etc.
  • Excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
  • Project management skills: financial/budget management, scheduling and resource management
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework
  • High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity

Come create the technology that helps the world act together

Nokia is committed to innovation and technology leadership across mobile, fixed and cloud networks. Your career here will have a positive impact on people’s lives and will help us build the capabilities needed for a more productive, sustainable, and inclusive world.
We challenge ourselves to create an inclusive way of working where we are open to new ideas, empowered to take risks and fearless to bring our authentic selves to work

What we offer
 
Nokia offers continuous learning opportunities, well-being programs to support you mentally and physically, opportunities to join and get supported by employee resource groups, mentoring programs and highly diverse teams with an inclusive culture where people thrive and are empowered.

Nokia is committed to inclusion and is an equal opportunity employer

Nokia has received the following recognitions for its commitment to inclusion & equality:

  • One of the World’s Most Ethical Companies by Ethisphere
  • Gender-Equality Index by Bloomberg
  • Workplace Pride Global Benchmark

At Nokia, we act inclusively and respect the uniqueness of people. Nokia’s employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law.
We are committed to a culture of inclusion built upon our core value of respect.

Join us and be part of a company where you will feel included and empowered to succeed.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: CHFI CISM CISSP Cloud COBIT Compliance Forensics ITIL Monitoring NIST NIST 800-53 Risk management Threat detection Threat intelligence

Perks/benefits: Career development

Region: Asia/Pacific
Country: India
Job stats:  5  1  0
Category: Leadership Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.