Security Operation Manager
India
Family Description
Customer Services (CS) covers customer service in different areas such as technical support, account support, operations, maintenance, network design / deployment / integration / transformation, and education. Generates revenue and the increase of customer satisfaction through planning, designing, deploying, integrating, optimising, operating, and maintaining phases.
Subfamily Description
Managed Services (MSE) is responsible for keeping the network running and proposing / conducting network upgrades based on business requirements. Covers technical managing and operating of agreed components of IT and telecommunications services provided to end users of Nokia customers, within contracts agreed with those customers.
• Recognised expert in one or more Managed Security Services (MSS) functional area, at a regional or global level.
• Addresses and resolves highly complex MSS operations performance issues or challenges including through technical leadership of highly-skilled teams.
• Interprets internal and external MSS operational and technology challenges and recommends how they should be overcome.
• Takes a leadership role in the development of innovative practices to improve MSS operations.
• Is responsible for leading the design, build, test and implementation of security systems within an organisation’s IT and telecom network and shall be owner for Performance & Quality Management of Security Operations & Administration . Approves new and / or changes to guidelines and procedures for the function.
• Contributes to strategic decisions for not only Managed Services operations, but also MSS business.
• Contributes to development of concepts to determine professional direction of Managed Services delivery operations personnel.
• Acts as a professional leader for Managed Services operations, mentoring senior Service Operations Engineers.
• Often leads longer-term MSS complex improvement projects with moderate resource requirements, risk and complexity.
Impact
Impact is short-term through individual and team contributions. Scope is primarily within own subject area in a function/unit. Actions and errors impact on program, project or function. Provides measurable input into new products, processes, standards or operational plans in support of the organisation's business strategies, with some impact on business unit/ function overall results.
Scope & Contribution
Individual Contributor: Operates autonomously in own subject area. Can analyze, develop and implement concepts and solutions as a subject matter expert. Increased awareness of and involvement outside of own subject area. Distills big picture. Makes decisions about and prioritizes own work. Managerial/Supervisory: Clear managerial responsibilities for people. Typically first level of solid line management. Interprets policies. Ensures existing plans are put into operation. Executes and/or oversees processes to meet customer needs. Responsible for analysis, design & development of policies, plans, programs.
Innovation
Carries out specialised activities/projects according to general direction. Influences others to support decisions. Works mostly independently. Analyze situations or data that requires review of relevant factors. Solutions can often be checked and proved. Demonstrates success in multiple roles and is adaptable to manage complex changing business environments.
Communication
Communicates with parties within and outside of own job function and teams, and typically has responsibilities for communicating with parties external to the organisation, which may include customers or vendors.Works to influence others to accept job function’s view/practices and agree/accept new concepts, practices, and approaches.Has cross-cultural knowledge and global mindset Requires ability to communicate with executive leadership regarding matters of significant importance to the organisation. May conduct briefings with senior leaders within the job function. May at times be required to negotiate regarding operational issues.
Knowledge & Experience
Management Experience / Achieved well-advanced skills of a specific professional discipline combining deep knowledge of theory and organisational practice or expertise. Recognised expert in their field (depth & breadth). Typically requires 10+ years extensive relevant experience and/or a graduate / postgraduate equivalent degree.
Security Specialist in areas of Security Monitoring & Response services, responsible for development, implementation & delivery. Performs & implements threat detection, hunting, incident monitoring, investigation & response activities are effectively delivered and enhanced for future.
- Having more than 10 years of relevant experience in a combination of security operations (managed detection and response),threat intelligence and threat hunting.
- Professional security management certification is desirable, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Computer Hacking Forensic Investigator (CHFI)
- Proven track record and experience in Security Operations Management, Managed detection and response, Threat modelling & Use case development, Threat Intelligence & Threat hunting, Investigation and Digital forensics
- Can determine the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of risk areas.
- Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels
- Strategic leader and builder of both vision and bridges, and able to motivate the appropriate teams in the organization
- Knowledge and understanding of relevant legal and regulatory requirements e.g. Country specific telecom security conditions, CII (Critical Information Infrastructure) regulations etc.
- Excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
- Project management skills: financial/budget management, scheduling and resource management
- Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework
- High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
Come create the technology that helps the world act together
Nokia is committed to innovation and technology leadership across mobile, fixed and cloud networks. Your career here will have a positive impact on people’s lives and will help us build the capabilities needed for a more productive, sustainable, and inclusive world.
We challenge ourselves to create an inclusive way of working where we are open to new ideas, empowered to take risks and fearless to bring our authentic selves to work
What we offer
Nokia offers continuous learning opportunities, well-being programs to support you mentally and physically, opportunities to join and get supported by employee resource groups, mentoring programs and highly diverse teams with an inclusive culture where people thrive and are empowered.
Nokia is committed to inclusion and is an equal opportunity employer
Nokia has received the following recognitions for its commitment to inclusion & equality:
- One of the World’s Most Ethical Companies by Ethisphere
- Gender-Equality Index by Bloomberg
- Workplace Pride Global Benchmark
At Nokia, we act inclusively and respect the uniqueness of people. Nokia’s employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law.
We are committed to a culture of inclusion built upon our core value of respect.
Join us and be part of a company where you will feel included and empowered to succeed.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CHFI CISM CISSP Cloud COBIT Compliance Forensics ITIL Monitoring NIST NIST 800-53 Risk management Threat detection Threat intelligence
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs