Technical Account Manager- Cybersecurity

<p class="p1"><strong>We believe in having a personalized strategy for all things. That&rsquo;s why every cybersecurity stack is custom-built, it&rsquo;s why we form long-term partnerships with our clients, and it&rsquo;s why we highlight our team at every opportunity. In order for this to be successful, we need top tech talent who are motivated, inspired, and hard-working to build careers at DOT.</strong></p> <p class="p1"><strong>Ready to change the face of cybersecurity? See what makes DOT different and apply today</strong></p>

Lake Forest, IL

DOT Security

<p class="p1">People. Approach. Technology. Those are the three layers of DOT Security&rsquo;s process. Our approach and our tech are critical, but having the right people always come first.</p> <p class="p1">We believe in having a personalized strategy for all things. That&rsquo;s why every cybersecurity stack is custom-built, it&rsquo;s why we form long-term partnerships with our clients, and it&rsquo;s why we highlight our team at every opportunity. In order for this to be successful, we need top tech talent who are motivated, inspired, and hard-working to build careers at DOT.</p> <p class="p1">DOT first came from the Managed IT division of Impact Networking. As a more than 20-year-old business, Impact knows how to provide ongoing education and support for employees; qualities we&rsquo;ve taken over to DOT Security. But as a new company, we&rsquo;re also hungry to expand and improve, creating opportunities for anyone with drive and a vision.</p> <p class="p1">Ready to change the face of cybersecurity? See what makes DOT different and apply today!</p> <p class="p2">&nbsp;</p>

keywords: managed security,cybersecurity account management,career path,benefits,trusted advisor,technology analysis,cybersecurity awareness,ticket review,implementation management,knowledge,skills,abilities,certification

Mid-Senior Level

Overview: <p>DOT Security&rsquo;s mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. DOT Security will implement processes, technology, and provide subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, DOT Security will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.</p> <p>DOT Security&nbsp;is seeking team members to fill the role of Technical Account Manager (TAM), at different levels. Individuals will have the opportunity to join based on their knowledge and skills demonstrated during the interview process including testing. DOT Security has developed a career progression path, that challenges our team to grow as cybersecurity professional consultant knowledge and providing excellent customer service as a member of the DOT Security &ndash; Services team.</p> <p>As a Core TAM, you will act as the Cybersecurity Manager for DOT clients.&nbsp;</p> <p>The role of the TAM is challenging and rewarding. It requires business acumen and an effective communication skill set. The ability to communicate highly technical concepts to non-technical users is critical to client success. There may be an opportunity to mentor other junior TAMs as needed.</p>
Responsibilities: <ul> <li>Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.</li> <li>Collect and maintain data needed to meet system cybersecurity reporting.</li> <li>Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.</li> <li>Facilitate security improvement actions are evaluated, validated, and implemented as required.</li> <li>Facilitate cybersecurity inspections, tests, and reviews are coordinated for the network environment.</li> <li>Confirm that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.</li> <li>Review and recommend improvements of baseline security safeguards are appropriately installed.</li> <li>Identify information technology (IT) security program implications of new technologies or technology upgrades.</li> <li>Interpret security requirements relative to the capabilities of new information technologies.</li> <li>Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise&rsquo;s cybersecurity program.</li> <li>Align and recommend information technology (IT) security priorities with the security strategy.</li> <li>Review the monitoring of information security data sources to maintain organizational situational awareness.</li> <li>Provide threat or target analysis of cyber defense information</li> <li>Production of threat information within the enterprise.</li> <li>Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.</li> <li>Oversee the information security training and awareness program.</li> <li>Participate in an information security risk assessment during the Security Assessment and Authorization process.</li> <li>Review and consult on plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.</li> <li>Provide direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.</li> <li>Recommend system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.</li> <li>Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to organizational leadership.</li> <li>Recognize a possible security violation and take appropriate action to report the incident, as required.</li> <li>Recommend resource allocations required to securely operate and maintain an organization&rsquo;s cybersecurity requirements.</li> <li>Recommend policy and coordinate review and approval.</li> <li>Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.</li> <li>Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.</li> <li>Use federal and organization-specific published documents to manage operations of their computing environment system(s).</li> <li>Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.</li> <li>Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.</li> <li>Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle.</li> <li>Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.</li> <li>Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals.</li> <li>Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).</li> <li>Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.</li> <li>Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.</li> </ul>
Requirements: <h4>Knowledge</h4> <ul> <li>Computer networking concepts and protocols, and network security methodologies.</li> <li>Risk management processes (e.g., methods for assessing and mitigating risk).</li> <li>Cybersecurity and privacy principles.</li> <li>Cyber threats and vulnerabilities.</li> <li>Specific operational impacts of cybersecurity lapses.</li> <li>Data backup and recovery.</li> <li>Business continuity and disaster recovery continuity of operations plans.</li> <li>Host/network access control mechanisms (e.g., access control list, capabilities lists).</li> <li>Cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.</li> <li>Vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).</li> <li>Incident response and handling methodologies.</li> <li>Industry-standard and organizationally accepted analysis principles and methods.</li> <li>Intrusion detection methodologies and techniques for detecting host and network-based intrusions.</li> <li>Measures or indicators of system performance and availability.</li> <li>Current industry methods for evaluating, implementing, and disseminating Information Technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.</li> <li>Network traffic analysis methods.</li> <li>New and emerging information technology (IT) and cybersecurity technologies.</li> <li>How traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).</li> <li>System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).</li> <li>Server administration and systems engineering theories, concepts, and methods.</li> <li>Server and client operating systems.</li> <li>System software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.</li> <li>System life cycle management principles, including software security and usability.</li> <li>Technology integration processes.</li> <li>The organization&rsquo;s enterprise Information Technology (IT) goals and objectives.</li> <li>What constitutes a network attack and a network attack&rsquo;s relationship to both threats and vulnerabilities.</li> <li>Information security program management and project management principles and techniques.</li> <li>Organization's risk tolerance and/or risk management approach.</li> <li>Enterprise incident response program, roles, and responsibilities.</li> <li>Current and emerging threats/threat vectors.</li> <li>System administration, network, and operating system hardening techniques.</li> <li>Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).</li> <li>Network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.</li> <li>Security architecture concepts and enterprise architecture reference models (e.g., Zachman).</li> <li>Personally Identifiable Information (PII) data security standards.</li> <li>Payment Card Industry (PCI) data security standards.</li> <li>Personal Health Information (PHI) data security standards.</li> <li>An organization's information classification program and procedures for information compromise.</li> <li>Network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), And Directory Services.</li> <li>Penetration testing principles, tools, and techniques.</li> <li>Controls related to the use, processing, storage, and transmission of data.</li> <li>Application security risks (e.g. Open Web Application Security Project Top 10 List).</li> </ul> <h4>Skills</h4> <ul> <li>Creating policies that reflect system security objectives.</li> <li>Determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.</li> </ul> <h4>Abilities</h4> <ul> <li>Apply techniques for detecting host and network-based intrusions using intrusion detection technologies.</li> <li>Integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).</li> </ul> <h4>Other Desired Attributes</h4> <ul> <li>Certifications include, but not limited to specialized Sec+, CGIH, CISSP, CISM, or other comparable certifications.</li> <li>Public Trust background check (Limited Requirement).</li> <li>Must be able to do some light lifting.</li> <li>College degrees may be a substitute for up to two years&rsquo; experience for Bachelor&rsquo;s degrees. 4 Years for master&rsquo;s degrees.</li> </ul>