Cybersecurity Infrastructure Manager
We are seeking an experienced Cybersecurity Infrastructure Manager to lead and manage the organization's cybersecurity infrastructure platforms and ensure the protection of enterprise information assets.
This role will oversee the operation, security, and availability of key cybersecurity technologies including Privileged Access Management (PAM), Secure Access Service Edge (SASE) / Zero Trust Network Access (ZTNA), Mobile Device Management (MDM), and Encryption & Key Management platforms, ensuring compliance with security standards and regulatory requirements.
Key Responsibilities
Cybersecurity Infrastructure Operations Management
- Lead and manage cybersecurity engineers responsible for enterprise cybersecurity infrastructure platforms.
- Ensure secure configuration, operation, and maintenance of cybersecurity infrastructure technologies.
- Establish operational procedures, standard operating procedures (SOPs), and security runbooks.
- Monitor operational performance and ensure high availability of cybersecurity platforms.
- Coordinate incident response and troubleshooting related to cybersecurity infrastructure technologies.
Security Platform Oversight
- Privileged Access Management (PAM)
- Manage privileged account governance and access control mechanisms.
- Ensure secure credential vaulting, password rotation, and privileged session monitoring.
- Enforce least privilege and privileged access governance policies.
- Secure Access Service Edge (SASE) / Zero Trust Network Access (ZTNA)
- Oversee secure remote access capabilities and zero trust architecture implementation.
- Manage access policies based on user identity, device posture, and contextual risk.
- Ensure secure access for internal users, partners, and remote workforce.
Mobile Device Management (MDM)
- Manage enterprise mobility security policies and device compliance.
- Ensure secure enrollment, configuration, and monitoring of mobile and endpoint devices.
- Enforce corporate security controls on mobile endpoints.
- Encryption & Key Lifecycle Management
- Manage cryptographic controls including key generation, distribution, rotation, and destruction.
- Ensure proper operation of encryption key management systems and hardware security modules (HSM).
- Enforce enterprise cryptographic policies and secure key management practices.
Regulatory Compliance & Governance
- Ensure cybersecurity infrastructure operations comply with NCA Essential Cybersecurity Controls (ECC).
- Support cybersecurity audits, regulatory assessments, and compliance reviews.
- Maintain documentation and reporting aligned with cybersecurity governance frameworks such as ISO 27001 and NIST.
- Vendor & Technology Management
- Manage cybersecurity technology vendors and service providers.
- Ensure vendor solutions meet contractual SLAs and security requirements.
- Participate in evaluation and selection of cybersecurity technologies.
Qualifications
- Bachelor's degree in Cybersecurity, Information Security, Computer Science, Information Technology, or a related field.
- Experience
- Minimum 6 years of experience in cybersecurity or information security or network security.
- Minimum 3 years of experience managing cybersecurity teams.
- Hands-on experience operating enterprise security technologies such as PAM, ZTNA/SASE, MDM, and encryption key management systems.
Professional Certifications (Preferred)
- CISSP Certified Information Systems Security Professional
- CISM Certified Information Security Manager
- CCSP Certified Cloud Security Professional
- Vendor certifications (CyberArk, Zscaler, Palo Alto, Microsoft Intune, etc.)
- Network & Network Security Certified.
- Technical Competencies
- Identity and Access Management (IAM)
- Privileged Access Management (PAM)
- Zero Trust Architecture
- Endpoint Security Management
- Cryptography and Key Management
- Network Security Architecture
- Security Monitoring and Incident Response
- Security Platform Lifecycle Management