The Hiring Range For This Role Is
162,996.28 - 244,494.42
This is the lowest to highest salary we, in good faith, believe we would pay for this role at the time of this posting. We may ultimately pay more or less than the hiring range and this hiring range may also be modified in the future. A candidate’s position within the hiring range may be based on several factors including, but not limited to, specific competencies, relevant education, qualifications, certifications, relevant experience, skills, seniority, performance, shift, travel requirements, and business or organizational needs. This job is also eligible for
annual bonus incentive pay.
We offer a comprehensive package of benefits
including paid time off, 11 holidays, medical/dental/vision insurance, generous 401(k) matching, lifestyle spending account and many other benefits to eligible employees.
Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, or any other form of compensation that are allocable to a particular employee remains in the Company's sole discretion unless and until paid and may be modified at the Company’s sole discretion, consistent with the law.
Job Description Summary
This role will lead and oversee the full lifecycle of technology controls and processes within a specific security domain or program to safeguard against current and new cyber threats. This position will serve as an inspirational and strategic leader in providing strategic direction and ensuring tactical execution to defend and protect against an evolving business risk profile in an advanced and technology-led business environment. This role will partner closely with internal and external stakeholders to evolve, modernize, and align the portfolio of security technology services and capabilities that anticipate and mitigate cyber impacts and proactively promote business resiliency. This role will lead a distinguished team of resources in delivering cyber protection capabilities nimbly and with a customer focus.
Responsibilities Include But Are Not Limited To
- Leadership: Serve as a thought leader in budgeting, planning, coordinating, arranging, and tracking progress against plans to drive innovation, growth, and continuous excellence
- Performance Measurement and Reporting: Establish and maintain processes to measure and report team performance and business value. Demonstrate team outputs to stakeholders at an executive level.
- Research and Risk Management: Monitor emerging security technologies and industry trends. Identify new attack vectors and assess security risks, formulating mitigation plans.
- Collaboration and Compliance: Integrate security measures into business processes with cross-functional teams. Address legal and regulatory requirements with legal and compliance teams. Participate in security audits and assessments.
- Team Management and Communication: Manage and motivate diverse teams. Communicate security concerns and best practices to stakeholders. Assist in security-related documentation.
Education
Required Education, Certifications and Experience:
- Required Bachelor's Degree Computer Science, Information Technology, or related field; or equivalent work experience
Experience
- 10+ Years information security experience with a heavy technical focus and with progressively increasing responsibility Required
- Previous supervisory experience and proven success in managing technical teams
Knowledge Skills And Abilities
- Technical domain knowledge along with understandings for the costs for delivering the required services
- Competency to interpret and summarize technical information for presentation to non-technical business contacts
- Knowledgeable in security technologies, procedures, and best practices
- Knowledge of the BCBS system and practices
- Competency in making operational decisions, monitoring progress and reporting results
- Able to communicate at all levels, with experience in leading operational review meetings with business partners and executives that may range from technical resources to Officers
Certifications & Licenses
- Preferred: Certified Information Systems Security Professional (CISSP) - ISC22
- Preferred: Certified in Risk and Information Systems Control (CRISC) - ISACA
- Preferred: Certified Information Systems Auditor (CISA) - ISACA
Additional Information
Architecture experience:
- Experience in implementing and managing core security architecture processes
- Experience in application security and development processes
- Experience with implementation of technical security architectures within a large enterprise environment is preferred