
Talener
- Responsible for managing security operations to include SIEM, IAM, incident response and threat detection
- Oversee the development and enforcement of security policies, procedures, and best practices for Microsoft Azure environments, including IaaS, PaaS, and SaaS.
- Manage a team of Security Analyst as well as all relationships with MSP’s
- Monitor authentication and access activity using analytics to detect anomalies
- Define for KPI’s for incident response and vulnerability management
- Develop incident response playbook and conduct regular simulations
- Evaluate third party providers to ensure they adhere to data protection policies
- Utilize KPIs tools to track progress, analyze outcomes, and drive continuous improvement
- Manage DLP controls and detection mechanisms
- 10+ years of experience Information Security
- 3+ years of experience in a management role
- Deep technical expertise with SIEM tools (e.g., Splunk, Microsoft Sentinel, QRadar)
- Strong hands-on experience in Azure security: Defender for Cloud, Azure Security Center, Azure Policies, Key Vault, identity governance (AAD), and Azure Monitor.
- Certifications such as CISSP, CISM, Azure Security Engineer Associate, Microsoft Cybersecurity Architect, or GIAC are all nice to have
- Bachelors degree is nice to have
- $165,000-180,000
- Annual bonus
- 401k matching
{“@context”:”http://schema.org”,”@type”:”JobPosting”,”baseSalary”:null,”datePosted”:”2025-05-12″,”validThrough”:”2026-05-12″,”description”:”<div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Our client is a leading </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">asset management firm in </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Boston</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> and they are looking to hire a </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Director</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> of Security</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">to lead and evolve </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">their</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> enterprise security operations with a focus on SIEM platforms and Azure Cloud Securi</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">ty</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">.</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">This</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> role is a mix of manag</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">ing 4 Security Analysts as well as being </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">hands on</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">.</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">The ideal candidate will </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">have had</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> experience working as an InfoSec or Network Engineer and </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">worked</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> their way into a management position.</span></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;"> </strong></span></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Title:</strong></span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;"> </strong></span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Director, Information Security Operations</span></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Location:</strong></span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Boston, MA</span></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Responsibilities:</strong></span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Responsible for managing security operations to include SIEM, IAM, incident response and threat detection</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Oversee the development and enforcement of security policies, procedures, and best practices for Microsoft Azure environments, including IaaS, PaaS, and SaaS.</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Manage a team of Security Analyst</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> as well as all </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">relationship</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">s</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> with MSP’s</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Monitor authentication and access activity using analytics to detect anomalies</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Define for KPI’s for incident response and vulnerability management</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Develop incident response playbook and conduct regular simulations</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Evaluate third party providers to ensure they adhere to data protection policies</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Utilize KPIs tools to track progress, analyze outcomes, and drive continuous improvement</span></li><li fr-original-style="font-family:serif;font-size:15px;background-color:#ffffff;" style="font-family: serif; font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Manage DLP controls and detection mechanisms</span></li></ul><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;color:#1d1d1d;" style="font-family: Calibri; color: rgb(29, 29, 29); box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Qualifications:</strong></span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="line-height:108%;font-family:serif;font-size:15px;" style="line-height: 108%; font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">10+ years of experience </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Information Security</span></li><li fr-original-style="line-height:108%;font-family:serif;font-size:15px;" style="line-height: 108%; font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">3+ years of experience in a management role</span></li><li fr-original-style="line-height:108%;font-family:serif;font-size:15px;" style="line-height: 108%; font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Deep technical expertise with SIEM tools (e.g., Splunk, Microsoft Sentinel, </span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">QRadar</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">)</span></li><li fr-original-style="line-height:108%;font-family:serif;font-size:15px;" style="line-height: 108%; font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Strong hands</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">-on experience in Azure security: Defender for Cloud, Azure Security Center, Azure Policies, Key Vault, identity governance (AAD), and Azure Monitor.</span></li><li fr-original-style="line-height:108%;font-family:serif;font-size:15px;" style="line-height: 108%; font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">C</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">ertifications such as CISSP, CISM, Azure Security Engineer Associate, Microsoft Cybersecurity Architect, or GIAC</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> are all nice to have</span></li><li fr-original-style="font-family:serif;font-size:15px;" style="font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Bachelors</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> degree is nice to have</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;"> </strong></span></li></ul><div fr-original-style="font-size:15px;" style="font-size: 15px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Compensation:</strong></span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="font-family:serif;font-size:15px;" style="font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">$</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">1</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">65,000-180,000</span><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></li><li fr-original-style="font-family:serif;font-size:15px;" style="font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">Annual bonus</span></li><li fr-original-style="font-family:serif;font-size:15px;" style="font-family: serif; font-size: 15px; box-sizing: border-box;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;">401k matching</span></li></ul><div fr-original-style="font-size:16px;background-color:#ffffff;" style="font-size: 16px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;font-size:15px;" style="font-family: Calibri; font-size: 15px; box-sizing: border-box;">For additional information, please reach out to </span><span fr-original-style="font-family:Calibri;font-size:15px;" style="font-family: Calibri; font-size: 15px; box-sizing: border-box;">J</span><span fr-original-style="font-family:Calibri;font-size:15px;" style="font-family: Calibri; font-size: 15px; box-sizing: border-box;">ed Pillion at </span><span fr-original-style="font-family:Calibri;font-size:15px;" style="font-family: Calibri; font-size: 15px; box-sizing: border-box;"> </span><a fr-original-style="" href="mailto:jpillion@talener.com" style="box-sizing: border-box; background: transparent; color: rgb(0, 112, 192); text-decoration: none; user-select: auto; font-family: inherit; font-size: inherit; cursor: pointer;"><span fr-original-style="font-family:Calibri;font-size:15px;color:#0563c1;" style="font-family: Calibri; font-size: 15px; color: rgb(5, 99, 193); box-sizing: border-box;">jpillion@talener.com</span></a></div><div fr-original-style="font-size:15px;background-color:#ffffff;" style="font-size: 15px; background-color: rgb(255, 255, 255); box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></div><div fr-original-style="line-height:108%;font-size:15px;" style="line-height: 108%; font-size: 15px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:Calibri;" style="font-family: Calibri; box-sizing: border-box; font-size: inherit;"> </span></div>”,”employmentType”:”FULL_TIME”,”hiringOrganization”:{“@type”:”Organization”,”name”:”Talener”},”jobLocation”:{“@type”:”Place”,”address”:{“@type”:”PostalAddress”,”streetAddress”:null,”addressLocality”:”Boston”,”addressRegion”:”MA”,”postalCode”:null,”addressCountry”:null}},”title”:”Director, Information Security Operations”,”url”:”https://talener.com/jobs/?cjobid=JP95676258&rpid=1395233&postid=G-9hcx-43tA”,”identifier”:{“@type”:”PropertyValue”,”name”:”Talener”,”value”:null}}