New York, NY

Executive Director, Global Head-Cyber Threat Management

Talener

The Client:  We are a global 8-billion-dollar company which is HQ’d in NYC.  We are one of the world’s largest leading manufacturers and marketers of high-end skincare, makeup, fragrance, and hair care products.  We have a strong global presence, and our products are widely available in all stores globally.
Job Title: Executive Director, Cyber Threat Management Center Lead
Location: HQ in NYC, role 100%
Required Technology & Skills & Responsibilities
The ED, Global Head of Cybersecurity Threat Management will run and grow a global team managing all aspects of cyber threat management, consistent with the threats and scale of a Fortune 500 retail, wholesale, and manufacturing enterprise entering a period of rapid business growth through innovation and acquisition. This includes threat modeling, threat intelligence, incident detection, interruption of the kill chain, and damage control.  Cyber Threat Management is involved in all aspects of the business, including all brands, functions, and regions worldwide. Interaction with all levels of business leadership is expected as part of communicating both preparedness against attacks and the impact of attacks that do occur.
 
This role necessarily deals with sensitive and highly sensitive information, and the role is expected to both define appropriate handling of such information for the enterprise and to implement best handling practices.
  • Operate the Cyber Threat Management function with complete accountability.
  • Stop and mitigate complex attacks to protect our global organization.  This will require emergency decisions in response to active attacks outside of routine technology processes and communication of those decisions to technical personnel and senior leaders.
  • Execute key operational decisions with potentially high impact affecting attacks and threats facing our company. These include, but are not limited to, spam campaigns, malware campaigns, organized criminal operations, and nation-state operations.
  • Manage the budget for Cyber Threat Management. This role is fully accountable for several million dollars of operating budget, including decisions over hiring, consulting engagements, outsourcing, and services. Budget management includes assessing growth (or contraction) needs and making appropriate business cases to justify changes with support from business leadership.
  • Deep information and cybersecurity operations and response expertise, including deep expertise with and/or experience leading Cybersecurity operations (identify, protect, detect, respond, and recover functions); vulnerability management; reverse engineering, malware, and attack patterns (offensive and defensive technologies);table top scenario planning; penetration testing/red teaming; mobile security; vulnerability scanning/identification/management and patch management; threat intelligence monitoring; network/endpoint/perimeter/cloud/DNS/.com monitoring; incident management; data leakage protection; application security monitoring; policies, standards, and procedures; and information security metrics.  Hands on experience in these domains and other key technology domains, such as coding/developing, understanding technology standards, deploying new technologies, and integrating new and existing technologies. 
  • Business expertise to perform just-in-time risk management and incident management guidance and leadership – especially given a growing and changing business and cyber risk landscape.  Understanding of retail/manufacturing sufficient to correlate attackers’ motives to business impacts and to appropriately adjust controls.  Management of a 24/7 cyber threat management operation (e.g., a Security Operations Center (SOC)). Understanding of holistic monitoring, including POS systems, IOT devices, physical security environments, etc. 
  • Strong experience in next-generation monitoring, including tools for supervised and artificial learning, artificial intelligence, user and entity behavior analytics, visualization technologies, and managing outsourced vendors for monitoring.   
  •  Strong leadership and management skills, including experience leading rapidly changing organizations, managing vendor relationships, managing consultants and matrixed teams; managing budgets, making critical and timely decisions, and solving unique and complex problems. 
  • Executive-level communications and interpersonal skills, including experience briefing C-level leaders, influencing others, and engaging with information security and other leaders across industries.
  • Experience handling, securing, and communicating highly confidential and sensitive information.
Qualifications
  • Leadership and Management
  • Situational Awareness, Communications, and Training
  • Incident Triage, Analysis, and Response
  • Cyber Threat Intelligence, Hunting, and Analytics
  • Vulnerability Management
  • Expanded SOC Operations
  • SOC Tools, Architecture, and Engineering
Compensation & Benefits
  • Salary range 150K-250K
  • Bonuse eligible
  • Share incentive plan.
  • Fortune 100 full benefits plan
Please email Brian Samela bsamela@talener.com for more information or to apply. 
 
 
 
 
 

{“@context”:”http://schema.org”,”@type”:”JobPosting”,”baseSalary”:null,”datePosted”:”2024-09-19″,”validThrough”:”2024-09-19″,”description”:”<div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">The Client:</strong></span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>We are a global&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>8-billion-dollar</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;company which is HQ&rsquo;d in NYC.</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>We are one of the world&rsquo;s largest leading&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>manufacturers</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;and&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>marketers</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;of&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>high-end</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;skincare, makeup, fragrance, and hair care products.</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>We have a strong global&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>presence,</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;and our products are widely available in all stores globally.</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Job Title:</strong></span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';color:#333333;" style='font-family: "Times New Roman"; color: rgb(51, 51, 51); box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Executive Director, Cyber Threat Management Center Lead</strong></span></div><div fr-original-style="font-size: 16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';color:#333333;" style='font-family: "Times New Roman"; color: rgb(51, 51, 51); box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Location: HQ in NYC, role 100%</strong></span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';color:#333333;" style='font-family: "Times New Roman"; color: rgb(51, 51, 51); box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Required Technology &amp; Skills</strong></span><span fr-original-style="font-family:'Times New Roman';color:#333333;" style='font-family: "Times New Roman"; color: rgb(51, 51, 51); box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">&nbsp;&amp; Responsibilities</strong></span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>The ED, Global Head of Cybersecurity Threat Management will run</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>and</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>grow a global team managing all aspects of cyber threat management, consistent with the threats and scale of a Fortune 500 retail, wholesale, and manufacturing enterprise entering a period of rapid business growth through innovation and acquisition. This includes threat modeling, threat intelligence, incident detection, interruption of the kill chain, and damage control.</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>Cyber Threat Management is involved in all aspects of the business, including all brands, functions, and regions worldwide. Interaction with all levels of business leadership is expected as part of communicating both preparedness against attacks and the impact of attacks that do occur.</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>This role necessarily deals with sensitive and highly sensitive information, and the role is expected to both define appropriate handling of such information for the enterprise and to implement best handling&nbsp;</span><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>practices.</span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Operate the Cyber Threat Management function with complete accountability.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Stop and mitigate complex attacks to protect&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>our global organization.&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>This will require emergency decisions in response to active attacks outside of routine technology processes and communication of those decisions to technical personnel and senior leaders.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Execute</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;key operational decisions with potentially high impact affecting attacks and threats facing&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>our company</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>. These include, but are not limited to, spam campaigns, malware campaigns, organized criminal operations, and nation-state operations.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Manage the budget for Cyber Threat Management. This role is fully accountable for several million dollars of operating budget, including decisions over hiring, consulting engagements, outsourcing, and services. Budget management includes assessing growth (or contraction) needs and making appropriate business cases to justify changes with support from business leadership.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Deep information and cybersecurity operations and response expertise, including deep expertise with and/or experience leading&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Cybersecurity</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;operations (identify, protect, detect, respond, and recover functions); vulnerability management; reverse engineering, malware, and attack patterns (offensive and defensive technologies);table top scenario planning; penetration testing/red teaming; mobile security; vulnerability scanning/identification/management and patch management; threat intelligence monitoring; network/endpoint/perimeter/cloud/DNS/.com monitoring; incident management; data leakage protection; application security monitoring; policies, standards, and procedures; and information security metrics.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Hands on experience in these domains and other key technology domains, such as coding/developing,&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>understanding technology standards, deploying new technologies, and integrating new and existing technologies.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Business expertise to perform just-in-time risk management and incident management guidance and leadership &ndash; especially given a growing and changing business and cyber risk landscape.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Understanding of retail/manufacturing sufficient to correlate attackers&rsquo; motives to business impacts and to appropriately adjust controls.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Management of a 24/7 cyber threat management operation (</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>e.g.,</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;a Security Operations Center (SOC)). Understanding of holistic monitoring, including POS systems, IOT devices, physical security environments, etc.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Strong experience in next-generation monitoring, including tools for supervised and artificial learning, artificial intelligence, user and entity behavior analytics, visualization technologies, and managing outsourced vendors for monitoring.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Strong leadership and management skills, including experience leading rapidly changing organizations, managing vendor relationships, managing consultants and matrixed teams; managing budgets, making critical and timely decisions, and solving unique and complex problems.</span><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>&nbsp;</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Executive-level communications and interpersonal skills, including experience briefing C-level leaders, influencing others, and engaging with information security and other leaders across industries.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Experience handling, securing, and communicating highly confidential and sensitive information.</span></li></ul><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Qualifications</strong></span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Leadership and Management</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Situational Awareness, Communications, and Training</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Incident Triage, Analysis, and Response</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Cyber Threat Intelligence, Hunting, and Analytics</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Vulnerability Management</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Expanded SOC Operations</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>SOC Tools, Architecture, and Engineering</span></li></ul><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'><strong fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; font-weight: bold;">Compensation &amp; Benefits</strong></span></div><ul fr-original-style="" style="box-sizing: border-box; font-family: inherit; font-size: inherit; margin-top: 0px; margin-bottom: 10px;" type="disc"><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Salary range 150K-250K</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Bonuse eligible</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Share incentive plan.</span></li><li fr-original-style="font-family:serif;font-size:13px;" style="font-family: serif; font-size: 13px; box-sizing: border-box;"><span fr-original-style="font-family:'Times New Roman';font-size:16px;" style='font-family: "Times New Roman"; font-size: 16px; box-sizing: border-box;'>Fortune 100 full benefits plan</span></li></ul><div fr-original-style="line-height:108%;font-size:16px;" style="line-height: 108%; font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>Please email Brian Samela&nbsp;</span><a fr-original-style="" href="mailto:bsamela@talener.com" style="box-sizing: border-box; background: transparent; color: rgb(0, 112, 192); text-decoration: none; user-select: auto; font-family: inherit; font-size: inherit; cursor: pointer;"><span fr-original-style="font-family:'Times New Roman';color:#0563c1;" style='font-family: "Times New Roman"; color: rgb(5, 99, 193); box-sizing: border-box; font-size: inherit;'>bsamela@talener.com</span></a><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;for more information or to apply.&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Times New Roman';" style='font-family: "Times New Roman"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div><div fr-original-style="font-size:16px;" style="font-size: 16px; box-sizing: border-box; font-family: inherit;"><span fr-original-style="font-family:'Optima LT Std';" style='font-family: "Optima LT Std"; box-sizing: border-box; font-size: inherit;'>&nbsp;</span></div>”,”employmentType”:”FULL_TIME”,”hiringOrganization”:{“@type”:”Organization”,”name”:”Talener”},”jobLocation”:{“@type”:”Place”,”address”:{“@type”:”PostalAddress”,”streetAddress”:null,”addressLocality”:”New York”,”addressRegion”:”NY”,”postalCode”:null,”addressCountry”:null}},”title”:”Executive Director, Global Head-Cyber Threat Management”,”url”:”https://talener.com/jobs/?cjobid=BS346237918&rpid=1027306&postid=zbl8nIhyZXg”,”identifier”:{“@type”:”PropertyValue”,”name”:”Talener”,”value”:null}}

We take a direct path to technology staffing success.