Hybrid Information Security Manager

Posted 12 minutes ago

Apply now

About the role

  • Lead security operations at Beyond Finance to ensure high security standards and manage vulnerability assessments. Oversee incident response and develop a disciplined security team.

Responsibilities

  • Own the day-to-day function of the team — alert triage, signal prioritization, and escalation workflows. Ensure the team operates consistently and with a clear sense of urgency.
  • Own SIEM operations hands-on — including log source onboarding, pipeline configuration, parsing, detection coverage, rule tuning, and alert fidelity. Ensure the team is operationalizing threat intelligence and not just reacting to whatever fires first.
  • Oversee triage of security signals sourced from cloud infrastructure, endpoint detection, and network controls. Separate noise from meaningful findings and ensure high-fidelity signals reach the right team with full context.
  • Own the incident response function end-to-end — from initial escalation through containment, cross-functional coordination, and post-incident review. Ensure findings drive detection improvements and close the loop with Security Engineering where remediation is required.
  • Lead the Insider Risk process end-to-end — from identifying coverage gaps across cloud and endpoint environments, to behavioral monitoring and DLP signal review, through investigation, escalation, and case closure.
  • Own initial triage and prioritization of vulnerability findings. Size risk, assign severity, and route to Security Engineering with the context needed to make prioritization decisions.
  • Lead and develop a team of security analysts, managing performance and growth while building a culture of rigor and ownership.
  • Act as a key interface between the security function and the broader business. Work directly with HR and Legal on Insider Risk cases that require cross-functional handling, and engage with business leadership to communicate risk, provide operational context, and ensure security decisions are grounded in business impact.

Requirements

  • 5+ years of hands-on experience in security operations, incident response, or a SOC environment
  • Direct people management experience with analysts or security operations staff
  • Technical depth in SIEM platforms — log ingestion, pipeline and parsing configuration, detection engineering, and alert tuning
  • Demonstrated experience running or contributing to an Insider Risk or DLP investigation program, with the technical understanding to identify coverage gaps across cloud and endpoint environments
  • Working knowledge of vulnerability triage and risk prioritization — CVSS, asset context, business impact
  • Ability to triage and contextualize signals from cloud infrastructure and endpoint tooling
  • Clear communicator who can size and convey risk across technical and non-technical audiences.

Benefits

  • Considerable employer contributions for health, dental, and vision programs
  • Generous PTO, paid holidays, and paid parental leave
  • 401(k) matching program
  • Merit advancement opportunities
  • Career development & training

Job title

Information Security Manager

Job type

Experience level

Mid levelSenior

Salary

$145,000 - $170,000 per year

Degree requirement

Bachelor's Degree

Tech skills

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job