Kenosha, Wisconsin, USA
1 day ago
Security Operations Lead

At Jockey, caring is our responsibility. It’s the fabric of who we are and drives everything we do. It drives us to listen, innovate, and improve. To design thoughtfully. To craft skillfully. To give back wholeheartedly. Founded in 1876, Jockey is a family-owned company recognized the world over for delivering feel-good comfort. Our premium apparel is sold in more than 140 countries and our commitment to quality, innovation and customer service is legendary.

The Security Operations Lead, reporting to the Information Security Manager, plays a pivotal role in safeguarding the Jockey’s digital assets and ensuring the integrity of Jockey’s IT infrastructure. This role encompasses monitoring and remediating security alerts, conducting in-depth investigations, and responding to incidents. The role will lead efforts in vulnerability assessments, ensuring that scans align with a well-defined vulnerability management process and work with IT teams to prioritize and remediate identified risks. Additionally, the role requires a proactive approach to governance, risk, and compliance, helping Jockey adhere to regulatory requirements and security frameworks.

This individual will be instrumental in improving security processes, maintaining compliance documentation, and fostering a culture where security is integrated into everyday business practices. They will also be responsible for collaborating with various teams, evaluating new tools and technologies, and continuously enhancing security measures. By staying informed about emerging threats and pursuing ongoing education, the analyst ensures that the organization remains resilient against evolving cyber risks.

Requirements:

-Bachelor’s degree in Cybersecurity, Information Technology, or a related field.
-3-5 years of experience in information security or a related role.
-Technical knowledge of enterprise-class technologies such as firewalls, routers, switches, wireless access points, VPNs, and desktop and server operating systems.
-Good understanding of enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems.
-Familiarity with security tools such as CrowdStrike, Proofpoint, Netwrix, Arctic Wolf and O365.
-Working experience with creating, implementing, and managing a threat-hunting program within a corporate environment.

Confirm your E-mail: Send Email