Security Lead

CGI

Not Interested
Bookmark
Report This Job

profile Job Location:

Tallahassee, FL - USA

profile Monthly Salary: $ 110000 - 140000
Posted on: 2 days ago
Vacancies: 1 Vacancy

Job Summary

Position Description:

Join a fastgrowing information security team supporting one of the worlds largest IT providers. As part of the US GTO Security Strategy and Solutions team the Security Lead (Security Manager/CSO) oversees physical and cyber security operations partners with IT and senior leadership and leads a team of five professionals to deliver compliant effective security programs across U.S.-based industries.

The preferred location is Nashville TN but may be located within proximity of any CGI US location. This role requires up to 25% travel.

Future Duties and Responsibilities

. Developing Security Policies and Procedures: Develop comprehensive security policies and procedures that cover various aspects of security including physical security cyber security and data protection.
. Risk Assessment and Management: Conduct regular risk assessments to identify potential security threats and vulnerabilities that include analyzing the organizations assets evaluating the potential risks and implementing measures to mitigate these risks.
. Implementing Security Measures: Implement appropriate security measures including installation of surveillance systems access control mechanisms and cybersecurity tools.
. Monitoring Security Operations: Continuous monitoring of security operations including overseeing the operation of security systems monitoring potential security incidents and responding promptly to any alerts or breaches.
. Incident Response and Management: Coordinate with relevant teams investigate the incident take corrective actions to resolve the issue and conduct a post-incident analysis to identify lessons learned and improve future incident response strategies.
. Training and Awareness: Educate employees about security best practices. This involves organizing regular training sessions and awareness programs.
. Compliance and Regulatory Requirements: Ensure the organization complies with all relevant security regulations and standards. This includes staying up to date with changes in laws and regulations conducting regular audits and implementing necessary changes to remain compliant.
. Liaison with External Agencies: Act as the primary point of contact between the organization and external security agencies such as law enforcement regulatory bodies and cybersecurity experts.
. Budget Management: Plan and allocate resources for various security initiatives ensuring that the organization invests in the right security technologies and solutions.
. Leadership and Team Management: Establish clear goals provide regular feedback and ensure the team has the necessary skills and resources to perform their duties effectively.
. Reporting and Documentation: Maintain detailed records of all security activities incidents and audits. Provide regular reporting to senior management and other stakeholders.
. Industry Best Practices: Continuously seek ways to improve the organizations security posture and be informed about the latest security trends technologies and best practices.

Required Qualifications to be Successful in this Role
Knowledge and Skills:

. Strong knowledge of cybersecurity principles standards and best practices
. Proficiency in network security technologies (firewalls VPNs IDS/IPS monitoring tools)
. Experience securing Windows Linux and Unix environments
. Understanding of secure coding and application security principles
. Knowledge of encryption cryptographic protocols and key management
. Hands-on experience with vulnerability assessment and penetration testing
. Familiarity with cloud security architectures and best practices
. Solid understanding of core networking protocols (TCP/IP DNS DHCP routing)
. Experience implementing security controls to meet regulatory requirements (e.g. GDPR HIPAA PCI DSS)

Technical Proficiency:

. Hands-on experience with SIEM endpoint protection IDS and vulnerability scanning tools
. Strong understanding of network and web protocols and related security risks (e.g. HTTP SSL/TLS SMTP DNS)
. Knowledge of industry security frameworks including NIST ISO 27001 and CIS Controls
. Proficiency in Python and PowerShell

Analytical and Problem-Solving Skills:

. Strong analytical skills to identify and assess security risks and vulnerabilities; as well as determination of root causes and recommend remediation actions.
. Excellent problem-solving skills to develop effective security solutions and countermeasures.

Communication and Collaboration:

. Strong written and verbal communication skills.
. Ability to collaborate effectively with cross-functional teams including IT development and operations to implement security measures and respond to security incidents.
. Experience in creating and delivering security training and awareness programs.

Preferred Certifications:
Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Certified Cloud Security Professional (CCSP) or GIAC Security certifications.
Other Information:
CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set level experience relevant training and licensure and certifications. To support the ability to reward for merit-based performance CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $110000.00 - $140000.00.
CGI anticipates accepting applications until February 13 2026.
CGIs benefits are offered to eligible professionals on their first day of employment to include:

. Competitive compensation
. Comprehensive insurance options
. Matching contributions through the 401(k) plan and the share purchase plan
. Paid time off for vacation holidays and sick time
. Paid parental leave
. Learning opportunities and tuition assistance
. Wellness and Well-being programs

Your future duties and responsibilities:

Developing Security Policies and Procedures: Develop comprehensive security policies and procedures that cover various aspects of security including physical security cyber security and data protection.
Risk Assessment and Management: Conduct regular risk assessments to identify potential security threats and vulnerabilities that include analyzing the organizations assets evaluating the potential risks and implementing measures to mitigate these risks.
Implementing Security Measures: Implement appropriate security measures including installation of surveillance systems access control mechanisms and cybersecurity tools.
Monitoring Security Operations: Continuous monitoring of security operations including overseeing the operation of security systems monitoring potential security incidents and responding promptly to any alerts or breaches.
Incident Response and Management: Coordinate with relevant teams investigate the incident take corrective actions to resolve the issue and conduct a post-incident analysis to identify lessons learned and improve future incident response strategies.
Training and Awareness: Educate employees about security best practices. This involves organizing regular training sessions and awareness programs.
Compliance and Regulatory Requirements: Ensure the organization complies with all relevant security regulations and standards. This includes staying up to date with changes in laws and regulations conducting regular audits and implementing necessary changes to remain compliant.
Liaison with External Agencies: Act as the primary point of contact between the organization and external security agencies such as law enforcement regulatory bodies and cybersecurity experts.
Budget Management: Plan and allocate resources for various security initiatives ensuring that the organization invests in the right security technologies and solutions.
Leadership and Team Management: Establish clear goals provide regular feedback and ensure the team has the necessary skills and resources to perform their duties effectively.
Reporting and Documentation: Maintain detailed records of all security activities incidents and audits. Provide regular reporting to senior management and other stakeholders.
Industry Best Practices: Continuously seek ways to improve the organizations security posture and be informed about the latest security trends technologies and best practices.

Required qualifications to be successful in this role:

Knowledge and Skills:
Strong knowledge of cybersecurity principles standards and best practices
Proficiency in network security technologies (firewalls VPNs IDS/IPS monitoring tools)
Experience securing Windows Linux and Unix environments
Understanding of secure coding and application security principles
Knowledge of encryption cryptographic protocols and key management
Hands-on experience with vulnerability assessment and penetration testing
Familiarity with cloud security architectures and best practices
Solid understanding of core networking protocols (TCP/IP DNS DHCP routing)
Experience implementing security controls to meet regulatory requirements (e.g. GDPR HIPAA PCI DSS)
Technical Proficiency:
Hands-on experience with SIEM endpoint protection IDS and vulnerability scanning tools
Strong understanding of network and web protocols and related security risks (e.g. HTTP SSL/TLS SMTP DNS)
Knowledge of industry security frameworks including NIST ISO 27001 and CIS Controls
Proficiency in Python and PowerShell
Analytical and Problem-Solving Skills:
Strong analytical skills to identify and assess security risks and vulnerabilities; as well as determination of root causes and recommend remediation actions.
Excellent problem-solving skills to develop effective security solutions and countermeasures.
Communication and Collaboration:
Strong written and verbal communication skills.
Ability to collaborate effectively with cross-functional teams including IT development and operations to implement security measures and respond to security incidents.
Experience in creating and delivering security training and awareness programs.

Preferred Certifications:
Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Certified Cloud Security Professional (CCSP) or GIAC Security certifications.



Other Information:

CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set level experience relevant training and licensure and certifications. To support the ability to reward for merit-based performance CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $110000.00 - $140000.00.

CGI anticipates accepting applications until February 13 2026.

CGIs benefits are offered to eligible professionals on their first day of employment to include:

Competitive compensation
Comprehensive insurance options
Matching contributions through the 401(k) plan and the share purchase plan
Paid time off for vacation holidays and sick time
Paid parental leave
Learning opportunities and tuition assistance
Wellness and Well-being programs

Skills:

  • Identity and Access Mgt (IAM)
  • Linux
  • Windows

What you can expect from us:

Together as owners lets turn meaningful insights into action.

Life at CGI is rooted in ownership teamwork respect and belonging. Here youll reach your full potential because

You are invited to be an owner from day 1 as we work together to bring our Dream to life. Thats why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our companys strategy and direction.

Your work creates value. Youll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas embrace new opportunities and benefit from expansive industry and technology expertise.

Youll shape your career by joining a company built to grow and last. Youll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons.

Come join our teamone of the largest IT and business consulting services firms in the world.

Qualified applicants will receive consideration for employment without regard to their race ethnicity ancestry color sex religion creed age national origin citizenship status disability pregnancy medical condition military and veteran status marital status sexual orientation or perceived sexual orientation gender gender identity and gender expression familial status or responsibilities reproductive health decisions political affiliation genetic information height weight or any other legally protected status or characteristics to the extent required by applicable federal state and/or local laws where we do business.

CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S. please email the CGI U.S. Employment Compliance mailbox at . You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned.

We make it easy to translate military experience and skills! Click
here to be directed to our site that is dedicated to veterans and transitioning service members.

All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements and in accordance with applicable laws some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances.

CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about discussed or disclosed their own pay or the pay of another employee or applicant. However employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information unless the disclosure is (a) in response to a formal complaint or charge (b) in furtherance of an investigation proceeding hearing or action including an investigation conducted by the employer or (c) consistent with CGIs legal duty to furnish information.

Position Description:Join a fastgrowing information security team supporting one of the worlds largest IT providers. As part of the US GTO Security Strategy and Solutions team the Security Lead (Security Manager/CSO) oversees physical and cyber security operations partners with IT and senior leaders...
View more view more

Key Skills

  • Administrative Skills
  • Facilities Management
  • Biotechnology
  • Creative Production
  • Design And Estimation
  • Architecture

About Company

Company Logo

The COMPANY is one of the few end-to-end consulting firms with the scale, reach, capabilities and commitment to meet clients’ enterprise digital transformation needs. Our 77,500 consultants and professionals work side-by-side with clients in 10 industries across more than 400 location ... View more

View Profile View Profile