-
Sr. Manager, Cybersecurity Operations
- Jostens (Minneapolis, MN)
-
SENIOR MANAGER, CYBERSERCURITY OPERATIONS
ABOUT YOU:
Join our team as the Senior Manager of Cybersecurity Operations, where you’ll take the lead in safeguarding our enterprise against evolving cyber threats. In this dynamic role, you’ll manage the Managed Security Services Provider (MSSP), incident response, endpoint security, email security, vulnerability management, security configuration standards, and related activities. You will also lead the incident response function, manage cybersecurity technologies, monitor and respond to cybersecurity alerts, develop security operations processes, provide best practice recommendations to stakeholders, and have a clear understanding of the current cybersecurity threat landscape. Ready to make an impact and protect what matters most?
YOU WILL:
Manage Cybersecurity Operations Management (SOC)
+ Manage the day-to-day cyber security operations center and team including the investigation, containment, and remediation of incidents through internal process and procedures.
+ Manage the 24/7/365 Managed Security Services Provider. Work to optimize logging and monitoring solutions for log aggregation, correlation, and real-time security event monitoring.
+ Develop and maintain runbooks corresponding to potential cyber security incidents, including integration of runbooks with external stakeholders and MSSP.
+ Manage security incident triage, to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation.
+ Write and publish information security techniques, guidance, and reports on incident findings to appropriate constituencies.
+ Provide consulting and mentorship to SOC team members, including training on incident response processes and technologies.
+ Actively manage and lead the Incident Response activities and tabletop exercises.
+ Manage metrics, service levels, operational control effectiveness, and control failure remediation.
+ Plan and execute operational excellence through continuous improvement and automation.
Own Cybersecurity Tools and Solutions Management
+ Evaluate and approve IT efforts to ensure that baseline security safeguards are appropriately installed.
+ Recommend and/or approve security requirements relative to the capabilities of new information technologies.
+ Evaluate, select, implement, and maintain security tools to enhance the organization's security posture.
+ Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure they provide the intended level of protection.
+ Evaluate, select, implement, and maintain security tools to enhance the organization's security posture.
+ Administer and manage security solutions such SIEM, EDR, FIM, email filtering, domain protection, vulnerability management tools, and other application security operations capabilities.
+ Collaborate with stakeholders to align security capability solutions with business requirements.
+ Evaluate emerging security technologies and provide recommendations for their implementation.
+ Manage, maintain, and/or govern cybersecurity tools and systems used for protection, monitoring, detection, and incident response.
+ Govern the management and configuration of cybersecurity-related tools such as firewalls, email security, endpoint detection and response and other tools managed by the Infrastructure Team.
+ Define and enforce policies around certificate key usage to ensure strong security.
+ Monitor the effectiveness of security tools and make recommendations for improvements or changes as needed.
+ Directly participate in the installation, configuration, and monitoring of new cybersecurity technologies.
+ Participate in the development of cyber security policies, standards, and procedures.
+ Remain current with emerging cyber security threats and advise relevant stakeholders on the appropriate course of action.
+ Manage and develop cyber security operations metrics and reporting.
+ Participate in the Risk Governance process to provide security risks, mitigations, and input on another technical risk.
+ Oversee the development, implementation and execution of multiple projects ensuring scope, schedule, and resources are established for projects.
+ Participate in applicable security operations vendor evaluations and selections.
Provide Threat and Vulnerability Management:
+ Develop and execute vulnerability management programs to identify, prioritize, and remediate security vulnerabilities.
+ Initiate and foster partnerships with vendors, senior leadership, and across business and IT teams to drive security plans and capabilities.
+ Conduct regular assessments and vulnerability scans to identify and mitigate potential threats and vulnerabilities.
+ Monitor threat intelligence sources and stay updated on the latest security vulnerabilities and attack vectors and provide recommendations for mitigating risks.
+ Define, implement, and monitor secure system configurations and hardening standards for servers, network devices, and other critical infrastructure.
+ Develop and enforce security policies, standards, and procedures for system hardening. Conduct regular evaluations to verify compliance with security hardening standards.
+ Collaborate with security architects, development, network, server, and web teams to ensure secure configurations are implemented and maintained.
Manage Team:
+ Coach, mentor, and provide leadership to two direct reports.
+ Lead all aspects of personnel management, including hiring, promotions, performance reviews, and disciplinary actions.
+ Support the development of your team’s skills, address performance gaps, and ensure fair application of company policies in collaboration with HR.
YOU HAVE:
+ Passion. A deep passion for cybersecurity and protecting the enterprise from evolving threats.
+ Technical skills. Expertise in managing cybersecurity operations, including endpoint security, threat and vulnerability management, incident response, forensic analysis, and working with SOC MSSPs.
+ Experience. 8+ years of professional experience, including 5+ years of hands-on cybersecurity operations management and experience leading manager-level teams and senior individuals.
+ Education. A Bachelor's degree in Computer Science, Information Systems, Information Security, or a related field. Professional certifications such as CISSP, CISM, CCSP, GSEC, GCIA, or CEH.
+ Strong understanding. In-depth knowledge of cybersecurity principles, best practices, and frameworks like NIST CSF, CIS, MITRE ATT&CK, and Cyber Kill Chain, with the ability to apply them in enterprise environments.
+ Great communication skills. Ability to effectively collaborate with cross-functional teams, communicate best practices, and mentor your cybersecurity team.
+ Attention to detail. Strong organizational and time management skills to ensure security processes and standards are meticulously followed.
+ Leadership skills. Proven ability to guide, mentor, and develop a cybersecurity team while driving the implementation of technical security standards and delivering results.
+ Proficiency. Experience with project management tools like JIRA and JSM, and familiarity with industry standards like NIST, ISO 27001, GDPR, HIPAA, and PCI DSS.
LOVE WHERE YOU WORK:
+ We care about your health. We offer competitive healthcare (health, dental, vision, coverage) in addition to voluntary benefits including home and car insurance, pet insurance, flexible spending account, amongst many more.
+ We invest in your future. Our 401K plan has immediate vesting, so you can start saving for retirement right away.
+ We believe in flexibility. We provide hybrid work options.
+ We want you to unplug when needed. We believe in taking your time off without guilt and offer accrued paid time off and company paid holidays. *For Washington residents, you will receive 13 vacation days, 8 paid sick leave, 8 company paid holidays, and family paid leave.
+ We care about your development. We support tuition reimbursement after 6 months of service.
APPLICATION DEADLINE: November 30, 2025
ABOUT US:
Jostens leads the student commemoration market and has been serving local communities for over 125 years. We work with thousands of K-12 schools, colleges and universities each year, and have the honor of partnering with beloved sports teams and esteemed organizations across the country. Our iconic products — like yearbooks, letter jackets, class jewelry and championship rings — keep meaningful traditions alive and inspire millions of people to celebrate their unique stories, milestone moments and biggest accomplishments every year. We have 13 first-class facilities across the globe, from North America to the Caribbean. Watch a short video about us here (https://f.io/HIAsH659) .
ALL ABOUT TECHNOLOGY:
Our Technology organization combines planning, analysis, and development in combination with both enterprise retail and manufacturing platforms as well as custom development using primarily Java, web services, and web application frameworks like ReactJS/NodeJS. The Technology organization manages priorities through a centralized quarterly planning in close collaborative with business decision-making and strategy, directly supporting leadership in Marketing, Sales, Digital & Operations. Delivery is managed through typically an agile, two-week scrum or Kanban methodology leveraging a suite of Atlassian products. The Technology teams are structured organizationally to focus on key platforms and the business units that they. Though the utilization of best-in-class technical software, such as AWS, Tableau, SAP BPC, Oracle EBS, Salesforce, & Microsoft 360, you will get to play a critical role in determining technology solutions that steer our business. Jostens allows for a hybrid work setting that focuses on creating professional and personal development. We can’t wait to show you what our Technology Team has to offer at Jostens!
AMERICANS WITH DISABILITIES ACT (ADA):
Jostens is committed to the full inclusion of all qualified individuals. If reasonable accommodation is required to fully participate in the job application or interview process, or to perform the essential functions of the position, please reach out to our HR team at [email protected] or (952) 830-3399.
Jostens is an Equal Opportunity Employer and complies with applicable employment laws. EOE/M/F/Vet/Disabled are encouraged to apply.
California Privacy Policy: https://www.jostens.com/about/california-employee-privacy-policy
-