At DICK’S Sporting Goods, we believe in how positively sports can change lives. On our team, everyone plays a critical role in creating confidence and excitement by personally equipping all athletes to achieve their dreams. We are committed to creating an inclusive and diverse workforce, reflecting the communities we serve.
If you are ready to make a difference as part of the world’s greatest sports team, apply to join our team today!
OVERVIEW:
The Manager, Cybersecurity Engineering - Edge Security/Bot Mitigation will drive strategic support, engineering, and operations of critical cybersecurity technologies covering edge security and bot mitigation to assure the security posture of the organization’s e-commerce and mobile channels as a security liaison to business and technology stakeholders. This role requires the ability to translate the technology risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The role coordinates the technology organization’s technical activities to consult and assure the security posture of the organization via edge security and bot mitigation infrastructure while providing regular status and service-level reports to management.
An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. Expertise in leading project teams and developing and managing projects is essential for success in this role. As well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting. Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position.
The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the position. Technology personnel responsible for managing technical security infrastructure may report directly to the role or may report to other areas of Technology with their security-related activities coordinated by the role.
ROLE RESPONSIBILITIES:
Strategy and People Leadership: Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements. Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals and objectives. Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members.
Security Liaison: Assist resource owners and technology staff in understanding and responding to security audit failures reported by auditors. Provide security communication and awareness for audiences, which may range from senior leaders to field staff. Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums. Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support for legal and regulatory compliance efforts, including audit support.
Security Engineering: Consult with technology and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software. Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with technology management to align existing technical installed base and skills with future architectural requirements. Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory, and audit requirements.
Operational Support: Coordinate, measure and report on the technical aspects of security management. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Support operational components of incident management, including detection, response and reporting. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other technology projects. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of networks and endpoint systems, and manage the remediation of identified risks.
QUALIFICATIONS:
Bachelor’s Degree or equivalent experience in management information systems, computer science, information security/cybersecurity
3-5 years of experience in identity and access management, security threat detection and risk management, technology controls, security frameworks, DevSecOps, staff mentorship & development
CISM (preferred)
CISSP (preferred)
Targeted Pay Range: $95,200.00 - $158,800.00. This is part of a competitive total rewards package that could include other components such as: incentive, equity and benefits. Individual pay is determined by a number of factors including experience, location, internal pay equity, and other relevant business considerations. We review all teammate pay regularly to ensure competitive and equitable pay.DICK’S Sporting Goods complies with all state paid leave requirements. We also offer a generous suite of benefits. To learn more, visit www.benefityourliferesources.com.