NewYork-Presbyterian Hospital
Manager Information Security
Join to apply for the
Manager Information Security
role at
NewYork-Presbyterian Hospital .
Job Summary NYP is seeking an experienced and driven Threat Hunting Manager to lead the development and ongoing operations of our new Threat Hunting Team. This is a unique opportunity to build and shape the function from the ground up, driving strategy, operations, and execution to protect our organization against evolving cyber threats.
Key Responsibilities
Build and lead the Threat Hunting team, defining goals, processes, and key performance metrics
Foster a culture of continuous learning, collaboration, and operational excellence
Oversee collection, processing, and dissemination of tactical, operational, and strategic threat intelligence
Establish presence in attacker communities for the purpose of honeypot-style intelligence collections
Provide timely, actionable intelligence reports to internal stakeholders, including SOC, IR, and executive leadership
Evaluate threat intelligence feeds to determine attack source/pattern/authorship and risk to NYP
Integrate threat intelligence with existing security infrastructure (SIEM, SOAR, etc.)
Automate and optimise threat hunting workflows and data enrichment processes
Act as a point of contact for intelligence sharing with industry partners, government entities, and information sharing organisations (e.g., H‑ISAC)
Represent the Threat Hunting team in cross‑functional meetings and security incident response efforts
Experience
Proven experience (6+ years) in cybersecurity with a focus on threat intelligence, including 3+ years in a leadership or managerial role
Demonstrated success in building or scaling a threat hunting program or team
Strong knowledge of adversary behavioural frameworks (e.g., MITRE ATT&CK), indicators, and threat reporting frameworks (STIX/TAXII)
Hands‑on experience with defence countermeasures, exploits, attack‑vector selection, and impersonation
Knowledge of dark web, undernet, Tor, and similar locales for bad‑actor information sharing
Excellent analytical, communication, and presentation skills
Ability to work independently and thrive in a fast‑paced environment
Experience collaborating with SOC, IR, and other cybersecurity functions
Requirements
B.S. degree in a computer science, information technology, or a computer related discipline or equivalent degree
5‑7 years of relevant work experience
Knowledge and experience with authentication mechanisms, including RADIUS servers, two‑factor platforms and federation platforms
Knowledge and experience with networking, network security platforms including SIEM, firewalls, intrusion detection and prevention, web proxies and internet content filtering
Knowledge and experience with cryptography and encryption products, data loss prevention, mobile device management
Strong communication skills to communicate systems proposals to management and customers, and provide systems diagnoses and resolution for current systems
Strong organisational skills to prioritise work, balance, and lead complex projects
Strong interpersonal skills to interact with customers, senior level personnel, subordinates, and team members
Strong leadership skills to guide and mentor the work of less experienced personnel
Location & Working Conditions May require occasional on‑site presence; should live within a commutable distance. No relocation assistance available.
Equal Opportunity Employer NewYork‑Presbyterian Hospital is an equal opportunity employer.
Salary $169,000‑$217,000/Annual
#J-18808-Ljbffr
Manager Information Security
role at
NewYork-Presbyterian Hospital .
Job Summary NYP is seeking an experienced and driven Threat Hunting Manager to lead the development and ongoing operations of our new Threat Hunting Team. This is a unique opportunity to build and shape the function from the ground up, driving strategy, operations, and execution to protect our organization against evolving cyber threats.
Key Responsibilities
Build and lead the Threat Hunting team, defining goals, processes, and key performance metrics
Foster a culture of continuous learning, collaboration, and operational excellence
Oversee collection, processing, and dissemination of tactical, operational, and strategic threat intelligence
Establish presence in attacker communities for the purpose of honeypot-style intelligence collections
Provide timely, actionable intelligence reports to internal stakeholders, including SOC, IR, and executive leadership
Evaluate threat intelligence feeds to determine attack source/pattern/authorship and risk to NYP
Integrate threat intelligence with existing security infrastructure (SIEM, SOAR, etc.)
Automate and optimise threat hunting workflows and data enrichment processes
Act as a point of contact for intelligence sharing with industry partners, government entities, and information sharing organisations (e.g., H‑ISAC)
Represent the Threat Hunting team in cross‑functional meetings and security incident response efforts
Experience
Proven experience (6+ years) in cybersecurity with a focus on threat intelligence, including 3+ years in a leadership or managerial role
Demonstrated success in building or scaling a threat hunting program or team
Strong knowledge of adversary behavioural frameworks (e.g., MITRE ATT&CK), indicators, and threat reporting frameworks (STIX/TAXII)
Hands‑on experience with defence countermeasures, exploits, attack‑vector selection, and impersonation
Knowledge of dark web, undernet, Tor, and similar locales for bad‑actor information sharing
Excellent analytical, communication, and presentation skills
Ability to work independently and thrive in a fast‑paced environment
Experience collaborating with SOC, IR, and other cybersecurity functions
Requirements
B.S. degree in a computer science, information technology, or a computer related discipline or equivalent degree
5‑7 years of relevant work experience
Knowledge and experience with authentication mechanisms, including RADIUS servers, two‑factor platforms and federation platforms
Knowledge and experience with networking, network security platforms including SIEM, firewalls, intrusion detection and prevention, web proxies and internet content filtering
Knowledge and experience with cryptography and encryption products, data loss prevention, mobile device management
Strong communication skills to communicate systems proposals to management and customers, and provide systems diagnoses and resolution for current systems
Strong organisational skills to prioritise work, balance, and lead complex projects
Strong interpersonal skills to interact with customers, senior level personnel, subordinates, and team members
Strong leadership skills to guide and mentor the work of less experienced personnel
Location & Working Conditions May require occasional on‑site presence; should live within a commutable distance. No relocation assistance available.
Equal Opportunity Employer NewYork‑Presbyterian Hospital is an equal opportunity employer.
Salary $169,000‑$217,000/Annual
#J-18808-Ljbffr