Triune Infomatics Inc
Information Security Manager (Santa Clara)
Triune Infomatics Inc, Santa Clara, California, United States, 95053
Role: Cybersecurity Manager
Location: Santa Clara, CA (Onsite)
Duration: 6+ months
Overview:
The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity by overseeing Security Operations (SOC),
continuous threat exposure management (CTES) , and proactive risk reduction initiatives. The role ensures the organization's security posture aligns with enterprise risk, Zero Trust principles, and regulatory frameworks including ISO 27001, NIST, and ITAR.
Key Responsibilities: Lead cybersecurity operations, including SOC oversight, threat detection, endpoint security, and
continuous threat exposure monitoring across identity, endpoint, network, and cloud attack surfaces . Manage incident response for ransomware, APTs, insider threats, and major security events, leveraging
threat intelligence, exposure context, and automation to prioritize response efforts . Oversee vulnerability, configuration, and exposure management programs using platforms such as
Tenable , Automox, and CrowdStrike, ensuring remediation is
risk-based and threat-informed . Strengthen cloud and identity security across
Azure, Entra ID, and Microsoft 365 , with a focus on
reducing attack paths, misconfigurations, and identity-based exposures . Implement
Zero Trust architecture , secure configuration baselines, and
attack surface reduction strategies
across enterprise environments. Support compliance efforts aligned with
ISO 27001, NIST CSF / 800-53 / 800-171, ITAR, GDPR, HIPAA, and PCI , ensuring CTES practices support audit and risk requirements. Lead and mentor global cybersecurity teams, contractors, and MSSP partners, ensuring
SOC, CTES, and IR functions operate as a unified security program . Provide executive-level reporting on
risk posture, threat exposure trends, incidents, and security metrics , translating technical exposure into business risk.
Requirements:10+ years of cybersecurity experience , including leadership of security operations, SOC, or enterprise security programs. Strong background in
SOC operations, incident response, EDR/XDR, SIEM/SOAR , and
continuous threat exposure or attack surface management . Hands-on experience with tools such as
Microsoft Sentinel, XSOAR, CrowdStrike, Defender, and Tenable , with the ability to
correlate exposure data, threat intelligence, and detection signals . Demonstrated experience implementing
CTES / CTEM practices , including exposure prioritization, attack path analysis, and proactive risk reduction. Solid understanding of
ISO 27001, NIST frameworks, ITAR , and enterprise regulatory environments. Strong communication skills with the ability to
lead teams, influence stakeholders, and present exposure-driven risk insights to executives .
Overview:
The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity by overseeing Security Operations (SOC),
continuous threat exposure management (CTES) , and proactive risk reduction initiatives. The role ensures the organization's security posture aligns with enterprise risk, Zero Trust principles, and regulatory frameworks including ISO 27001, NIST, and ITAR.
Key Responsibilities: Lead cybersecurity operations, including SOC oversight, threat detection, endpoint security, and
continuous threat exposure monitoring across identity, endpoint, network, and cloud attack surfaces . Manage incident response for ransomware, APTs, insider threats, and major security events, leveraging
threat intelligence, exposure context, and automation to prioritize response efforts . Oversee vulnerability, configuration, and exposure management programs using platforms such as
Tenable , Automox, and CrowdStrike, ensuring remediation is
risk-based and threat-informed . Strengthen cloud and identity security across
Azure, Entra ID, and Microsoft 365 , with a focus on
reducing attack paths, misconfigurations, and identity-based exposures . Implement
Zero Trust architecture , secure configuration baselines, and
attack surface reduction strategies
across enterprise environments. Support compliance efforts aligned with
ISO 27001, NIST CSF / 800-53 / 800-171, ITAR, GDPR, HIPAA, and PCI , ensuring CTES practices support audit and risk requirements. Lead and mentor global cybersecurity teams, contractors, and MSSP partners, ensuring
SOC, CTES, and IR functions operate as a unified security program . Provide executive-level reporting on
risk posture, threat exposure trends, incidents, and security metrics , translating technical exposure into business risk.
Requirements:10+ years of cybersecurity experience , including leadership of security operations, SOC, or enterprise security programs. Strong background in
SOC operations, incident response, EDR/XDR, SIEM/SOAR , and
continuous threat exposure or attack surface management . Hands-on experience with tools such as
Microsoft Sentinel, XSOAR, CrowdStrike, Defender, and Tenable , with the ability to
correlate exposure data, threat intelligence, and detection signals . Demonstrated experience implementing
CTES / CTEM practices , including exposure prioritization, attack path analysis, and proactive risk reduction. Solid understanding of
ISO 27001, NIST frameworks, ITAR , and enterprise regulatory environments. Strong communication skills with the ability to
lead teams, influence stakeholders, and present exposure-driven risk insights to executives .