Logo
Triune Infomatics Inc

Information Security Manager (Santa Clara)

Triune Infomatics Inc, Santa Clara, California, United States, 95053

Save Job

Role: Cybersecurity Manager Location: Santa Clara, CA (Onsite) Duration: 6+ months

Overview:

The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity by overseeing Security Operations (SOC),

continuous threat exposure management (CTES) , and proactive risk reduction initiatives. The role ensures the organization's security posture aligns with enterprise risk, Zero Trust principles, and regulatory frameworks including ISO 27001, NIST, and ITAR.

Key Responsibilities: Lead cybersecurity operations, including SOC oversight, threat detection, endpoint security, and

continuous threat exposure monitoring across identity, endpoint, network, and cloud attack surfaces . Manage incident response for ransomware, APTs, insider threats, and major security events, leveraging

threat intelligence, exposure context, and automation to prioritize response efforts . Oversee vulnerability, configuration, and exposure management programs using platforms such as

Tenable , Automox, and CrowdStrike, ensuring remediation is

risk-based and threat-informed . Strengthen cloud and identity security across

Azure, Entra ID, and Microsoft 365 , with a focus on

reducing attack paths, misconfigurations, and identity-based exposures . Implement

Zero Trust architecture , secure configuration baselines, and

attack surface reduction strategies

across enterprise environments. Support compliance efforts aligned with

ISO 27001, NIST CSF / 800-53 / 800-171, ITAR, GDPR, HIPAA, and PCI , ensuring CTES practices support audit and risk requirements. Lead and mentor global cybersecurity teams, contractors, and MSSP partners, ensuring

SOC, CTES, and IR functions operate as a unified security program . Provide executive-level reporting on

risk posture, threat exposure trends, incidents, and security metrics , translating technical exposure into business risk.

Requirements:10+ years of cybersecurity experience , including leadership of security operations, SOC, or enterprise security programs. Strong background in

SOC operations, incident response, EDR/XDR, SIEM/SOAR , and

continuous threat exposure or attack surface management . Hands-on experience with tools such as

Microsoft Sentinel, XSOAR, CrowdStrike, Defender, and Tenable , with the ability to

correlate exposure data, threat intelligence, and detection signals . Demonstrated experience implementing

CTES / CTEM practices , including exposure prioritization, attack path analysis, and proactive risk reduction. Solid understanding of

ISO 27001, NIST frameworks, ITAR , and enterprise regulatory environments. Strong communication skills with the ability to

lead teams, influence stakeholders, and present exposure-driven risk insights to executives .