AVP, Information Security Manager
WHO WE ARE
Revantage is a Blackstone Company that provides a highly skilled employee base, best-in-class processes, and state-of-the-art technology to multiple Blackstone real estate portfolio companies. Sectors include Hospitality, Industrial, Multi-Family, Office, Retail, Senior Housing, and Manufactured Homes.
Revantage, headquartered in Chicago, is one of three global offices that includes Revantage Asia and Revantage Europe.
WHAT WE VALUE: OUR CULTURE
Creating a culture that inspires change and momentum requires the right team. We know what it takes to lead an industry, and are looking for leaders who seek constant growth, want to excel, and continuously improve upon themselves and the industry. The culture at Revantage is built on our shared core values and commitment to be:
- Achievers - We expect high standards for ourselves and enable the success of our teams
- Enthusiasts - We face challenges with optimism and believe anything is possible
- Leaders - We commit to continuously improving our performance
- Learners - We learn from our challenges and successes
- Partners - We deliver value and positive impact to our partners
WHY THIS ROLE IS VALUABLE
The information security manager is primarily responsible for providing leadership, as well as operational and tactical direction to diverse teams, including analysts, engineers, and architects. The security manager provides strategic direction, but at the direction of the Deputy-CISO & CISO. The security manager leads the team through the information security program by helping to establish and enforce highly effective policies, corporate protocols, and appropriate collaboration among teams. In addition, this leader assumes responsibility for the education and enforcement of those protocols and matters of compliance. The role requires the ability to speak confidently in front of large groups and with corporate management, vendors, and service providers.
HOW YOU ADD VALUE
- Owns day-to-day responsibility for the management of Insider Threat/DLP and Third Party Vendor Management Programs
- Analyzes technologies and establishes highly effective processes and protocols to ensure comprehensive protection exists to prevent unauthorized entry into the company networks and systems.
- Supports automation and orchestration to maximize team talent and reduce routine tasks.
- Actively recruits and leads by example to create a culture where employees want to work.
- Mentors security team and places a heavy emphasis on employee retention - people, first.
- Conducts independent verification and validation testing of the company networks and sensitive programs through internal team resources and independent consultant engagements.
- Leads the team in implementing secure enterprise systems and identifies issues that could compromise data integrity or security.
- Develops IT security programs and recommends necessary changes to the information security team to ensure the company's systems are fully compliant with all applicable regulatory requirements and privacy laws.
- Facilitates third-party audit reviews of internal departments.
- Provides periodic training to company employees on information security topics.
- Participates in the company's change management program.
- Stays abreast of the security industry threat landscape, specifically within the company's industry.
- Recognizes his/her personal developmental needs and is proactive in obtaining the coaching, networking, and training needed to ensure his/her continued success in the position.
- Creates a working environment that is conducive to two-way communication, teamwork, and learning.
- Recognizes the varying strengths, skills, and needs of the team and adapts his/her coaching skills to obtain the best possible results from each individual contributor.
- Openly supports the organization, the management team, and the executive leadership team, even during times of adversity.
- Utilizes open communication and managerial courage to ensure the standards, expectations, and goals of the organization are respected and upheld.
- Acts as a change agent and drives the department and business forward using effective management, analysis, and strategic skills.
- Leads security-related projects from inception to successful completion and is capable of effectively coaching technology staff on appropriate security protocols and needs as they implement new technology into the organization.
- Assumes responsibility for other duties as required or assigned.
WHAT YOU BRING TO THE ROLE
Required:
- Bachelor's degree in computer science, information assurance, MIS or related field, or equivalent industry experience.
- Minimum of 5 years of technical hands-on security experience
- Minimum 3 years experience in security and systems administration management role across a wide variety of infrastructures, including cloud infrastructure, such as software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS).
- Knowledge of Microsoft Word, Excel, Power Point, & Power BI for creating reports & metrics dashboards
- Experience with forensic tools and incident response, especially within Azure environments
- Solid understanding and experience with Linux and Windows operating systems, scripting languages like Python, cloud provider ecosystems, MS Azure, and familiarity with others such as Google Cloud, Amazon AWS, and IBM Cloud.
- Demonstrates strong written and oral communication skills.
- Demonstrates solid organizational skills and the ability to multi-task, prioritize workload, and delegate responsibilities.
- Effectively manages stress in a constantly changing environment.
- Leverages subject matter expertise in security and compliance.
- Demonstrates excellent judgment and the ability to make quick decisions and think outside the box when working with complex situations.
- Demonstrates a high level of flexibility.
- Is forward-thinking and possesses business acumen.
- Possesses a high level of integrity, trustworthiness, and confidence representing the company and its management team at the highest level of professionalism.
- Demonstrates strong analytical skills and is effective at interpreting and applying applicable regulations.
- Works effectively with a variety of personalities and can adapt his/her approach to effectively reach and develop his/her team. Uses this skill as well as his/her functional knowledge to both earn and maintain a high level of credibility with the team.
Preferred:
- Experience with Obsidian, Cylance, Absolute, IntSights, ZScaler, MS Sentinel, MS Defender, and InfoBlox
- Holds or working toward one or more security certifications including: CISM, CCSP, CISSP, Azure Security Engineer certification, and other similar/related certifications
PERKS FOR YOU
- Competitive salary, overall compensation, and 401(k)
- Work-life balance offerings include:
- Hybrid remote work policy
- Productivity Hours - weekly meeting-free work time
- Weekly Summer Fridays
- In-house and external learning & development opportunities
- Generous health insurance and wellness benefits
EEO Statement
Our company is proud to be an equal opportunity employer . We celebrate diversity and are committed to creating an inclusive environment for all employees. Our employment decisions are based on individual qualifications, job requirements and business needs without regard to race, color, marital status, sex, sexual orientation, gender identity and/or expression, age, religion, disability, citizenship status, national origin, pregnancy, veteran status and / or any other legally protected characteristics. We are committed to providing reasonable accommodations, if you need an accommodation to complete the application process, please email [email protected] .
#LI-IG1 #LI-Hybrid