Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Security Program Manager image - Rise Careers
Job details

Cyber Security Program Manager

Description

Job Title: Cyber Security Program Manager /CISO  

Reports To: Sr. IT Manager 


Position Summary:

The Cyber Security Program Manager develops and manages the cybersecurity program at Graham. This position identifies and mitigates cyber risks by creating a holistic framework. Job duties include policy and procedure creation and management, risk assessments, management of cyber security and education programs, and creation of compliant CMMC, NIST 800-171, NN801-rev5, PCI, ITAR, EAR programs. This position drives overall risk down by developing a security operations plan built around best practices and frameworks. 


Key Results Areas:

Level III – Practice – Optimizing resources & utilization in an organization


Activity & Budget Planning/Performance/Consistency/Predictability


Cybersecurity Manager

  1. Develop cyber education and training programs
  2. Develop Cybersecurity policies, procedures, and processes
  3. Manages all requirements for cyber reporting of incidents with the IT Manager
  4. Develop and manage requirements around pen testing and other cyber threat testing
  5. Validates security and configuration of third-party software, when needed
  6. Designs and implements Vendor Risk Management program
  7. Defines and manages tools needed for E-discovery and computer forensic needs
  8. Configures GRC tool and monitoring plans to support any audits

Classified Systems (If Cleared)

  1. Management of security and requirements and RMF configurations of systems
  2. Management of Documenting and submitting systems in E-Mass either directly or as advisor to other security staff
  3. Management of Security Training program to support classified systems
  4. Management of training and support of IT security staff for classified systems
  5. Support the FSO as AFSO if needed

Research/procurement/creation/monitoring/improvement of technology, systems, equipment & processes

  1. Recommends mitigations for insider threat risks
  2. Determines and manages security software evaluations and implementations to support the cyber program
  3. Hands on implementation of security software, tools, or processes  

Develop, lead, staff, manage high performing team


CMMC/NIST 800-171/NNPI security lead

  1. Lead compliance efforts for CUI and NNPI processing
  2. Lead CMMC compliance and certification efforts
  3. Lead NN-801-Rev5 compliance
  4. Lead NIST 800-171 requirements
  5. Manage internal and external audits and certifications
  6. Update cyber scores in SPRS, Exostar or other government required systems
  • Lead Cyber security projects and team members 
  • Leads internal and external audit teams for all compliance
  • Create a robust incident response team and processes including the creation and execution or regular tabletop exercises and playbooks


Provide effective communication and reporting to all stakeholders

  1. Develop and present cyber security and risk management presentations to senior management and board members, as needed
  2. Develops training materials and trains other staff
  3. Reports incidents to DCSA, NCIS, FBI, DIBNET and others, as needed

Professional Development

  1. Logs incidents into government systems for review
  2. Manages cyber insurance evaluations and determines best path for reducing risk and keeping coverages
  3. Takes lead in maintaining or developing IT processes
  4. Project management
  5. Software evaluation
  6. System administration, if needed
  7. Custom programming, if needed
  8. Performs other related duties as required and assigned


Qualifications:

To qualify for this position, an individual must possess the knowledge, training, experience and abilities required.


Education and Training:

  • Bachelor's degree in computer science or cybersecurity or applicable work experience

Experience:

  • Strong cybersecurity or computer forensics background
  • Working knowledge of RMF, CMMC, NIST, ITAR, EAR, PCI,NNPI/NOFORN (NN801-REV 5) and other security frameworks


Desired Job Qualifications:

  • Experience working directly with business end-users preferred.
  • System administration background 
  • IT auditing & compliance
  • Strong written and verbal communication skills
  • Ability to manage other people and projects
  • Strong security or IT operations background
  • Experience with EMASS,DISS, NISS, NBIS or other 


Skills:

  • Proficient in Microsoft Office software products
  • Possession of or ability to obtain CISSP certification within 2 years of taking position 
  • Possession of or ability to get within 1 year – Active Security clearance
  • Ability to work efficiently with many different types of people, skill levels, and personalities
  • Demonstrate behavior consistent with company values.
  • Maintain strict confidentiality regarding company matters.
  • Proficiency in word processing, spreadsheet, presentation, project management, enterprise resource planning, database software.
  • Ability and willingness to abide by set policies and/or safety programs established by Graham, our clients, and/or regulatory agencies which govern our performance and behavior in the normal course of our work while on Graham or the client’s property or job site.
  • Excellent written and verbal communication skills.
  • Strong organizational and time management skills.
  • High attention to detail.
  • Ability to successfully plan and implement objectives within established timelines and work schedules.
  • Ability to analyze problems and develop effective solutions at both strategic and functional levels.
  • Develop strategies to achieve organizational goals; Understand organization’s strengths and weaknesses; Analyzes market and competition; Identifies external threats and opportunities; Adapts strategy to changing conditions.
  • Demonstrate behavior consistent with company values.
  • Ability to work independently, with minimal direction as a highly motivated self-starter and within a team-oriented culture.


Physical and Mental Demands

The physical demands and work environment characteristics described here are representative of those that must be met by an employee to successfully perform the essential functions of the position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Physical Demands: May be required to move items up to 60 pounds for distances of up to 10 feet. May be required to stand, stoop, bend, kneel and squat for extended periods. May be exposed to fumes or dust, toxic or caustic chemicals, outdoor weather, moving mechanical parts and moderate to loud noise levels. Must wear appropriate protective gear and clothing as necessary. Traveling between buildings will be required. Require to speak and communicate clearly with others.
  • Mental demands: While performing the duties of this position, the individual is required to read, write, analyze data and reports, exercise judgement, develop plans, procedures and goals, present information to others and work under pressure.
  • Work environment: This job operates in a clerical office setting and in the manufacturing spaces. This role routinely uses standard office equipment such as computers, phones, photocopiers and filing cabinets


Work Authorization/Security Clearance

  • Must be a U.S citizen. Must be able to obtain US government security clearance if required.


This job description is not all-inclusive but rather serves as a general guideline of the current needs of the position and can be modified at the discretion of management to meet current business needs. Experience and education requirements are the primary basis for awarding this position, however substitutions that are essentially equivalent may be made as they relate to the essential functions, duties, and responsibilities of this position


Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Security Program Manager, Graham Corporation and Subsidiaries

If you're passionate about cybersecurity and ready to steer a robust program, then the role of Cyber Security Program Manager at Graham in Batavia, New York, might be just what you’re looking for! In this pivotal position, you'll develop and manage the entire cybersecurity program, ensuring that all risks are identified and mitigated through a comprehensive framework. Your responsibilities will be varied and rewarding, including creating policies and procedures, conducting risk assessments, overseeing educational programs, and crafting compliant frameworks like CMMC and NIST 800-171. You’ll work closely with various stakeholders, driving improvements by optimally utilizing resources while training a high-performing team. Working at Graham means you're part of a company that values proactive security measures and compliance. You will not only lead the charge on compliance efforts but also manage all cyber incident reporting. Your expert knowledge of security frameworks will allow you to define security procedures while developing training materials and outreach programs. The role demands strong leadership skills and a sharp analytical mindset to respond to evolving cyber threats. Plus, you'll have the opportunity to cultivate a culture of security awareness across the organization. If you thrive in dynamic environments and are eager to lead cybersecurity initiatives, then apply to be Graham's Cyber Security Program Manager, and take your career to the next level while making a significant impact!

Frequently Asked Questions (FAQs) for Cyber Security Program Manager Role at Graham Corporation and Subsidiaries
What are the main responsibilities of a Cyber Security Program Manager at Graham?

A Cyber Security Program Manager at Graham is responsible for developing and managing the comprehensive cybersecurity program, creating policies and procedures, conducting risk assessments, and managing compliance efforts for standards such as CMMC and NIST 800-171. This role involves overseeing training and development programs while ensuring effective incident response mechanisms are in place.

Join Rise to see the full answer
What qualifications are required for the Cyber Security Program Manager position at Graham?

To qualify as a Cyber Security Program Manager at Graham, you typically need a Bachelor's degree in computer science, cybersecurity, or closely-related experience. An extensive background in cybersecurity practices and security frameworks like RMF and PCI is also required, along with excellent communication and project management skills.

Join Rise to see the full answer
Is prior experience in IT auditing necessary for the Cyber Security Program Manager role at Graham?

Yes, prior experience in IT auditing and compliance is highly desirable for the Cyber Security Program Manager position at Graham. Familiarity with security frameworks and the ability to manage compliance efforts will greatly enhance your effectiveness in this role.

Join Rise to see the full answer
What types of security frameworks does the Cyber Security Program Manager at Graham work with?

The Cyber Security Program Manager at Graham works with various security frameworks, including CMMC, NIST 800-171, ITAR, EAR, and PCI standards. Mastery of these frameworks is essential for successful program management and compliance.

Join Rise to see the full answer
How does the Cyber Security Program Manager at Graham handle team leadership?

In the role of Cyber Security Program Manager at Graham, effective team leadership is crucial. You will be responsible for guiding high-performing teams, conducting training programs, and ensuring that all team members are aligned with the organization's security objectives and compliance requirements.

Join Rise to see the full answer
Common Interview Questions for Cyber Security Program Manager
Can you describe your experience with developing cybersecurity policies and procedures?

When answering this question, highlight specific instances where you drafted or managed cybersecurity policies. Discuss the methodologies you used, the challenges you faced, and how you ensured compliance with frameworks like CMMC and NIST. Tailor your response to demonstrate your strategic thinking and problem-solving skills.

Join Rise to see the full answer
What steps do you take when conducting a risk assessment?

Explain your systematic approach to risk assessments, including identifying assets, potential threats, and vulnerabilities. Detail how you prioritize risks based on impact and likelihood, and mention any tools or frameworks you employ to analyze and manage risks effectively.

Join Rise to see the full answer
How do you keep up with changes in cybersecurity regulations and standards?

Discuss your commitment to professional development, such as attending conferences, pursuing certifications, engaging with industry publications, and participating in relevant online forums or communities. Show that you proactively stay informed about evolving regulations.

Join Rise to see the full answer
Describe a challenging cybersecurity project you led. What was the outcome?

Provide an example of a cybersecurity project that was particularly challenging. Discuss your role in overcoming obstacles, the resources you coordinated, and the final results. Emphasize what you learned and how it improved your management skills.

Join Rise to see the full answer
What is your experience with risk management frameworks like RMF and NIST?

Detail your familiarity with RMF and NIST compliance requirements. Discuss specific projects where you applied these frameworks, the methodologies you used, and how you ensured organizational compliance and effective risk management.

Join Rise to see the full answer
How do you manage compliance audits within a cybersecurity framework?

Describe your experience preparing for and leading compliance audits. Talk about the processes you follow to ensure readiness, how you engage stakeholders, and your strategies for addressing areas of concern. Highlight the importance of communication and timing.

Join Rise to see the full answer
What tools and technologies do you consider essential for a Cyber Security Program Manager?

Mention key tools you have experience with, such as GRC tools, threat assessment software, or incident response technologies. Explain why these tools are crucial for risk management and compliance within a cybersecurity program.

Join Rise to see the full answer
How do you approach vendor risk management?

Outline your experience with assessing vendor risks, strategies for evaluating third-party security postures, and developing standards for ongoing vendor assessment. Highlight methods you’ve implemented to enhance the organization’s vendor risk management process.

Join Rise to see the full answer
How do you foster a culture of cybersecurity awareness within an organization?

Discuss specific initiatives you've led to promote cybersecurity awareness, including training sessions, engaging communications, and integrating security into company culture. Explain how you assess the effectiveness of these initiatives over time.

Join Rise to see the full answer
What would you do if you found a serious vulnerability in the organization's systems?

Express the importance of a prompt and structured response. Discuss your immediate actions such as informing stakeholders, mitigating risks, documenting the incident, and following the organization’s incident response plan. Emphasize communication and transparency.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 7 days ago

Join Navy Federal as a Business Systems Analyst III to leverage technology in enhancing business processes and implementing strategic solutions.

Photo of the Rise User
Qualtrics Remote Seattle, Washington, United States
Posted 7 days ago

Join Qualtrics as a Senior Machine Learning Engineer to drive advancements in AI technology for enhancing customer experiences.

Photo of the Rise User
Wayfair Hybrid Romeoville, IL
Posted 15 hours ago

Join Wayfair as a Warehouse IT Manager to lead a talented team in optimizing warehouse technology solutions in a dynamic environment.

Photo of the Rise User
Posted 21 hours ago

Join AbbVie as a Senior Security Engineer to help build and automate the application security program.

Photo of the Rise User
Posted 6 days ago

Join Care Access as an IT Operations Lead to enhance our IT systems in a fully remote role.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 4, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!