×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity Manager; Franklin Park, IL

Job in Franklin Park, Cook County, Illinois, 60398, USA
Listing for: Sloan Valve Company
Full Time position
Listed on 2025-12-19
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Manager (Franklin Park, IL)

JOIN AN INDUSTRY LEADER! Quality First & Green Always Sloan is the world’s leading manufacturer of commercial plumbing systems and has been in operation since 1906. We are at the forefront of the green building movement and provide sustainable restroom solutions. We manufacture water- efficient products including flush valves, electronic faucets, soap dispensing and sink systems along with vitreous china fixtures for commercial, industrial and institutional markets worldwide.

About this role:

We are seeking an Cybersecurity Manager that will be based out of Sloan’s Franklin Park, IL headquarters and will report to our Vice President of Global IT Infastructure and Operations. The Enterprise Cybersecurity Manager will be responsible for developing, implementing, and managing the organization’s cybersecurity strategy. This role involves protecting the company’s information assets, managing security risks, and ensuring compliance with industry standards and regulations.

This role is a leader within the larger IT organization combining project oversight, team management, and hands on work. The ideal candidate will have a strong background in cybersecurity, excellent leadership skills, and the ability to work collaboratively across departments.

What you’ll do:
  • Develops and maintains a security process that enables the enterprise to develop and implement a secure environment that is aligned with business, technology and threat drivers.
  • Manages the staff and vendors to execute contracts and SLA’s providing security services.
  • Validates IT infrastructure and other reference architectures for security best practices, and recommend changes to enhance security and reduce risk. Guidance on Security configurations for security infrastructure tools, including firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), anti-malware/endpoint protection systems.
  • Determines baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and identity and access management (IAM). Driving the process around the currency of the environment inclusive of patching, firmware and operating systems.
  • Liaison with vendors to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property, PII, ePHI, regulated or other protected data, including:
    SaaS providers, Cloud/infrastructure as a service (IaaS) providers, Managed service providers, Evaluate the statements of work from these providers to ensure that adequate security protections are in place. Assess the providers’ SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required “user controls,” and report any findings to the executive management team.
  • Define and document security strategy plans, roadmaps, procedures and standards based on sound enterprise architecture practices.
  • Govern, review and assess security, infrastructure logs for indicators of compromise or other anomalous behavior within networks, applications or user profiles. Conducts security assessments of internal systems, applications and IT infrastructure as part of the overall risk management practice of the organization.
  • Conducts reviews of and oversees the change management function for security rulesets for the organization’s firewalls, vulnerability assessments and other security reviews of systems, and prioritizes remediation based on the risk profile of the asset and guidance from executive management.
  • Operational Management:
    Facilitate incident response strategies and procedures, Lead and coordinate response efforts during cyber incidents, Perform root cause analysis to identify vulnerabilities and threats, Ensure timely and effective communication with stakeholders during incidents, Maintain and update incident response plans and documentation, Facilitate the vulnerability management process, Collaborate with IT teams to implement security patches and updates
  • Other duties and responsibilities as required.
What we are looking for:
  • Associate Degree
  • 6 Years Experience with cybersecurity in a role focused on it.
  • Ex…
Position Requirements
5+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary