Cyber Governance and Resilience Manager
Listed on 2025-12-19
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, IT Project Manager
Thank you for your interest in a career Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career --- a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice.
Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law.
Such information will be stored in accordance with regulatory requirements and in conjunction with Regions’ Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system.
Job Description:
At Regions, the Cyber Security Group Manager is responsible for leading a diverse team of managers, engineers and analysts charged with the daily operations of enforcing, monitoring, and managing cyber security controls to protect the assets of the bank, customers, and associates. This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication.
This position will develop and manage strategic relationships with senior leaders across the enterprise to incorporate cyber security tools and resources into business operations.
- Creates strategy influencing business methods and integrated security restrictions, weighing complex requirements from the business with industry best practices for security
- Develops an enterprise strategy for Cyber Security while ensuring scalability and automation across lifecycle - will include strategies for role-based access control and lifecycle management
- Takes overall responsibility for architecture, planning and delivery of enterprise-level Cyber Security programs
- Works across teams to document and share Cyber Security best practices for on premise and cloud-based solutions for employees, contractors, and vendors
- Leads the use of Cyber Security tools (people, process, technology) for the optimization of SOX compliance efforts
- Ensures overall IT strategy and architecture plans and standards are translated into Cyber Security service programs, methods, and technologies as they align with leading Cyber Security practices
- Leads application development Cyber Security strategy for both internal service to service as well as end consumer to application authentication and authorization using modern techniques
- Manages, coaches, leads, and develops a staff of Cyber Security personnel
- Partners with other business functions on all aspects of Cyber Security strategy and requirements
- Thinks analytically, and able to understand and report metrics that matter (quantifiable and actionable) then translates into slides executive level audiences with limited technical knowledge can understand
- Develops and retains a high performing team – drive deep technical ability across the entire Cyber Security team
- Prioritizes and meets deadlines, goals, and objectives
This position is exempt from timekeeping requirements from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay.
This position is incentive eligible.
Requirements- Bachelor's degree in Computer Science, Management Information Systems, or related technology or business area
- Fifteen (15) years of related experience
- Leadership and management experience
- Experience developing role-based access control strategy (including SoD and PAM) and production implementation
- Experience with Identity Governance Solutions (Azure AD, Okta)
- Experience with Privileged Access Management Solutions (Cyber Ark)
- Experi…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).