Manager-Cyber Security

  • InsideHigherEd
  • Atlanta, Georgia
  • 01/14/2026
Full time Information Technology Telecommunications Part Time IT Graduate IT Cyber Security

Job Description

Job Title: Manager-Cyber Security
Location: Atlanta, Georgia
Regular/Temporary: Regular
Full/Part Time: Full-Time
Job ID: 293947
About Us Overview
Georgia Tech prides itself on its technological resources, collaborations, high-quality student body, and its commitment to building an outstanding and diverse community of learning, discovery, and creation. We strongly encourage applicants whose values align with our institutional values, as outlined in our Strategic Plan. These values include academic excellence, diversity of thought and experience, inquiry and innovation, collaboration and community, and ethical behavior and stewardship. Georgia Tech has policies to promote a healthy work-life balance and is aware that attracting faculty may require meeting the needs of two careers.

About Georgia Tech
Georgia Tech is a top-ranked public research university situated in the heart of Atlanta, a diverse and vibrant city with numerous economic and cultural strengths. The Institute serves more than 45,000 students through top-ranked undergraduate, graduate, and executive programs in engineering, computing, science, business, design, and liberal arts. Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security. Georgia Tech ranks among the nation's top 20 universities for research and development spending and No. 1 among institutions without a medical school.

Georgia Tech's Mission and Values
Georgia Tech's mission is to develop leaders who advance technology and improve the human condition. The Institute has nine key values that are foundational to everything we do:
1. Students are our top priority.
2. We strive for excellence.
3. We thrive on diversity.
4. We celebrate collaboration.
5. We champion innovation.
6. We safeguard freedom of inquiry and expression.
7. We nurture the wellbeing of our community.
8. We act ethically.
9. We are responsible stewards.

Over the next decade, Georgia Tech will become an example of inclusive innovation, a leading technological research university of unmatched scale, relentlessly committed to serving the public good; breaking new ground in addressing the biggest local, national, and global challenges and opportunities of our time; making technology broadly accessible; and developing exceptional, principled leaders from all backgrounds ready to produce novel ideas and create solutions with real human impact.

The Office of Information Technology (OIT) provides information technology leadership and support to the Georgia Institute of Technology, working in partnership with academic and business units to meet the unique needs of a leading research university. OIT serves as the primary source of enterprise-wide information technology and telecommunications services in support of students, faculty, staff, and researchers.

Location Atlanta, GA On-site

Department Information The Security Operations Center (SOC) Manager leads a modern, risk-driven SOC operating under aFederated Attack Surface Management (ASM) and Continuous Exposure Management (CEM) model. This role integrates attack surface visibility, exposure intelligence, detection engineering, and incident response into a unified operation focused on measurable risk reduction rather than alert volume. The SOC Manager translates technical exposure data into actionable business risk, drives cross-functional collaboration, and ensures security operations align with enterprise priorities and threat realities.

Job Summary The Manager of Cyber Security is responsible for developing and implementing comprehensive cybersecurity strategies to protect the institution's information systems and sensitive data. This role involves leading a team of cybersecurity professionals to monitor, assess, and respond to security threats while ensuring compliance with relevant regulations and best practices. Additionally, the manager collaborates with various departments to promote cybersecurity awareness and establish protocols that safeguard the institution's digital assets.

Responsibilities Job Duty 1 -
Develop and implement cybersecurity policies and procedures to protect the institution's information systems and data from unauthorized access and breaches.

Job Duty 2 -
Lead a team of cybersecurity professionals in monitoring network activity and identifying potential security threats and vulnerabilities.

Job Duty 3 -
Conduct regular security assessments and audits to evaluate the effectiveness of existing security measures and identify areas for improvement.

Job Duty 4 -
Manage incident response efforts, coordinating investigations of security breaches and implementing remediation plans to mitigate risks.

Job Duty 5 -
Provide cybersecurity training and awareness programs for faculty, staff, and students to promote a culture of security within the institution.

Job Duty 6 -
Stay informed about emerging cybersecurity threats and trends, adjusting strategies and practices to address new risks effectively.

Job Duty 7 -
Work with external partners and regulatory bodies to ensure compliance with relevant laws, regulations, and industry standards in cybersecurity.

Job Duty 8 -
Prepare and present reports on cybersecurity metrics, incidents, and initiatives to senior leadership, demonstrating the effectiveness of the institution's cybersecurity posture.

Job Duty 9 -
Collaborate with Information Technology and academic departments to ensure that all technology initiatives comply with cybersecurity standards and best practices.

Job Duty 10 -
Perform other duties as assigned.

Responsibilities Key ResponsibilitiesLead SOC detection, triage, investigation, and incident response using risk-based prioritizationEnsure SOC workflows are informed by current attack surface, asset, and exposure intelligenceOperationalize ASM and CEM as foundational inputs to security operationsEnsure alerts and investigations are mapped to known assets, ownership, and exposure contextPartner with ASM, vulnerability management, and engineering teams to drive exposure remediationOperate effectively within a federated security model, establishing SLAs, OLAs, RACI, and risk acceptance processesCollaborate across IT, cloud, network, endpoint, identity, and application teams to reduce systemic riskProvide strategic oversight of detection engineering lifecycle and coverage alignment to threat modelsDemonstrated experience leading automation-first security operations, leveraging ASM, exposure intelligence, and SOAR to reduce manual effort and improve risk outcomesStrong understanding of automated triage, enrichment, alert suppression, and response orchestration, including human-in-the-loop controlsProven ability to measure and improve automation effectiveness using risk-aligned metrics and continuous improvement practicesDefine and report risk-aligned SOC metrics and deliver executive-level security narrativesDevelop SOC talent across incident response, exposure analysis, detection engineering, and automationRequired Qualifications Educational Requirements
Bachelor's degree in related discipline or equivalent, related experience.

Other Required Qualifications
The job requires one who is task and detail orievented; flexible, and able years perform multiple, various tasks concurrevently. Excellevent communications skills are required as well as the ability years troubleshoot and solve problems that are varied y nature.

Required Experience
5+ years of relevant experience; 3+ years of supervisory knowledge.

Preferred Qualifications Additional Preferred Qualifications
Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH)

Preferred Educational Qualifications
Master's degree in related discipline or equivalent, related experience.

Preferred Experience
Seven years of related experience

Preferred Qualifications Preferred QualificationsExperience transforming a traditional SOC into a risk-based or Fusion SOCBackground in detection engineering, threat hunting, or security analyticsFamiliarity with Lean, Six Sigma, ITIL, ITSM, or similar operational frameworksExperience supporting audit, compliance, or regulated environments7-10+ years in cybersecurity operations, incident response, or detection engineering3-5+ years leading SOC, IR, or security operations teams in enterprise or federated environmentsStrong knowledge of ASM, CEM, SIEM, XDR, SOAR, and detection engineering conceptsFamiliarity with vulnerability management, cloud and SaaS exposure, and identity riskProven ability to influence without authority and communicate risk effectively to executivesProposed Salary $152,167

Knowledge, Skills, & Abilities SKILLS
Ability to partner with many stakeholders to deliver security risk management services

USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization . click apply for full job details