×
Register Here to Apply for Jobs or Post Jobs. X

Program Manager, Cybersecurity Strategy and Metrics; BISO

Job in Phoenix, Maricopa County, Arizona, 85003, USA
Listing for: Avnet
Full Time position
Listed on 2026-03-02
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Program Manager, Cybersecurity Strategy and Metrics (BISO)

Who We Are:

At Avnet, relationships matter. We are a global, FORTUNE ® 500 technology distributor and solutions company that delivers design, supply chain and logistics expertise to customers at every stage of a product’s lifecycle. Our employees have a front row seat to the latest innovations shaping the world we live in and the future we share. We’re driven to help our customers around the world succeed and we do so by earning the trust of some of the biggest names in technology.

Working at Avnet means being a part of a global team. We work collaboratively and with integrity, doing business the right way. For more than a century, we have partnered together to help our customers, suppliers and teammates realize the transformative possibilities of technology. Experience what’s next at Avnet!

Role Summary

The Program Manager, Cybersecurity Strategy and Metrics (BISC) serves as both a key operational leader within Avnet’s business‑aligned cybersecurity function. The Program Manager helps establish, mature, and operationalize the BISO program
, executing hands‑on business engagement while shaping the standards, processes, and metrics that will define the function long‑term.

Key Responsibilities
1) Program Build‑Out & Continuous Improvement
  • Partner with the Director to establish and refine the BISO operating model
    , including engagement patterns, role delineation, standard artifacts, and escalation paths.
  • Conduct a formal proof‑of‑value (PoV) to demonstrate program impact, measure risk‑reduction effectiveness, capture workload and volume metrics, and translate results into repeatable operational standards.
  • Assess and forecast BISO workload
    , helping size the team appropriately based on demand, complexity, and business footprint.
  • Define logical lanes of responsibility for current and future BISOs (e.g., vulnerability support, governance, audit coordination, system assessments).
  • Establish and evolve operational standards
    —intake processes, assessment frameworks, risk templates, reporting dashboards, and governance cadences.
2) System Assessments, Categorization & Control Selection
  • Lead and guide junior BISOs in conducting standardized system assessments
    , ensuring security requirements are right‑sized based on risk, data sensitivity, business criticality, and regulatory needs.
  • Champion consistent control selection and tailoring
    , preventing both over‑engineering and under‑protection.
  • Work closely with Enterprise Cybersecurity, IT, and engineering teams to align system‑level decisions to enterprise guardrails while minimizing business friction.
3) Risk Translation, Prioritization & Action Planning
  • Translate complex and technical security risks into clear business‑impact narratives
    , articulating implications across operational disruption, customer trust, revenue exposure, and compliance obligations.
  • Partner with business units to develop action plans, compensating controls, or formal risk acceptances for vulnerabilities, supplier issues, audit findings, and system gaps.
  • Ensure every risk or exception is evaluated, documented, approved, monitored, and periodically reviewed
    —with complete visibility to leadership.
4) Local Governance & Risk Visibility
  • Establish recurring business‑level governance mechanisms
    , providing transparency on risk posture, remediation progress, secure baseline adoption, assessments status, and upcoming obligations.
  • Ensure business leaders have a clear understanding of risk hot spots
    , competing priorities, and potential escalations.
  • Drive accountability by aligning BU decisions with enterprise risk tolerance and CISO‑level expectations.
5) Escalation of BU‑Specific Risks & Project Needs
  • Surface business‑specific risks, systemic blockers, resource needs, and project dependencies to enterprise cybersecurity leadership.
  • Ensure issues do not remain isolated or siloed within a single business area by enabling centralized visibility and prioritization.
  • Help guide enterprise trade‑off decisions by providing concise, contextual, and data‑driven escalation narratives.
6) Vulnerability Management & Secure Baselines
  • Support business units in interpreting vulnerability findings, assessing business impact, and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary