Cybersecurity Manager
Job in
Yuba City, Sutter County, California, 95992, USA
Listing for:
Sierracentral
Full Time
position
Listed on 2026-01-25
Job specializations:
-
IT/Tech
Cybersecurity, IT Project Manager, Information Security, IT Consultant
Job Description & How to Apply Below
Summary
We are seeking a Cybersecurity Manager to lead and grow a team responsible for performing end‑to‑end security and threat analysis across credit union enterprise initiatives. This role ensures that information security best practices, regulatory requirements, and risk management principles are embedded into system and business process designs.
The Cybersecurity Manager provides daily leadership and operational oversight of the Credit Union’s cybersecurity and physical access security programs. Responsibilities include implementing, monitoring, and optimizing security technologies, processes, and third‑party services such as the Security Operations Center (SOC), with a strong focus on protecting member information and critical financial systems.
This role is accountable for scaling and maturing the cybersecurity function, including hiring, onboarding, and training staff; managing team operations; and aligning security initiatives with the Credit Union’s strategic objectives and risk appetite. The Manager serves as a technical subject matter expert across key cybersecurity domains—including network, application, cloud, and enterprise security controls—and works closely with the CIO, CISO, IT teams, facilities management, risk and compliance functions, and external vendors.
Together, they ensure effective security controls, timely incident response, regulatory readiness, and prompt identification and remediation of cybersecurity and physical security risks.
Essential Functions Cybersecurity Operations & Controls
Managing, deploying, and maintaining security infrastructureOversee daily operation of cybersecurity tools and controls (SIEM, SOC services, EDR, firewalls, IDS/IPS, IAM)Conducting vulnerability, penetration testing and identifying follow‑up actions to mitigate failures and address any weaknessesMaintaining up‑to‑date knowledge on cyber‑security technologies and standards while automating security controls, data and processes to ensure proper configuration, maintenance, and monitoringValidates alerts, investigations, and response actions performed by the SOCServe as the subject matter expert with the ability to educate and explain common threats affecting Network, Cloud, Web and Application environments as well as best practices in the Cyber Security industry, including remediations for OWASP Top 10, CWE/SANS Top 25, CIS controls, and NIST guidelinesProven ability to successfully manage projects by establishing clear goals and deliverables, adhering to deadlines, proactively managing risks, and maintaining effective stakeholder engagement and communicationSOC Oversight
Act as primary point of contact with SOC providers.Investigate, review, and validate alerts, incident tickets, and escalations.Ensure SLAs, escalation procedures, and response timelines are met.Participate in investigations and coordinate responses with IT teams.Business Continuity & Incident Response
Execute incident response procedures under CIO/CISO guidance.Coordinate containment, eradication, and recovery activities.Maintain incident documentation, timelines, and evidence.Support post‑incident reviews and corrective actions.Support updates and maintenance of business continuity plan/programParticipate and lead BCP‑IRP trainings and tabletop exercisesVulnerability & Remediation Management
Oversee vulnerability scanning and remediation.Coordinate patching and mitigation with IT operations.Physical Access Security
Manage physical access control systems (badges, key cards, biometric systems) and coordinate with facilities to ensure alignment between physical and cybersecurity controls for comprehensive protection.Oversee visitor management processes and ensure compliance with policies.Monitor and review physical access logs for anomalies or unauthorized activity and Support investigations involving physical access incidents.Leadership Collaboration
Translate strategic goals into actionable security roadmaps, initiatives, tasks and provide tactical updates and metrics to CIO.Escalate risks with clear, actionable recommendations.Third‑Party Security & Tool Management
Manage relationships with security vendors and service…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here: