Search jobs now Find the right job type for you Explore how we help job seekers Contract talent Permanent talent Learn how we work with you Executive search Finance and Accounting Technology Marketing and Creative Legal Administrative and Customer Support Technology Risk, Audit and Compliance Finance and Accounting Digital, Marketing and Customer Experience Legal Operations Human Resources 2026 Salary Guide Demand for Skilled Talent Report Building Future-Forward Tech Teams Job Market Outlook Press Room Salary and hiring trends Adaptive working Competitive advantage Work/life balance Inclusion Browse jobs Find your next hire Our locations
Security Manager
<p><strong>Key Responsibilities</strong></p><ul><li>Strategically implement the security program by translating high-level plans into targeted initiatives and monitor projects through robust milestone, risk, and deliverable management. Lead collaborative working sessions and deliver articulate, insightful status briefings to stakeholders.</li><li>Oversee enterprise risk management, partnering closely with Security Compliance to maintain an authoritative risk register. Facilitate risk remediation across systems and business units, while supporting audit procedures and expertly addressing partner and customer security assessments.</li><li>Champion the institutionalization of security governance by orchestrating the deployment and integration of policies and standards. Ensure the creation and dissemination of practical operating procedures, proactively identify operational deficiencies, and advocate for progressive enhancements in security maturity.</li><li>Direct sophisticated Identity and Access Management (IAM) operations, embracing end-to-end lifecycle processes (onboarding, transitions, separation), role-based access control, periodic entitlement reviews, and privileged access oversight. Collaborate with IT and business application owners for seamless MFA/SSO deployments and continuously optimize IAM for organizational agility.</li><li>Advance protection of sensitive and regulated data—particularly PHI—through rigorous data classification, handling protocols, and comprehensive encryption standards. Drive enterprise-wide adoption of effective key management and fine-tune Data Loss Prevention (DLP) strategies in partnership with internal stakeholders.</li><li>Coordinate security operations and incident management as the primary liaison to MDR/MSSP partners. Continually enhance incident response methodologies, escalation mechanisms, and contact lists, while orchestrating simulation exercises and post-incident analyses to reinforce organizational preparedness.</li><li>Lead the rhythm of vulnerability and patch management by administering scan cycles, prioritization, and remediation in alignment with SLA commitments. Closely partner with technical teams to verify resolutions and communicate the risk landscape underlying remediation efforts.</li><li>Strengthen third-party risk governance by collaborating with compliance, procurement, and legal teams throughout vendor evaluation, tiering, and diligence processes. Define and monitor security standards for external relationships, ensuring alignment with organizational obligations and best practices.</li><li>Administer Business Continuity and Disaster Recovery (BC/DR) initiatives by maintaining structured testing calendars, scenario playbooks, and evidence collection protocols for mission-critical systems. Facilitate exercises and post-test remediation to bolster resilience and continuity of clinical and operational services.</li><li>Enable a robust Secure Software Development Lifecycle (SSDLC) by championing minimum security checkpoints (e.g., SAST, DAST, dependency scanning), providing mentorship to development teams on secure architecture, and fostering security-driven innovation in support of strategic organizational goals.</li><li>Steward security culture and talent development by coordinating immersive training programs, phishing simulations, and reporting key performance indicators to leadership. Mentor direct reports and junior team members, fostering a spirit of curiosity, initiative, and continual professional advancement.</li></ul><p><br></p>
Cyber Security, Application Security, Enterprise Security, Security Information and Event Management (SIEM), Information - Network Security, IAM, Security Vulnerability, Security Incident Response, IT Risk Management, BCP - Disaster Recovery, Data Protection
<h3 class="rh-display-3--rich-text">Technology Doesn't Change the World, People Do.<sup>®</sup></h3> <p>Robert Half is the world’s first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.</p> <p>Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. <a href="https://www.roberthalf.com/us/en/mobile-app" target="_blank">Download the Robert Half app</a> and get 1-tap apply, notifications of AI-matched jobs, and much more.</p> <p>All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit <a href="https://roberthalf.gobenefits.net/" target="_blank">roberthalf.gobenefits.net</a> for more information.</p> <p>© 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking “Apply Now,” you’re agreeing to <a href="https://www.roberthalf.com/us/en/terms">Robert Half’s Terms of Use</a>.</p>
  • Provo, UT
  • onsite
  • Permanent
  • 120000.00 - 150000.00 USD / Yearly
  • <p><strong>Key Responsibilities</strong></p><ul><li>Strategically implement the security program by translating high-level plans into targeted initiatives and monitor projects through robust milestone, risk, and deliverable management. Lead collaborative working sessions and deliver articulate, insightful status briefings to stakeholders.</li><li>Oversee enterprise risk management, partnering closely with Security Compliance to maintain an authoritative risk register. Facilitate risk remediation across systems and business units, while supporting audit procedures and expertly addressing partner and customer security assessments.</li><li>Champion the institutionalization of security governance by orchestrating the deployment and integration of policies and standards. Ensure the creation and dissemination of practical operating procedures, proactively identify operational deficiencies, and advocate for progressive enhancements in security maturity.</li><li>Direct sophisticated Identity and Access Management (IAM) operations, embracing end-to-end lifecycle processes (onboarding, transitions, separation), role-based access control, periodic entitlement reviews, and privileged access oversight. Collaborate with IT and business application owners for seamless MFA/SSO deployments and continuously optimize IAM for organizational agility.</li><li>Advance protection of sensitive and regulated data—particularly PHI—through rigorous data classification, handling protocols, and comprehensive encryption standards. Drive enterprise-wide adoption of effective key management and fine-tune Data Loss Prevention (DLP) strategies in partnership with internal stakeholders.</li><li>Coordinate security operations and incident management as the primary liaison to MDR/MSSP partners. Continually enhance incident response methodologies, escalation mechanisms, and contact lists, while orchestrating simulation exercises and post-incident analyses to reinforce organizational preparedness.</li><li>Lead the rhythm of vulnerability and patch management by administering scan cycles, prioritization, and remediation in alignment with SLA commitments. Closely partner with technical teams to verify resolutions and communicate the risk landscape underlying remediation efforts.</li><li>Strengthen third-party risk governance by collaborating with compliance, procurement, and legal teams throughout vendor evaluation, tiering, and diligence processes. Define and monitor security standards for external relationships, ensuring alignment with organizational obligations and best practices.</li><li>Administer Business Continuity and Disaster Recovery (BC/DR) initiatives by maintaining structured testing calendars, scenario playbooks, and evidence collection protocols for mission-critical systems. Facilitate exercises and post-test remediation to bolster resilience and continuity of clinical and operational services.</li><li>Enable a robust Secure Software Development Lifecycle (SSDLC) by championing minimum security checkpoints (e.g., SAST, DAST, dependency scanning), providing mentorship to development teams on secure architecture, and fostering security-driven innovation in support of strategic organizational goals.</li><li>Steward security culture and talent development by coordinating immersive training programs, phishing simulations, and reporting key performance indicators to leadership. Mentor direct reports and junior team members, fostering a spirit of curiosity, initiative, and continual professional advancement.</li></ul><p><br></p>
  • 2025-11-21T18:14:13Z

Security Manager Job in Provo | Robert Half