Director, Information Security Operations

Sorry, this job was removed at 11:11 p.m. (PST) on Tuesday, Jul 30, 2024
Be an Early Applicant
Remote
175K Annually
7+ Years Experience
Artificial Intelligence • Healthtech • Information Technology • Other • Software • Business Intelligence
Consensus Cloud Solutions transforms simple digital documents to analytics-ready documents unveiling actionable data.
The Role

Consensus Cloud Solutions is a publicly traded, leading digital cloud fax and interoperability solutions organization in the United States and globally, focusing on connecting and empowering healthcare providers, payers, care teams, and technology innovators to unify multiple systems that wouldn’t otherwise talk to each other. Consensus is a trailblazer in our industry and believes that data transformation will reshape the world of healthcare.

Founded over 25 years ago, Consensus leverages its technology heritage to move from simple digital documents to advanced healthcare standards (HL7/FHIR) for secure data transport, as well as Natural Language Processing (NLP) and Artificial Intelligence (AI) to convert unstructured to structured, analytics-ready data, helping users unveil information that is meaningful and actionable for better patient care.  

With more than 11 million users worldwide, Consensus leads the industry in data exchange solutions and we’re only getting started! With exciting new initiatives on the horizon, we are continuing our strategic expansion and we are looking to add to our diverse team of innovators. 

Now is the ideal time to join us in our mission to solve healthcare’s biggest challenges, and work collaboratively with a diverse team of like-minded self-starters and partners to accomplish it. 

Consensus Cloud Solutions is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive and equitable environment for all employees. We offer many remote and hybrid career opportunities.


The Director of Information Security Operations at Consensus Cloud Solutions is pivotal in maintaining the organization’s security operations and security posture. This role encompasses leading and managing the security operations center, overseeing security monitoring, alerting, and vulnerability management to ensure system, data, and software security, collecting and analyzing security event logs to identify and mitigate risks, and implementing continuous monitoring for real-time threat detection. They are responsible for asset protection monitoring, automating access reviews and approval workflows, monitoring least privilege access, and minimizing attack surfaces to reduce potential entry points for cyber threats. Additionally, they oversee asset management, patch management and protection, support internal and external audits to ensure compliance and lead security incident response to resolve security issues effectively. Maintaining the centralized log collection and monitoring platform is also a top responsibility for this role. Reporting security metrics to management is also vital, providing actionable insights for strategic decisions. This director collaborates with executives and various departments and team leads, including Engineering, Product Management, IT, Network Operations, Project Management, Sales, Marketing, Legal, Internal Audit, HR, and external partners, to uphold and enhance the security framework and compliance standards of Consensus Cloud Solutions.


  • Maintain the organization’s global security operations functions, lead and continue to develop the security operations center and security posture, ensuring alignment with regulatory requirements and internal policies across all regions.
  • Manage the vulnerability management program and oversee patch management processes by collaborating with cross-functional teams and system owners who deploy the patches to ensure all software and systems are regularly updated with the latest security patches, reducing vulnerabilities and enhancing system integrity.
  • Conduct vulnerability scanning to systematically identify security weaknesses, assess the severity of risks, and prioritize remediation efforts to mitigate potential threats.
  • Implement continuous monitoring systems to provide real-time detection and response to security incidents, ensuring constant vigilance and quick reaction to emerging threats.
  • Monitor asset protection to secure critical assets from unauthorized access, theft, or damage, employing advanced security measures and monitoring tools.
  • Manage access reviews and approvals by regularly reviewing access controls, ensuring access rights are granted based on the principle of least privilege, and promptly addressing discrepancies.
  • Minimize attack surfaces by identifying and mitigating potential entry points for cyber threats, employing strategies to reduce the organization’s risk exposure.
  • Oversee asset management and protection by maintaining an accurate inventory of IT assets, implementing robust security measures throughout their lifecycle, and ensuring secure decommissioning of assets.
  • Support internal and external audits by providing comprehensive documentation, addressing audit findings, and implementing necessary corrective actions to ensure compliance with security policies and regulations.
  • Lead security incident response efforts by developing and maintaining an incident response plan, coordinating investigations, managing communication during incidents, and ensuring effective resolution and post-incident analysis.
  • Monitor and report security metrics to management, developing key performance indicators (KPIs), and providing actionable insights and regular updates to inform strategic security decisions and demonstrate the effectiveness of security measures.
  • Collaborate with executives and various departments, including Engineering, Product Development, IT, Network Operations, Project Management, Sales, Marketing, Legal, Internal Audit, HR, and external partners, to ensure integrated security practices that support the organization’s objectives.
  • Uphold and enhance the security framework and compliance standards of Consensus Cloud Solutions, driving continuous improvement and adapting to emerging security threats and regulatory changes to maintain a robust security posture.
  • The role is crucial in overseeing the design and implementation of the organization's information security operations program, including patch management, vulnerability management, continuous monitoring, asset protection management, access reviews, security incident response, and operational security controls. They ensure that security operations are integral to the cloud technology stack.
  • Identifying, selecting, and implementing information security operations tools and technologies that align with the organization's security program is an essential responsibility. This may include vulnerability management platforms, vulnerability scanning tools, patch management tools, security incident response tools, monitoring and alerting tools, cloud-based identity provider platforms, and identity and access management systems.
  • Providing guidance and expertise to software development, cloud infrastructure, and IT teams on designing and implementing secure and compliant solutions is critical. The role helps teams make informed decisions about technology and compliance choices that prioritize security operations and response capabilities.
  • Perform other duties and responsibilities as required, assigned, or requested. Consensus reserves the right to add or change duties at any time.


  • 10+ years experience in Information Security Operations role. 
  • 8+ years of experience with SIEM platforms for security incident response monitoring and alerting.
  • 6+ years of experience with Vulnerability Management platforms for scanning web applications and cloud workloads.
  • 6+ years of experience with AWS cloud technologies. 
  • 5+ years of experience leading and managing security operations and project management professionals or equivalent experience. 
  • In-depth knowledge of security information and event management (SIEM) systems, including configuring, managing, and optimizing SIEM tools for continuous monitoring and real-time threat detection.
  • Proficiency in patch management solutions and processes, ensuring timely and effective deployment of patches across all systems to mitigate vulnerabilities and maintain software security.
  • Expertise in vulnerability scanning tools and methodologies, such as Nessus, Qualys, or OpenVAS, to identify, assess, and prioritize security risks and implement remediation strategies.
  • Experience with asset protection technologies, including data loss prevention (DLP) solutions, encryption methods, and access control systems, to secure critical assets from unauthorized access and threats.
  • Knowledge of access management systems, such as Identity and Access Management (IAM) solutions, to manage and enforce the principle of least privilege, conduct access reviews, and handle approvals.
  • Skills in attack surface management tools and techniques, including using solutions like Attack Surface Analyzer, Securityscorecard, or RiskIQ, to identify and mitigate potential entry points for cyber threats.
  • Competence in asset management systems, such as configuration management databases (CMDB) and IT asset management (ITAM) tools, to track and protect IT assets throughout their lifecycle.
  • Experience in conducting and supporting internal and external security audits, ensuring compliance with frameworks like GDPR, HIPAA, SOC 2, and ISO 27001, and addressing audit findings with appropriate corrective actions.
  • Leadership in developing and implementing incident response plans, including coordinating with incident response teams and using tools like Security Orchestration, Automation, and Response (SOAR) platforms to effectively manage and resolve security incidents.
  • Proficiency in developing and analyzing security metrics, using tools like dashboards and reporting software to monitor security performance, provide actionable insights, and support strategic decision-making.
  • Familiarity with advanced security technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection platforms (EPP), and advanced threat protection (ATP) solutions, to protect the organization’s IT infrastructure.
  • Technical expertise in encryption and cryptographic techniques, ensuring secure data transmission and storage, and protecting sensitive information from unauthorized access.
  • Knowledge of cloud security technologies and best practices, including securing cloud environments and services, implementing cloud access security brokers (CASB), and ensuring compliance with cloud security standards.
  • Competence in network security technologies, such as virtual private networks (VPNs), secure sockets layer (SSL)/transport layer security (TLS), and network segmentation, to safeguard network communications and infrastructure.
  • Experience with project management tools and methodologies, ensuring effective planning, execution, and oversight of security projects and initiatives aligned with organizational goals.
  • Continuous learning and adaptation to emerging security trends, staying updated with the latest security threats, technologies, and best practices to improve the organization’s security posture continually.
  • Ability to integrate security operations with IT practices, using tools like security as code and automated security testing to embed security measures into the system development lifecycle (SDLC).
  • Advanced knowledge of global security operations and compliance requirements, including relevant regulations and standards such as GDPR, HIPAA, SOC 2, SOX, HITRUST, and ISO 27001, to ensure the organization's adherence to legal and regulatory mandates.
  • Expertise in patch management processes, including prioritizing, testing, and deploying patches effectively to maintain software security and reduce vulnerability exposure.
  • Proficiency in conducting vulnerability assessments, with skills in using various vulnerability scanning tools and methodologies to identify, evaluate, and mitigate security risks.
  • Experience in continuous monitoring techniques, employing endpoint and cloud workload protection, patch management tools, and advanced security information and event management (SIEM) tools for real-time threat detection and response.
  • Strong capabilities in asset protection monitoring, utilizing tools and strategies to safeguard critical assets from unauthorized access and potential threats.
  • Knowledge of access control mechanisms and principles, particularly the least privilege principle, to effectively manage access reviews and approvals with cloud-based identity provider solutions.
  • Skills in attack surface management, including identifying, assessing, and reducing potential entry points for cyber threats to minimize the organization's risk exposure.
  • Competence in asset management and protection, ensuring accurate tracking, secure management, and proper decommissioning of IT assets throughout their lifecycle.
  • Ability to support and facilitate internal and external audits, including preparing documentation, addressing audit findings, and implementing corrective actions to ensure compliance with security policies and regulations.
  • Leadership in security incident response, capable of developing, maintaining, and executing incident response plans, coordinating investigations, and managing communication and resolution efforts during incidents.
  • Expertise in monitoring and reporting security metrics, developing key performance indicators (KPIs), and providing actionable insights to management for informed strategic decision-making.
  • Strong collaboration and communication skills, working effectively with executives and various departments, including Engineering, Product Development, IT, Network Operations, Project Management, Sales, Marketing, Legal, Internal Audit, HR, and external partners, to integrate and align security practices with organizational objectives.
  • Strategic thinking and problem-solving abilities, focusing on upholding and enhancing cloud-based products and solutions' security framework and compliance standards such as SaaS and AWS public and gov cloud infrastructure. 
  • Project management skills, including planning, executing, and overseeing security projects and initiatives, ensuring timely completion and alignment with the organization’s goals.
  • Technical proficiency in cloud-based security technologies and tools, such as virtual firewalls, host-based virtualized intrusion detection/prevention systems (IDS/IPS), encryption solutions, and advanced endpoint security tools, to effectively manage and protect the infrastructure.
  • Adaptability and continuous learning mindset, staying current with emerging security threats, trends, and technologies to improve the organization’s security posture continually.


  • Bachelor's degree in computer science, information technology, cybersecurity, or equivalent experience. A master's degree may be preferred.
  • Typically 10 years of experience in cybersecurity and information technology security roles.
  • Previous experience in leadership or managerial positions, such as a team lead or senior security operations analyst.
  • Proven experience in security operations, incident response, and security monitoring for cloud-based products and solutions.
  • Proficiency in various cybersecurity technologies and tools, including attack surface analysis tools, vulnerability scanning tools, penetration testing tools, cloud access security brokers (CASB), and extended or managed detection and response (MDR/XDR) platforms.
  • Hands-on experience with cloud-based patch management, security assessment, and security benchmarking testing tools.
  • Familiarity with security information and event management (SIEM) systems.
  • Experience in deployment of cloud controls for infrastructure, platform, and applications (IaaS/SaaS/PaaS), specifically within AWS.


  • Location requirements: Fully remote within the U.S. (Los Angeles, Las Vegas or Braintree, Massachusetts preferred.)
  • Travel requirements: Up to 10% travel. 
  • Physical requirements: Must be able to sit for long periods, as well as, handle long periods of screen time.
  • Technology requirements: Reliable, high speed internet
  • Eligible for sponsorship: No 
  • Security clearance: Ability to achieve and maintain a security clearance with the U.S. Government is required


The salary range for this role is up to $175,000 USD.  The total compensation package for this position is negotiable and may also include [annual performance bonus, ESPP, enhanced time off packages and benefits.]

What the Team is Saying

Anu
David
The Company
Los Angeles, CA
398 Employees
Remote Workplace
Year Founded: 1997

What We Do

A public company, founded over 25 years ago, Consensus is the global leader in digital cloud and fax technology. Focusing in the healthcare space, we use interoperability to unify multiple systems that wouldn’t otherwise talk to each other.

With exciting new initiatives on the horizon, we are continuing our strategic expansion. Read on to learn why now is the ideal time to join the Consensus team.

Consensus leverages technology heritage to move from simple digital documents to advanced healthcare standard HL7/FHIR for secure data transport as well as Natural Language Processing (NLP)/AI to convert unstructured to structured, analytics-ready documents helping users unveil information that is meaningful and actionable.

Our interoperability suite of solutions offers a unified digital environment that optimizes workflows, provides real-time event notifications, on-demand patient query, direct secure messaging, universal APIs, NLP/AI, electronic signature and eFax HITRUST CSF® Certified digital cloud faxing. With more than 11 million users worldwide Consensus Cloud Solutions leads the industry in interoperability solutions that create operational efficiencies and enhance communications. Visit consensus.com

Consensus Cloud Solutions is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive and equitable environment for all employees.

Gallery

Gallery
Gallery
Gallery

Consensus Cloud Solutions Teams

Team
Innovation With Real-World Impact
About our Teams

Consensus Cloud Solutions Offices

Remote Workspace

Employees work remotely.

The majority of our roles are fully remote. On occasion, we have a few positions that are hybrid.

Typical time on-site: None
Los Angeles, CA

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account