Information Security Operations Manager

Location US-TX-Dallas | US-CA-San Marino
Job ID
2026-12923
Category
Information Technology
Position Type
Full-Time

Introduction

Since 1973, East West Bank has served as a pathway to success. With over 110 locations across the U.S. and Asia, we are the premier financial bridge between the East and West. Our teams of experienced, multi-cultural professionals help guide businesses and community members on both sides of the Pacific looking to explore new markets and create new opportunities, and our sustained growth and expertise in industries like real estate, entertainment and media, private equity and venture capital, and high-tech help build sustainable businesses and expand our associates’ potential for career advancement. 
 
Headquartered in California, East West Bank (Nasdaq: EWBC) is a top-performing commercial bank with a strong foundation, an enterprising spirit and a commitment to absolute integrity. East West Bank gives people the confidence to reach further.

Overview

The information security Operations manager is responsible for providing leadership, as well as operational and tactical directions to diverse teams, including analysts, engineers and architects. The security manager provides strategic direction, but at the direction of the CISO / Deputy CISO. The security manager leads the team through the information security program by establishing highly effective policies, corporate protocols and appropriate collaboration among teams. In addition, this leader assumes responsibility for the education and enforcement of those protocols and matters of compliance.

 

The security manager possesses a strong technical background and understands risk, mitigation and technical controls. The manager is expected to lead teams that perform technical work and must possess leadership qualities.

 

This position requires strong written and oral communication skills, as well as the ability to communicate detailed, technical information in a manner comprehensible by individuals at varying degrees of experience and skill level. This role requires the ability to speak confidently in front of large groups and with corporate management, vendors and service providers. The information security manager also contributes to the company IT security strategy and roadmap.

Responsibilities

  • Be actively informed and engaged in daily security operations. Oversee day‑to‑day security operations, including SOC monitoring, alert triage, and investigation across SIEM, EDR/XDR/IDS/IPS network, cloud, and identity platforms.
  • Ensure continuous security coverage through internal teams and managed security service providers (MSSPs) on a 24x7 basis.
  • Maintain operational runbooks, playbooks, and escalation procedures aligned with regulatory expectations.
  • Manage the end‑to‑end security incident response lifecycle, including detection, containment, eradication, recovery, post‑incident reviews, and forensic analysis.
  • Monitor enterprise spam and phishing emails and participate in developing social engineering exercises
  • Monitoring DLP incidents, investigation, and tuning of DLP solution
  • Adhere to service level agreements (SLAs), metrics and business scorecard obligations for ticket handling of security incidents and events.
  • Gather, analyze and assess the current and future threat landscape, and assist in providing leadership with a realistic overview of risks and threats in the enterprise environment.
  • Review audit trails, system logs and other monitoring data sources regularly and ensure they are in compliance with policies and audit requirements.
  • Work with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments.
  • Partner with the security engineering team to improve tool usage and workflow and mature monitoring and response capabilities.
  • Analyzes technologies and establishes highly effective processes and protocols to ensure comprehensive protection exists to prevent unauthorized entry into the company networks and systems.
  • Supports automation and orchestration to maximize team talent and reduce routine tasks.
  • Actively recruits and leads by example to create a culture where employees want to work.
  • Mentors security team and places a heavy emphasis on employee retention – people, first.
  • Participates in the company’s change management program.
  • Stays abreast of the security industry threat landscape, specifically within the company’s industry.
  • Recognizes his/her personal developmental needs and is proactive in obtaining the coaching, networking and training needed to ensure his/her continued success in the position.
  • Creates a working environment that is conducive to two-way communication, teamwork and learning.
  • Recognizes the varying strengths, skills and needs of the team and adapts his/her coaching skills to obtain the best possible results from each individual contributor.
  • Openly supports the organization, the management team and executive leadership team, even during times of adversity.
  • Utilizes open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld.
  • Acts as a change agent and drives the department and business forward using effective management, analysis and strategic skills.
  • Leads security-related projects from inception to successful completion and is capable of effectively coaching technology staff on appropriate security protocols and needs as they implement new technology into the organization.
  • Assumes responsibility for other duties as required or assigned.

Qualifications

  • Preferably 10+ years of technical hands-on security experience with at least 3-5 years in a team lead or supervisor role
  • Experience with leading incident response activities and handling
  • In-depth knowledge of risk assessment methods and technologies
  • Experience working with security tools and technologies such as IDS/IPS/SIEM, vulnerability scanning, laptop data encryption, endpoint data protection, Data Loss Prevention (DLP) and data classification, penetration testing, WAFs, Cloud Workload Monitoring.
  • Excellent technical knowledge of Office 365 and Microsoft Windows operating systems and a wide range of security technologies, such as network security appliances, identity and access management systems, anti- malware solutions, automated policy compliance, logging and filtering tools, and desktop security solutions.
  • Knowledge of network infrastructure, including routers, switches, firewalls and associated network protocols and concepts
  • Demonstrates strong written and oral communication skills
  • Understands service design and delivery concepts
  • Demonstrates solid organizational skills and the ability to multi-task, prioritize workload and delegate responsibilities
  • Effectively manages stress in a constantly changing environment
  • Leverages subject matter expertise in security and compliance
  • Demonstrates excellent judgment and the ability to make quick decisions and think outside the box when working with complex situations.
  • Ability to interact with personnel at all levels and across all business units / organizations, and to understand business imperatives.
  • Demonstrates a high level of flexibility
  • Is forward thinking and possesses business acumen
  • Possesses a high level of integrity, trustworthiness and confidence, and represents the company and its management team at the highest level of professionalism
  • Demonstrates strong analytical skills and is effective at interpreting and applying applicable regulations
  • Works effectively with a variety of personalities and can adapt his/her approach to effectively reach and develop his/her team. Uses this skill as well as his/her functional knowledge to both earn and maintain a high level of credibility with the team
  • Proficient use of various tools and techniques, including risk, business impact, control and vulnerability assessments, used to identify business needs and determine control requirements.
  • Strong knowledge of all core internet protocols (e.g., TCP/IP, DNS, SMTP, HTTP, etc.)
  • Experience supporting cloud‑based and hybrid environments (AWS and Azure).
  • Experience working in regulated industries (financial services, healthcare, technology, etc.).
  • Familiarity with automation, SOAR, and security orchestration technologies.
  • Experience with Linux is a plus

Additional Qualifications

  • Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating well.
  • Analytical and problem-solving mindset.
  • Highly organized and efficient.

Education Requirements

  • Bachelor’s degree in computer science, information assurance, MIS, engineering or related field, or equivalent.
  • Master’s degree, MBA or advanced degree in information assurance/technology not required but preferred.

Experience Requirements

 

  • 8-10+ years of related experience required

Certification Requirements

  • CISSP; CISM; CISA and/or SANS certification a plus

Applicants must have legal authorization to work in the United States. We do not offer visa sponsorship at this time.

Compensation

The base pay range for this position is USD $200,000.00/Yr. - USD $250,000.00/Yr. Exact offers will be determined based on job-related knowledge, skills, experience, and location.

Options

<p style="margin: 0px;"><span style="color: #54585a;">Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.</span></p>
Share on your newsfeed