Security Lead
USA
Job description
Position Description:
Join a fast‑growing information security team supporting one of the world's largest IT providers. As part of the US GTO Security Strategy and Solutions team, the Security Lead (Security Manager/CSO) oversees physical and cyber security operations, partners with IT and senior leadership, and leads a team of five professionals to deliver compliant, effective security programs across U.S.-based industries.
The preferred location is Nashville, TN, but may be located within proximity of any CGI US location. This role requires up to 25% travel.
Future Duties and Responsibilities
. Developing Security Policies and Procedures: Develop comprehensive security policies and procedures that cover various aspects of security, including physical security, cyber security, and data protection.
. Risk Assessment and Management: Conduct regular risk assessments to identify potential security threats and vulnerabilities that include analyzing the organization's assets, evaluating the potential risks, and implementing measures to mitigate these risks.
. Implementing Security Measures: Implement appropriate security measures including installation of surveillance systems, access control mechanisms, and cybersecurity tools.
. Monitoring Security Operations: Continuous monitoring of security operations including overseeing the operation of security systems, monitoring potential security incidents, and responding promptly to any alerts or breaches.
. Incident Response and Management: Coordinate with relevant teams, investigate the incident, take corrective actions to resolve the issue and conduct a post-incident analysis to identify lessons learned and improve future incident response strategies.
. Training and Awareness: Educate employees about security best practices. This involves organizing regular training sessions and awareness programs.
. Compliance and Regulatory Requirements: Ensure the organization complies with all relevant security regulations and standards. This includes staying up to date with changes in laws and regulations, conducting regular audits, and implementing necessary changes to remain compliant.
. Liaison with External Agencies: Act as the primary point of contact between the organization and external security agencies, such as law enforcement, regulatory bodies, and cybersecurity experts.
. Budget Management: Plan and allocate resources for various security initiatives, ensuring that the organization invests in the right security technologies and solutions.
. Leadership and Team Management: Establish clear goals, provide regular feedback, and ensure the team has the necessary skills and resources to perform their duties effectively.
. Reporting and Documentation: Maintain detailed records of all security activities, incidents, and audits. Provide regular reporting to senior management and other stakeholders.
. Industry Best Practices: Continuously seek ways to improve the organization's security posture and be informed about the latest security trends, technologies, and best practices.
Required Qualifications to be Successful in this Role
Knowledge and Skills:
. Strong knowledge of cybersecurity principles, standards, and best practices
. Proficiency in network security technologies (firewalls, VPNs, IDS/IPS, monitoring tools)
. Experience securing Windows, Linux, and Unix environments
. Understanding of secure coding and application security principles
. Knowledge of encryption, cryptographic protocols, and key management
. Hands-on experience with vulnerability assessment and penetration testing
. Familiarity with cloud security architectures and best practices
. Solid understanding of core networking protocols (TCP/IP, DNS, DHCP, routing)
. Experience implementing security controls to meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS)
Technical Proficiency:
. Hands-on experience with SIEM, endpoint protection, IDS, and vulnerability scanning tools
. Strong understanding of network and web protocols and related security risks (e.g., HTTP, SSL/TLS, SMTP, DNS)
. Knowledge of industry security frameworks, including NIST, ISO 27001, and CIS Controls
. Proficiency in Python and PowerShell
Analytical and Problem-Solving Skills:
. Strong analytical skills to identify and assess security risks and vulnerabilities; as well as determination of root causes and recommend remediation actions.
. Excellent problem-solving skills to develop effective security solutions and countermeasures.
Communication and Collaboration:
. Strong written and verbal communication skills.
. Ability to collaborate effectively with cross-functional teams, including IT, development, and operations, to implement security measures and respond to security incidents.
. Experience in creating and delivering security training and awareness programs.
Preferred Certifications:
Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), or GIAC Security certifications.
Other Information:
CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $110,000.00 - $140,000.00.
CGI anticipates accepting applications until February 13, 2026.
CGI's benefits are offered to eligible professionals on their first day of employment to include:
. Competitive compensation
. Comprehensive insurance options
. Matching contributions through the 401(k) plan and the share purchase plan
. Paid time off for vacation, holidays, and sick time
. Paid parental leave
. Learning opportunities and tuition assistance
. Wellness and Well-being programs
Your future duties and responsibilities:
• Developing Security Policies and Procedures: Develop comprehensive security policies and procedures that cover various aspects of security, including physical security, cyber security, and data protection.
• Risk Assessment and Management: Conduct regular risk assessments to identify potential security threats and vulnerabilities that include analyzing the organization's assets, evaluating the potential risks, and implementing measures to mitigate these risks.
• Implementing Security Measures: Implement appropriate security measures including installation of surveillance systems, access control mechanisms, and cybersecurity tools.
• Monitoring Security Operations: Continuous monitoring of security operations including overseeing the operation of security systems, monitoring potential security incidents, and responding promptly to any alerts or breaches.
• Incident Response and Management: Coordinate with relevant teams, investigate the incident, take corrective actions to resolve the issue and conduct a post-incident analysis to identify lessons learned and improve future incident response strategies.
• Training and Awareness: Educate employees about security best practices. This involves organizing regular training sessions and awareness programs.
• Compliance and Regulatory Requirements: Ensure the organization complies with all relevant security regulations and standards. This includes staying up to date with changes in laws and regulations, conducting regular audits, and implementing necessary changes to remain compliant.
• Liaison with External Agencies: Act as the primary point of contact between the organization and external security agencies, such as law enforcement, regulatory bodies, and cybersecurity experts.
• Budget Management: Plan and allocate resources for various security initiatives, ensuring that the organization invests in the right security technologies and solutions.
• Leadership and Team Management: Establish clear goals, provide regular feedback, and ensure the team has the necessary skills and resources to perform their duties effectively.
• Reporting and Documentation: Maintain detailed records of all security activities, incidents, and audits. Provide regular reporting to senior management and other stakeholders.
• Industry Best Practices: Continuously seek ways to improve the organization's security posture and be informed about the latest security trends, technologies, and best practices.
Required qualifications to be successful in this role:
Knowledge and Skills:
• Strong knowledge of cybersecurity principles, standards, and best practices
• Proficiency in network security technologies (firewalls, VPNs, IDS/IPS, monitoring tools)
• Experience securing Windows, Linux, and Unix environments
• Understanding of secure coding and application security principles
• Knowledge of encryption, cryptographic protocols, and key management
• Hands-on experience with vulnerability assessment and penetration testing
• Familiarity with cloud security architectures and best practices
• Solid understanding of core networking protocols (TCP/IP, DNS, DHCP, routing)
• Experience implementing security controls to meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS)
Technical Proficiency:
• Hands-on experience with SIEM, endpoint protection, IDS, and vulnerability scanning tools
• Strong understanding of network and web protocols and related security risks (e.g., HTTP, SSL/TLS, SMTP, DNS)
• Knowledge of industry security frameworks, including NIST, ISO 27001, and CIS Controls
• Proficiency in Python and PowerShell
Analytical and Problem-Solving Skills:
• Strong analytical skills to identify and assess security risks and vulnerabilities; as well as determination of root causes and recommend remediation actions.
• Excellent problem-solving skills to develop effective security solutions and countermeasures.
Communication and Collaboration:
• Strong written and verbal communication skills.
• Ability to collaborate effectively with cross-functional teams, including IT, development, and operations, to implement security measures and respond to security incidents.
• Experience in creating and delivering security training and awareness programs.
Preferred Certifications:
Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), or GIAC Security certifications.
Other Information:
CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $110,000.00 - $140,000.00.
CGI anticipates accepting applications until February 13, 2026.
CGI’s benefits are offered to eligible professionals on their first day of employment to include:
Competitive compensation
Comprehensive insurance options
Matching contributions through the 401(k) plan and the share purchase plan
Paid time off for vacation, holidays, and sick time
Paid parental leave
Learning opportunities and tuition assistance
Wellness and Well-being programs
Skills:
· Identity and Access Mgt (IAM)
· Linux
· Windows
What you can expect from us:
Together, as owners, let’s turn meaningful insights into action.
Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because…
You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction.
Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise.
You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons.
Come join our team—one of the largest IT and business consulting services firms in the world.
Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, pregnancy, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status or responsibilities, reproductive health decisions, political affiliation, genetic information, height, weight, or any other legally protected status or characteristics to the extent required by applicable federal, state, and/or local laws where we do business.
CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_Compliance@cgi.com . You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned.
We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members.
All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements, and in accordance with applicable laws, some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances.
CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI’s legal duty to furnish information.