✦ Luna Orbit — Cybersecurity

Information Security Manager

at How to Land aCybersecurityJob: Your Complete Guide

Onsite Posted March 16, 2026
Type Not Specified
Experience mid
Exp. Years Not specified
Education Not specified
Category Cybersecurity

This role involves managing an organization’s cybersecurity posture, developing security policies, and overseeing incident response and investigations to protect digital assets.

  • Develop security policies
  • Oversee security systems
  • Conduct incident investigations
  • Monitor cybersecurity threats
  • Implement security measures

Focuses on cybersecurity management, security policy implementation, threat monitoring, and incident handling, with tools like firewalls and monitoring systems.

The ideal candidate is an experienced cybersecurity professional with a strong background in security policies, incident response, and risk management. They should have a proactive approach to safeguarding organizational systems and be capable of overseeing security operations and investigations.

develops and implements security policiesexamines reports for cybersecurity risksoversees backup and security systemsconducts security violation investigations
security incident responsesecurity awareness trainingpenetration testingrisk management
firewallsmonitoring systems
firewallsincident responsesecurity policiesmonitoring systemssecurity violation investigationscybersecurity risks
firewallsincident responsesecurity policiesmonitoring systemssecurity violation investigationssimulated attackscybersecurity risks
analytical thinkingproblem-solvingattention to detailcommunicationleadership
Industry Technology / Cybersecurity
Job Function Cybersecurity management and incident response
Role Subtype Security Manager
Tech Domains Cybersecurity
information security managercybersecurityfirewallsincident responsesecurity policiesmonitoring systemssecurity violation investigationscybersecurity riskssecurity measuressecurity systemsinformation securitysecurity violationsrisk assessmentsecurity managementsecurity protocols

Lack of experience in security policy development, No background in cybersecurity risk assessment, No experience with security incident investigations

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile