10318 - Cyber Security Defense Head of Department (HOD)
Company Overview:
Hyundai AutoEver America (HAEA), the dynamic IT powerhouse behind Hyundai Motor Corporation, a Fortune 500 global leader in the automotive industry. As a key affiliate, we provide cutting-edge IT services and support to top brands including Kia, Genesis, Hyundai Translead, Hyundai Mobis, Hyundai Capital, and Glovis.
HAEA offers a truly global and collaborative environment. Here, you’ll drive innovation, boost operational efficiency, and help shape the future of mobility for the Hyundai Motor Group.
At HAEA, we understand that IT is the cornerstone of today’s fast-evolving digital world. By uniting all IT resources under one roof, we deliver consistent, top-quality solutions while serving as the crucial information link between Hyundai’s Global Headquarters and North American operations.
If you’re passionate about technology and eager to make a real impact at a world-class company, Hyundai AutoEver America is the place to grow your career. Join us and be part of the transformation that’s driving the future of automotive innovation.
Role Overview:
The Cyber Security Defense Head of Department (HOD) will lead and mature our organization’s end-to-end defensive security capabilities. This senior leadership role oversees the Security Operations Center (SOC), Blue Team, Red Team, Penetration Testing, Incident Response, Threat & Vulnerability Management (TVM), Application Security, and Adversary Simulation functions. The ideal candidate is both a visionary leader and a seasoned technical expert capable of building high-performing teams, implementing modern security practices, and driving continuous improvement across all cyber defense operations functions. The key responsibilities of this role are as described below:
Strategic Leadership & Governance
Develop and execute the Cyber Defense strategy aligned with organizational goals, customer requirements and the evolving threat landscapes.
Establish frameworks, processes, and KPIs for SOC, Incident Response, TVM, AppSec, Red/Blue Teaming, and Adversary Simulation.
Serve as a senior advisor to the CISO and executive leadership on cyber risks, readiness, and emerging threats.
Security Operations & Blue Team Oversight
Oversee 24x7 SOC operations, ensuring effective monitoring, detection, and response to security events, across levels 1-3.
Drive continuous enhancement of detection engineering, threat hunting, and security analytics.
Implement best-in-class security tooling, automation, and operational processes.
Adversarial Security: Red Team & Penetration Testing
Lead internal Red Team and offensive security capabilities, including penetration testing.
Define testing methodologies, operational rules of engagement, and reporting standards.
Translate offensive findings into actionable improvements for defensive teams and architecture.
Incident Response & Crisis Management
Oversee the Incident Response program, ensuring rapid and effective handling of security incidents.
Lead tabletop exercises, simulation drills, and readiness assessments.
Facilitate and lead high/critical incident responses, when the Incident Response Manager is unavailable. Coordinate with legal, communications, and executive stakeholders during major incidents.
Threat & Vulnerability Management (TVM)
Own the enterprise-wide vulnerability management strategy, including prioritization, remediation, and reporting.
Drive continuous scanning, assessment, and metrics to reduce risk across infrastructure, applications, and cloud environments.
Collaborate with engineering and operations teams to ensure timely and effective remediation.
Facilitate and the zero-day vulnerability response process, when the Incident Response Manager is unavailable.
Application Security (AppSec)
Lead the organization’s AppSec program, including secure SDLC practices, code reviews, SAST/DAST tools, and developer enablement.
Partner with software engineering to embed security into product and platform design.
Adversary Simulation & Cyber Readiness
Develop and run adversary simulation programs that mimic real-world threat actors.
Use intelligence-led scenarios to evaluate detection capabilities, response effectiveness, and organizational resilience.
Basic Qualifications:
Experience & Leadership: 15–20 years of progressive experience across the various cyber defense disciplines (SOC, Incident Response, Red/Blue teams, or similar defensive/offensive functions.) Proven experience leading cyber defense teams. Demonstrated ability to hire, mentor, and lead high-performing technical teams.
Education: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or a related discipline.
Technical Expertise: Strong knowledge of threat detection, incident response, adversary tactics (MITRE ATT&CK), vulnerability management, and secure software development. Excellent incident management, communication, and executive reporting skills.
Language Skills: Proficient in English for effective communication and coordination.
Availability: In the absence of IR team members, utilize a flexible work schedule to facilitate the security incident response process for high/critical incidents.
Preferred Qualifications:
Education and Certifications: Masters degree in Cybersecurity, Information Technology, Computer Science or a related discipline is preferred. Industry-recognized credentials such as CISSP, CISM, OSCP/OSCE, GIAC (GSEC, GCIA, GCIH, GPEN, GXPN) are highly desirable.
Framework Experience: Familiarity with, and prior participation with FIRST (Forum of Incident Response and Security Teams) is preferred.
Language Skills: Bi-lingual in English and Korean language proficiency is preferred to support global coordination and communication.
Team Culture:
The team fosters a high-performance, collaborative environment centered around proactive cybersecurity defense and excellent customer service. Members are expected to lead with accountability, communicate effectively across functions, and adapt to dynamic challenges. The culture values technical excellence, continuous improvement, and global coordination, ensuring readiness and resilience in the face of evolving threats.
Collaborative Leadership: Team members lead cross-functional service delivery efforts, coordinating with internal stakeholders, MSSPs, and external partners to drive delivery of services and maintain transparency.
Continuous Improvement & Accountability: The team regularly adjusts the Information Security strategy and roadmap in alignment with customer needs, changing threat landscape and industry trends.
Base Salary Range: $181,240 - $ 259,160