HimalayasHimalayas logo
DICK'S Sporting GoodsDG

Manager Cybersecurity Engineering - Data & AI

Dick's Sporting Goods is the largest sporting goods retailer in the U.S., committed to excellence and community impact through sports.

DICK'S Sporting Goods

Employee count: 5000+

Salary: 95k-159k USD

United States only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

At DICK’S Sporting Goods, we believe in how positively sports can change lives. On our team, everyone plays a critical role in creating confidence and excitement by personally equipping all athletes to achieve their dreams. We are committed to creating an inclusive and diverse workforce, reflecting the communities we serve.

If you are ready to make a difference as part of the world’s greatest sports team, apply to join our team today!

OVERVIEW:

The Manager, Cybersecurity Engineering - Data and AI will drive strategic support, engineering, and operations of critical cybersecurity technologies covering data protection and governance controls (including data loss prevention), and security capabilities for AI-enabled endpoints, agents, and applications to assure the security posture of the organization’s networks and endpoint systems, all while acting as a security liaison to business and technology stakeholders. Inclusive of the core technology engineering work will be facilitating the audit, reporting, monitoring, and analytics involved with the overarching Data and AI capabilities. This role requires the ability to translate the technology risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The role coordinates the technology organization's technical activities to consult and assure the security posture of the organization via Data and AI infrastructure while providing regular status and service-level reports to management. 

An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance.  Expertise in leading project teams and developing and managing projects is essential for success in this role. As well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting.  Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position. 

The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of theposition.  Technology personnel responsible for managing technical security infrastructure may report directly to the role or may report to other areas of Technology (for example, networking, servers or database management), with their security-related activities coordinated by the role.

Strategy and People Leadership: 

Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements.  Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals andobjectives.  Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department.  Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.  Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members. 

Security Liaison: 

Assist resource owners and technology staff in understanding and responding to security audit failures reported by auditors. Provide security communication and awareness for audiences, which may range from senior leaders to field staff. Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums.  Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support for legal and regulatory compliance efforts, including audit support. 

Security Engineering: 

Consult with technology and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.  Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with technology management to align existing technical installed base and skills with future architectural requirements.  Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory, and audit requirements. 

Operational Support: 

Coordinate, measure and report on the technical aspects of security management.  Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.  Support operational components of incident management, including detection, response and reporting. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other technology projects. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of networks and endpoint systems, and manage the remediation of identified risks. 

PREFERRED QUALIFICATIONS:

  • CISM (preferred not required) 

  • CISSP (preferred not required) 

  • Operating Systems such as Windows and Linux -Data security and data loss prevention (DLP) familiarity across: data classification and labeling, policy authoring and tuning, endpoint and cloud/app coverage, data discovery, encryption and key management concepts, incident triage/response workflows, reporting/metrics, and integration with compliance, legal, and privacy processes. 

  • Understanding of web security standards, architecture, web security best practices and application security best practices -Experience implementing and operating security capabilities for AI-enabled endpoints, agents, and applications (including protections against data exfiltration and unsafe content), such as prompt and input/output controls, content safety, sensitive data detection, and alerting/telemetry (e.g., AIDR and Prompt Shield or equivalent capabilities). 

  • Cloud security -Strong understanding of security engineering foundations that support Data and AI controls, including secure configuration and hardening, secrets management, API integrations, logging/monitoring (SIEM), automation (SOAR), and SDLC/CI-CD integration; ability to partner with Vulnerability Management and AppSec teams to remediate findings and improve control effectiveness. 

  • Strong understanding and implementation of Technology bestpractices, policies and procedures  

  • Assessing risk and business impact of technical changes to our environment 

  • Proactively identifying and evaluating problems, determine root cause 

  • Public and private cloud engineering and strategic view of cost-effective hosting 

  • Translating a service interruption into an impact analysis and execute a corrective plan of action 

  • Contract negotiations, vendor management, project management and financial management 

  • Effective leadership and management during crisis 

  • Ability to effectively plan, organize, schedule and coordinate among competing priorities across multiple entities 

  • Ability to effectively communicate complex technical issues. 

  • Good interpersonal skills with staff, end-users, peers, management, and vendors 

  • A strong understanding of the business impact of security tools, technologies and policies 

  • In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies 

  • Experience working with legal, audit and compliance staff 

  • Experience developing and maintaining policies, procedures, standards and guidelines 

  • An understanding of operating system internals and network protocols 

  • Familiarity with the principles of cryptography and cryptanalysis 

  • Experience managing and delivering enterprise DLP programs across email, endpoints, collaboration tools, and cloud applications 

  • Experience implementing and tuning DLP policies that balance risk reduction with user experience and business productivity 

  • Working knowledge of data classification, labeling, and information protection concepts and how they operationalize across platforms 

  • Experience leading teams responsible for data protection operations, including alert triage, investigations, and escalation workflows 

  • Familiarity with integrating DLP signals into SIEM/SOAR platforms to support incident response and automation 

  • Experience supporting or securing AI-enabled tools and services used by the business (e.g., Copilot, internal AI tools, third-party AI SaaS) 

  • Understanding of AI data risks, including prompt-based data exposure, unintended outputs, and sensitive data leakage 

  • Experience applying data protection and DLP controls to AI usage to reduce the risk of sensitive data exposure 

  • Understanding of how Responsible AI principles intersect with security, privacy, and data protection 

  • Ability to lead teams through change management as AI capabilities and controls evolve 

QUALIFICATIONS:

  • ​Bachelor's Degree or equivalent experience​ in management information systems, computer science, information security/cybersecurity or equivalent experience 
  • 3-5years experienceinIdentity and access management, security threat detection and risk management, technology controls, security frameworks, DevSecOps, staff mentorship & development 
  • CISM (preferred)
  • CISSP (preferred)

VIRTUAL REQUIREMENTS:

At DICK’S, we thrive on innovation and authenticity. That said, to protect the integrity and security of our hiring process, we ask that candidates do not use AI tools (like ChatGPT or others) during interviews or assessments.

To ensure a smooth and secure experience, please note the following:

  • Cameras must be on during all virtual interviews.

  • AI tools are not permitted to be used by the candidateduring any part of the interview process.

  • Offers are contingent upon a satisfactory background check which may include ID verification.

If you have any questions or need accommodations, we’re here to help. Thanks for helping us keep the process fair and secure for everyone!

Targeted Pay Range: $95,200.00 - $158,800.00. This is part of a competitive total rewards package that could include other components such as: incentive, equity and benefits. Individual pay is determined by a number of factors including experience, location, internal pay equity, and other relevant business considerations. We review all teammate pay regularly to ensure competitive and equitable pay.DICK'S Sporting Goods complies with all state paid leave requirements. We also offer a generous suite of benefits. To learn more, visit www.benefityourliferesources.com.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Salary

Salary: 95k-159k USD

Education

Bachelor degree

Experience

3 years minimum

Experience accepted in place of education

Location requirements

Hiring timezones

United States +/- 0 hours

About DICK'S Sporting Goods

Learn more about DICK'S Sporting Goods and their company culture.

View company profile

Starting with a $300 investment in a tiny bait-and-tackle shop in 1948, Dick Stack sparked the vision that would become a multi-billion-dollar sporting goods retailer. Through all the years of incredible changes, one thing has remained consistent – DICK’S purpose-driven culture. We’ve always recognized the positive impact sports can have in people’s lives and we maintain a tireless dedication to ensuring everyone has access to the transformative power of sports. As the largest sporting goods retailer in the United States, DICK’S is proud to give back to our communities as we serve our athletes through a variety of brands.

DICK'S offers a wide range of amenities for employees, such as competitive pay, medical, dental, and vision plans, paid parental leave, and comprehensive benefits that support physical and mental wellness. Our corporate office, located in Coraopolis, PA, follows a hybrid schedule, reflecting our commitment to work-life balance. Our teammates are skilled, driven, and dedicated to creating a better world through sports, as we actively engage in community initiatives and programs. Furthermore, we’re continuously striving for innovation in delivering the finest in sports retailing experiences.

Claim this profileDICK'S Sporting Goods logoDG

DICK'S Sporting Goods

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

39 remote jobs at DICK'S Sporting Goods

Explore the variety of open remote roles at DICK'S Sporting Goods, offering flexible work options across multiple disciplines and skill levels.

View all jobs at DICK'S Sporting Goods

Remote companies like DICK'S Sporting Goods

Find your next opportunity by exploring profiles of companies that are similar to DICK'S Sporting Goods. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan