The Company
At TI, we are relentless in our drive to deliver the technology and tools that solve your biggest problems. For decades, we have operated with a passion to create a better world by making electronics more affordable through semiconductors. That passion is alive today as we help our customers design for new applications.
Our founders had the foresight to know that building a great company required a special culture to thrive for the long term. At TI, we refer to this as Living Our Values, and it’s how we operate daily.
For many years, we’ve run our business with three ambitions in mind:
We will act like owners who will own the company for decades.
We will adapt and succeed in a world that is ever-changing.
We will be a company that we’re personally proud to be a part of and would want as our neighbor.
When we’re successful in achieving these ambitions, our employees, customers, communities and shareholders all win.
Learn more ↗
The Opportunity
We are seeking an exceptional Director of Cyber Defense Operations to lead enterprise cyber defense capabilities in a high-stakes environment where semiconductors intellectual property, advanced manufacturing systems and global operations are under constant treat from sophisticated adversaries including nation-state actors
The role oversees core cyber defense capabilities including security monitoring, incident response, threat detection, threat hunting, vulnerability operations, and data protection
This is a hands-on leadership role embedded in a fast-paced environment where operational excellence, cross-functional collaboration, and technical decisive action are essential. You’ll be the linchpin connecting our frontline defense capabilities to executive leadership, translating complex security challenges into business impact and strategic direction — and you’ll bring a forward-leaning vision for how AI and automation can transform security operations.
Reporting To: jimi Mills, Ciso
Location:
The position is located at corporate headquarters at 12500 TI Boulevard in Dallas. TI operates in an in-office culture with expectation this individual will come into the office daily.
TI's campus is situated in North Dallas, within the city’s established technology and business corridor, just east of Lake Highlands and south of Richardson, accessible via U.S. Highway 75 (Central Expressway) and Interstate 635.
Responsibilities:
Own the end-to-end execution and continuous improvement of key cyber defense operation capabilities.
Drive operational excellence through KPIs, metrics, post-mortems, and maturity roadmaps of incident response, data loss prevention, and vulnerability management.
Lead incident response for high-severity cyber and data loss events, ensuring containment, eradication, and recovery with clear executive communication.
Cross-functional leadership – partner with Security Engineering, GRC, Legal, IT teams, and business teams to ensure seamless coordination during security events, remediation, and proactive hardening.
Own and evolve operational runbooks, escalation protocols, and team training.
Drive innovative detection engineering to stay current with emerging adversary techniques, tactics and procedures as well as insider threats.
Coach, mentor, and develop a a high-potential team — build individual development plans, run structured skill-building through threat hunting, penetration testing, and purple team exercises, and create a culture of ownership and continuous learning.
Drive operational efficiency through AI-powered automation, intelligent orchestration, and prevention controls — drive the practical application of automation and AI-assisted workflows to improve analyst efficiency, alert triage, and detection capabilities
Proactive identification of opportunities to expand security monitoring and threat intelligence.
The Candidate
Skills:
Demonstrates commitment to high standards of ethics and values, regulatory compliance, and business integrity.
Knowledge:
Bachelor's degree in Computer Science, Cybersecurity, Computer Engineering or related technical field.
Cybersecurity certifications (e.g., CISSP, CISM, GCIH, GCFA, GCIA, OSCP, GCTI, or comparable)
Deep technical understanding of detection and response technologies, SIEM platforms, EDR, and security orchestration tools.
Preferred Qualifications & Technical Expertise:
Exposure to global operations and working across time zones or cultural boundaries.
Experience managing security incidents involving sophisticated threat actors, including nation-state campaigns
Background in managing security operations for organizations with significant intellectual property or trade secrets
Experience supporting of securing operational technology (OT), industrial control systems (ICS), or manufacturing environment experience is a plus
Experience managing vendor relationships.
Technical proficiency in domains related to cyber operations such as SIEM, SOAR, EDR, SEG, WAF, vuln mgmt. technologies, threat intelligence, etc.
Familiarity with DevSecOps principles and practices
Familiarity with Risk Based Alerting
Hands-on experience applying AI/ML to security operations — e.g., LLM-assisted triage, anomaly detection models, or AI-driven SOAR playbooks.
Experience:
10+ years of progressive cybersecurity experience, including 5+ years in a leadership role directly managing security operations or incident response teams.
Demonstrated experience building or maturing a SOC or security operations function, preferably in manufacturing, high-tech, or similar critical infrastructure sectors.
Proven incident response leader with experience directing high-severity cyber events involving ransomware, data exfiltration, advanced persistent threats, or large-scale operational disruption
Excellent communication skills — able to distill technical complexity into executive-level updates.
Ability to communicate clearly with leadership during high-pressure operational and incident response situations
Demonstrated coaching and people-development orientation — track record of growing junior and mid-level talent into independent, high-performing contributors.