Chief Information Security Officer
Baltimore, MD, USA | Optomi
IT / Information Technology
Job Description:127 people have viewed this job
In this role, you will provide leadership and oversight in the strategic planning and assessment of all company information security strategies, policies, procedures and guiding practices.
What the right candidate will enjoy:
Opportunity to lead a best in class team towards world class Information Security Solutions
Direct access to industry experts and executive leadership with a proven track record of success in the space
Phenomenal office location in the heart of Arlington
Incredible benefits package
Apply today if your background includes:
BS in Computer Science, Information Systems, or related Field.Masters preferred
12+ years’ experience in Information Security with strong technical knowledge of security principles, best practices, technologies and processes.
Extensive knowledge of Information Security technologies such as authentication, authorization, cryptography, encryption, auditing, evidence preservation, risk management and applicable tools such as virus protection, perimeter controls, firewalls, intrusion detection and data leak prevention.
Knowledge of Information Security Frameworks such as ISO 27001 and 27002, Information Technology governance frameworks such as ITIL. and application development and System Development Life Cycle (SDLC) methodologies.
Ability in extracting/translating findings into alternatives/solutions, identifying risks/impacts and schedule adjustments to facilitate management decision-making.
Ability to develop an actionable, repeatable, and reportable security strategy.
Ability in advising Senior Management on risks and associated information security practices, to assure proper strategies are implemented to ensure compliance and to mitigate any potential consequences to security incidents.
Facilitating an information security governance structure through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board
Ensuring that all Information Security Programs have proper governance and controls in place
Leading the information security function across the company to ensure consistent and high-quality information security management in support of the business goals
Determining the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas
Advising internal stakeholders, business units and external members on key issues related to how information security funds should be invested to ensure consistent security measures associated with business unit risks
Developing an information security vision and strategy that is aligned to organizational priorities and enables and facilitates the organization's business objectives, and ensures senior stakeholder buy-in and mandate
Assess and define the organization’s current and future requirements in terms of information security
Liaise with enterprise architecture team to build alignment between the security and enterprise (reference) architectures, thus ensuring that information security requirements are implicit in these architectures and security is built in by design
Create a risk-based process for the assessment and mitigation of any information security risk in your ecosystem consisting of supply chain partners, vendors, consumers and any other third parties
Defines and facilitates the processes for information security risk and for legal and regulatory assessments, including the reporting and oversight of treatment efforts to address negative findings
Ensure that security is embedded in the project delivery process by providing the appropriate information security policies, practices and guidelines
Manage and contain information security incidents and events to protect corporate IT assets, intellectual property, regulated data and company reputation
Develop and oversees effective DR policies and standards to align with the enterprise business continuity management (BCM) program goals
Already a member? Sign In