Chief Information Security Officer (CISO) Information Technology (IT) - Carol Stream, IL at Geebo

Chief Information Security Officer (CISO)

Role:
Chief Information Security Officer (CISO) Reports To:
Chief Information Officer Location:
Carol Stream, IL, Carlstadt, NJ or Birmingham, AL Fulltime Job Description :
The Chief Information Security Officer (CISO) is responsible for developing and implementing an effective cyber security strategy that addresses the organization's specific risks and vulnerabilities. The CISO works in partnership with company officers, business leaders, cyber security teams, and IT managers to effectively monitor and maintain the security of EverView s applications, databases, computers, and websites. The CISO is responsible for safeguarding EverView's information assets. They do this by ensuring that a company's IT infrastructure is secure, investigating security incidents and working with other members of the organization to ensure that the IT department and all employees are following best practices. Core Role Responsibilities :
Threat Intelligence:
They should have a strong understanding of the latest cyber threats and trends and use this knowledge to develop effective security strategies and defenses. Will be responsible for establishing and maintaining an effective information security Proprietary and Confidential 5/9/23 2 governance framework, including policies, procedures, and standards. This includes ensuring that all employees and third-party partners are aware of their security responsibilities, and that security practices are aligned with the organization's business goals. Risk Assessment:
The CISO should regularly assess the organization's cyber security risks and vulnerabilities and develop risk management plans to address these issues. They are also responsible for identifying, assessing, and mitigating security risks across the organization. This includes conducting regular risk assessments, developing risk management plans, and implementing controls to minimize the impact of security incidents. Security Operations:
The CISO should oversee the organization's cyber security operations, including monitoring and detecting threats, responding to incidents, and investigating breaches. They are responsible for overseeing the day-to-day security operations of the organization. This includes managing security incidents, investigating security breaches, and conducting forensic analysis to determine the cause and extent of security incidents. Incident Response:
The CISO should develop and maintain an effective incident response plan that outlines the steps to be taken in the event of a cyber-attack or data breach. Cyber Security Awareness and Training:
The CISO should provide regular cyber security awareness training to all employees, contractors, and third-party partners, to ensure that everyone understands the risks and is able to take appropriate actions to protect the organization's digital assets. Regulatory Compliance:
The CISO should ensure that the organization is in compliance with all relevant cyber security regulations and standards, such as HIPAA, PCI-DSS, and GDPR. Technology and Infrastructure:
The CISO should work closely with IT teams to ensure that the organization's technology and infrastructure are designed and implemented with cyber security in mind. Risk Management:
The CISO is responsible for identifying, assessing, and mitigating security risks across the organization. This includes conducting regular risk assessments, developing risk management plans, and implementing controls to minimize the impact of security incidents. Information Security Architecture:
The CISO is responsible for developing and maintaining the organization's information security architecture, including network infrastructure, systems, and applications. This includes ensuring that security controls are integrated Proprietary and Confidential 5/9/23 3 into the design of all systems and applications, and that security risks are considered at all stages of the development process. Security Awareness and Training:
The CISO is responsible for ensuring that all employees and third-party partners are aware of security risks and best practices. This includes providing security awareness training and conducting regular security awareness campaigns to reinforce good security habits. Experience in managing P&L and interactions with the Executive team and stakeholders / clients. Qualifications :
Education:
A bachelor's degree in computer science, information technology, or a related field is usually required. A master's degree or other advanced degree in a related field is often preferred. Cyber Security Certifications:
A CISO should have relevant certifications in cyber security, such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or GIAC (Global Information Assurance Certification).
Experience:
Should have extensive experience in cyber security and information technology, with a minimum of 10-15 years in senior-level roles. Experience in risk management, incident response, and regulatory compliance is also highly valued. Leadership Skills:
A CISO should have strong leadership and management skills, with experience managing teams and developing effective security strategies. Communication Skills:
A CISO should have excellent communication skills, with the ability to clearly explain complex technical issues to nontechnical stakeholders and collaborate with business leaders across the organization. Industry Knowledge:
A CISO should have a deep understanding of the specific cyber security risks and challenges facing the organization's industry, as well as the latest trends and best practices in cyber security. Analytical Skills:
A CISO should have strong analytical skills, with the ability to analyze complex data and information to identify potential security risks and develop effective risk management strategies. Overall, the ideal CISO candidate should have a combination of education, certifications, experience, and skills that allow them to lead and manage an effective cyber security program, and to protect the organization's digital assets from a wide range of cyber threats. Recommended Skills Analytical Architecture Certified Information Security Manager Certified Information Systems Security Professional Communication Computer Security Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.