Shire Veteran Jobs

Job Information

AF Group Manager, IT Security Operations - 12087_43073982560_5-4459 in Chicago, Illinois

This job was posted by https://illinoisjoblink.illinois.gov : For more information, please see: https://illinoisjoblink.illinois.gov/jobs/12325173 SUMMARY:

This Manager, IT Security Operations is responsible for leading the team that identifies, investigates, and responds to security incidents affecting the organization\'s information assets. This role requires a deep understanding of cybersecurity threats, incident response protocols, and the ability to manage and mentor a team of security professionals. This role also assists senior leadership with their information security responsibilities. Overall, this role ensures that confidentiality, integrity, and availability requirements of information systems and assets are identified and managed appropriately.

ESSENTIAL DUTIES AND RESPONSIBILITIES include the following. Other duties may be assigned.

  • Drives and maintains the information security risk management function, the development of information security programs and the identification and mitigation of information security risks.
  • Develops and aligns the mission and values of the information security risk management function with the mission and values of the business.
  • Develop and maintain incident response policies, procedures, and documentation.
  • Leads programs and processes to design a threat assessment framework, monitors the emergence of new threats and vulnerabilities, assess impacts and drive responses as appropriate. Ensures ongoing analysis of information security threats, vulnerabilities, and trends.
  • Supports the evaluation of risk mitigation language in third party agreements and vendor support contracts.
  • Leads incident detection and coordination with internal and external stakeholders to ensure comprehensive incident response.
  • Ensures clear and timely business advice is provided to executive management on key information security and assurance issues. Additionally, develops metrics reporting to communicate effectiveness.
  • Analyze security incidents to identify attack vectors, techniques, and potential impacts
  • Establishes an information security and risk management functional capability and framework.
  • Ensures that information security and risk is adequately represented on business and governance forums across the enterprise.
  • Maintains relationships with threat intelligence communities, local, state and federal law enforcement and other related government agencies.
  • Monitors compliance with information security policies, standards, and processes and enforces remediation of non-compliance.
  • Manage the implementation and maintenance of security monitoring and incident response tools.
  • Work with business unit managers and form alliances on projects, operational decisions, scheduling requirements/ conflicts and vendor contract clarification.
  • Plan, implement, direct, and monitor IT technology solutions to ensure successful fulfillment of end-user requirements, proper and accurate testing and sound implementation. Deliver solutions consistent within current context of overall architecture.
  • Maintain and control budget, schedule and resources.

EDUCATION AND EXPERIENCE

  • Relevant combination of education and experience may be considered in lieu of degree.
  • Bachelor\'s degree in computer science, business administration or a technology-related field.
  • Seven (7) years of experience leading information risk, security and governance teams, transforming functions and changing culture.
  • Demonstrated experience as a leader in information security program management.
  • Professional security management certification such as CISA, CISM, CISSP is preferred.
  • Experience with leading the response to incidents, crises, and investigations with sensit vity, tenacity, and a focus on detail.
  • Extensive experience in information security architecture, information security standards, consultative stakeholder management, and strategic planning.
  • Experience with classified networks, information classification, and confidentiality requirements associated with high security environments.

QUALIFICATIONS

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

OTHER SKILS AND ABILITIES

Deep understanding of information security architecture discipline, processes, concepts, and best practices.

Deep understanding of control, risk management and audit issues; demonstrated consultative approach to driving change and deploying controls.

Knowledge of common information security management frameworks such as NIST, COBIT, ISO/IEC 27001, ITIL, and HITRUSTT.

Knowledge and understanding of relevant legal and regulatory requirements such as HIPAA, FISMA, NIST 800-53, etc.

Knowledge of firewalls, anti-virus, intrusion detection/intrusion prevention systems, virtual private networks, remote access systems, network zoning, centr

DirectEmployers