Information Security Manager - Open to Remote Locations

Location: 
Remote
Division/Department: 
ACA / Corporate Support Center

ACA COMPLIANCE GROUP

JOB DESCRIPTION

Information Security Manager

 

Position Objective:

The information security manager (ISM) is a critical member of the information risk team. This role is to act as an interface between ACA's strategic and process-based activities and the work of the technology-focused analysts, engineers and administrators in the IT organization. The ISM must be able to translate the IT-risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The ISM coordinates the IT organization's technical activities to implement and manage security infrastructure, and to provide regular status and service-level reports to management.

The ISM is a senior role that requires an individual with a strong technical background, as well as an ability to work with the IT organization and business management to align priorities and plans with key business objectives. The ISM will also be responsible for working with business and IT stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance.

Expertise in leading project teams and developing and managing projects is essential for success in this role. In addition to supporting ACA's policies and strategies, the ISM must be able to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing across multiple IT and security teams, task prioritizing and project reporting.

The ISM will be responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the ISM's position. IT personnel responsible for managing technical security infrastructure may report directly to the ISM or may report to other areas of IT operations (for example, networking, servers or database management), with their security-related activities coordinated by the ISM.

Summary of Responsibilities:

Information Security Program Development/Enrichment

  • Work with the CIO to develop a security program and security projects that address identified risks and business security requirements. Create a strategic plan for the deployment of information security technologies and program enhancements.
  • Guide development of (and ensure compliance with) corporate security policies, standards and procedures.Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.
  • Collaborate with key stakeholders to establish an information risk management program.
  • Anticipate new security threats and stay-up to date with evolving infrastructures.
  • Manage the process of gathering, analyzing and assessing the current and future threat landscape, as well as providing the CIO with a realistic overview of risks and threats in the enterprise environment.
  • Work with the CIO to develop budget projections based on short- and long-term goals and objectives.
  • Manage a staff of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members.

Security Liaison

  • Assist resource owners and IT staff in understanding and responding to security risks identified by internal and external assessors.
  • Provide security communication, awareness and training for audiences, which may range from senior leaders to field staff.
  • Work as a liaison with vendors and the legal and purchasing to establish mutually acceptable contracts and service-level agreements.
  • Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.
  • Serve as an active and consistent participant in the information security governance process.
  • Work with the CIO and IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program.
  • Provide support and guidance for legal and regulatory compliance efforts, including audit support.

Architecture/Engineering Support

  • Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.
  • Recommend and coordinate the implementation of technical controls to support and enforce defined security policies.
  • Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
  • Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirements.

Operational Support

  • Coordinate, measure and report on the technical aspects of security management.
  • Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.
  • Manage and coordinate operational components of incident management, including detection, response and reporting.
  • Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations.
  • Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
  • Manage security projects and provide expert guidance on security matters for other IT projects.
  • Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.
  • Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
  • Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks.
  • Perform ad-hoc work/special projects as necessary to support ACA on various client and internal initiatives

This summary of responsibilities provides a general list of certain key job responsibilities but is not intended to provide a detailed description of all work requirements that may be inherent in the job or to capture all responsibilities for this position. Not all functions listed may be performed and other duties may be assigned to meet business needs, in ACA’s sole discretion.

Summary of Minimum Qualifications and Knowledge Requirements:

  • Bachelor’s Degree required – major in Cybersecurity, Information Security Management, Computer Science or Management of Information Systems preferred.
  • A minimum of seven years of IT experience, with five years in an information security role and at least two years in a supervisory capacity.
  • CISM or CISSP strongly preferred
Application: 

To apply send resumes to dperretti@acacompliancegroup.com.