Information Security Officer

Information Security Officer Job Description Template

Our company is looking for a Information Security Officer to join our team.


  • Upgrades system by implementing and maintaining security controls;
  • Modify computer security files to incorporate new software, correct errors, or change individual access status;
  • Manage the dissemination of policies, standards and procedures to the Mom’s Meals community;
  • Monitor current reports of computer viruses to determine when to update virus protection systems;
  • Produce quarterly and year-to-date reports identifying threats and risks;
  • Ensure that Mom’s Meals policies support compliance with external regulatory requirements;
  • Develop remediation plans and facilitate implementation to reduce future risk of security breaches, data loss and operational disruption;
  • Coordinate implementation of information security solutions and controls with both internal and external resources;
  • Confers with users to discuss issues such as computer data access needs, security violations, and programming changes;
  • Report any security breaches to all internal and external regulatory agencies and respond to third party inquiries.


  • Solid understanding with TCP/IP, Windows and Linux servers, along with an ability to implement and configure security applications and hardware;
  • Ability to influence others through indirect management and partnership tactics;
  • Proven abilities in incident management and response;
  • Strong technology background on access control, IDS/IPS, vulnerabilities, WAF, DLP, email and protections;
  • Demonstration of project management AND execution – strategic management;
  • Serve as senior information security leader in the organization;
  • Ability to lead and manage technical security-related projects;
  • Certifications such as CISSP, CISA, CISM, CRISC and/or GIAC nice-to-have;
  • Bachelor’s degree in Computer Science, Engineering Information Systems or related field, or equivalent experience ;
  • 2-5 years of experience in application development or application security;
  • Proven ability to lead and apply information security, risk management and privacy practices;
  • Must display subject matter experience in application security, vulnerability testing, system testing, and/or Agile lifecycle management;
  • Demonstrated ability to manage in a way that results in highly-engaged teams;
  • Experience giving presentations and superb communication skills;
  • Strong LOB knowledge/experience for the type of business they are aligned to (e.g.CSBB/GBM.