Information Security Officer Job Description Template
Our company is looking for a Information Security Officer to join our team.
Responsibilities:
- Upgrades system by implementing and maintaining security controls;
- Modify computer security files to incorporate new software, correct errors, or change individual access status;
- Manage the dissemination of policies, standards and procedures to the Mom’s Meals community;
- Monitor current reports of computer viruses to determine when to update virus protection systems;
- Produce quarterly and year-to-date reports identifying threats and risks;
- Ensure that Mom’s Meals policies support compliance with external regulatory requirements;
- Develop remediation plans and facilitate implementation to reduce future risk of security breaches, data loss and operational disruption;
- Coordinate implementation of information security solutions and controls with both internal and external resources;
- Confers with users to discuss issues such as computer data access needs, security violations, and programming changes;
- Report any security breaches to all internal and external regulatory agencies and respond to third party inquiries.
Requirements:
- Solid understanding with TCP/IP, Windows and Linux servers, along with an ability to implement and configure security applications and hardware;
- Ability to influence others through indirect management and partnership tactics;
- Proven abilities in incident management and response;
- Strong technology background on access control, IDS/IPS, vulnerabilities, WAF, DLP, email and protections;
- Demonstration of project management AND execution – strategic management;
- Serve as senior information security leader in the organization;
- Ability to lead and manage technical security-related projects;
- Certifications such as CISSP, CISA, CISM, CRISC and/or GIAC nice-to-have;
- Bachelor’s degree in Computer Science, Engineering Information Systems or related field, or equivalent experience ;
- 2-5 years of experience in application development or application security;
- Proven ability to lead and apply information security, risk management and privacy practices;
- Must display subject matter experience in application security, vulnerability testing, system testing, and/or Agile lifecycle management;
- Demonstrated ability to manage in a way that results in highly-engaged teams;
- Experience giving presentations and superb communication skills;
- Strong LOB knowledge/experience for the type of business they are aligned to (e.g.CSBB/GBM.