Security Information Manager Resume Samples

4.5 (91 votes) for Security Information Manager Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security information manager job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GS
G Schaefer
Gwendolyn
Schaefer
121 Wunsch Motorway
Phoenix
AZ
+1 (555) 504 6016
121 Wunsch Motorway
Phoenix
AZ
Phone
p +1 (555) 504 6016
Experience Experience
San Francisco, CA
Information Security Policy Manager
San Francisco, CA
Wiza-Crooks
San Francisco, CA
Information Security Policy Manager
  • Assist innovation team in evaluating and testing new emerging technologies
  • Coordinate with IS Policy Working Group (ISPWG) on IS policy updates
  • Draft and publish official policy memos, position statements, guidelines, and other supporting documents
  • Coordinate with Architecture, Engineering, and Citi Technology Infrastructure teams to assess technology impact on IS standards/processes
  • All employees, all approved 3rd parties
  • Collaborate with Awareness and Training (A&T) team and contribute to the development and review of IS communications, bulletins, and policy related training courses
  • Ensure continuous adaptation of IS Best Practices and industry frameworks at Citi IS; Benchmark against industry IS Policies and standards
Phoenix, AZ
Manager Information Systems Security
Phoenix, AZ
Rau-Hegmann
Phoenix, AZ
Manager Information Systems Security
  • Leads a team to embed defined security strategy and roadmap initiatives in support of Global and Business strategies, and within Transamerica risk tolerances, including developing processes and procedures to meet organizational goals as it relates to assigned organization and business units. Collaborates with other strategic partners internal and external to the enterprise
  • Leads effort to continually develop staff, including the hiring, retention, performance manement, time and task administration, assiting in the facilitation of compensation decision, budget administration and reporting.
  • Coordinates research covering latest security threats and vulnerabilities. Identifies weaknesses and exposures. Recommends and presents protection and mitigation strategies for review, input and feedback. Champions key stakeholder approval
  • Lead activities found within third party assessments, such as working with third party to obtain due-diligence artifacts, reviewing and analyzing due-diligence artifacts, defining and overseeing certain tasks, reviewing and challenging results, recommending, discussing and challenging outcomes with key stakeholders
  • BCM activities as defined within the Business Continuity Program, such as BCM tests and exercises; ensure the completion of Business Impact Analysis and supporting plans; Explains and champions implications of technology or organizational changes, and leads improvements plans; oversees BCP coordinators; provides subject mater expertise during a crisis as requested by Crisis Management Team
  • Manages awareness and training activities, such as development and implementation of learning and awareness content, awareness week. Presents to target audiences relevant and clear information to educate and increase awareness
  • Leads activities found within event and incident response processes, such as identifies and analyzes issues, recommends and oversees actions to completion, reviews, analyzes and determines exposures and risks from artifacts and evidence, oversees coordination of tasks to completion
present
New York, NY
Information Technology Security Manager
New York, NY
Hilpert Inc
present
New York, NY
Information Technology Security Manager
present
  • Work with technology leadership to develop, plan, implement and provide oversight of an enterprise security program and roadmap
  • Analyzing and preparing reports for management on team goal achievement, workflow, productivity and performance
  • Analyzes and prepares reports for management on team goal achievement, workflow, productivity and performance
  • Directs day-to-day workflow and site management of team of associates
  • Raise awareness and adherence to secure development practices on development teams
  • Using a risk management approach, negotiating risk levels and response
  • Execute strategies to align department with business objectives and division goals
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
DePaul University
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to multi task and work independent
  • Strong coaching abilities with experience taking responsibility for coaching to drive performance
  • Knowledge one or more identity management systems, including SailPoint or Oracle Identity Manager
  • Ability to negotiate through difficult situation
  • Strong coaching abilities - proven experience and responsibility for coaching to drive performance of team and peers
  • Knowledge of key Infrastructure and Asset Management systems and their interdependency
  • Strong coaching abilities - takes responsibility for coaching to drive performance
  • Outstanding ability to synthesize content and communicate high level messaging
  • Ability to negotiate through difficult situation with customer recovery as end result
  • Excellent verbal, written and interpersonal skills
Create a Resume in Minutes

15 Security Information Manager resume templates

1

Information Security Policy Manager Resume Examples & Samples

  • Coordinate with IS Policy Working Group (ISPWG) on IS policy updates
  • Draft and publish official policy memos, position statements, guidelines, and other supporting documents
  • Perform gap Analysis and ensure that the IS Standards are aligned to International regulations and privacy laws
  • Collaborate with Awareness and Training (A&T) team and contribute to the development and review of IS communications, bulletins, and policy related training courses
  • Serve in an IS policy advisory role and participate in Citi level initiatives such as updates to Citi IT documents (IT Policy Framework, Citi IT Management Policy/Standards, etc.)
  • Coordinate with Architecture, Engineering, and Citi Technology Infrastructure teams to assess technology impact on IS standards/processes
  • Ensure continuous adaptation of IS Best Practices and industry frameworks at Citi IS; Benchmark against industry IS Policies and standards
  • Assist innovation team in evaluating and testing new emerging technologies
  • Assist IS Program and Business teams with their queries related to IS Policies and Standards
  • 6+ years with IT/IS policy-related experience within the banking/financial service industry
  • Requires use of conceptual and innovative thinking (i.e., identifying solutions)
  • Superior written (copy-editing), communication skills and strong attention to detail
  • Excellent interpersonal skills and ability to create collaborative relationships with colleagues
2

Information Security Assessment Manager Resume Examples & Samples

  • * In addition to strong management experience, the ideal SAT SME candidate must have an expert understanding of at least one of the following technologies and their related security concerns
  • Web Applications & Technologies: advanced understanding of application programming languages, application servers, web services, browser technology, common vulnerabilities, security best practices, and automated assessment tools and manual testing techniques specific to web applications. Expert knowledge of JavaScript, AJAX, PHP, Perl, Web Services and ability to perform code review in Java, C++ and/or .Net
  • Operating Systems: expert understanding of at least one of the following operating systems and relevant security concerns – Microsoft, Solaris, and UNIX certifications required
  • UNIX and Linux, especially Ubuntu, Red Hat, and knowledge of UNIX variants
  • Solaris (V8 and up)
  • Trusted Operating Systems - Solaris V8, Solaris V10 w/trusted extensions, and SE Linux
  • Apple Macintosh operating systems
  • Microsoft Windows 2003/2008, etc
  • Networking Technologies: expert proficiency with various networking skills and technology, including but not limited to Cisco hardwre and IOS, firewalls, IDS and IPSs, packet analysis, and high level network architecture fundamentals
  • Enterprise Solutions, Storage & Databases: advanced understanding of relational database, database management systems, enterprise storage solutions, and security concerns specific to these technologies
  • Cross Domain Solutions/Multi-Level Systems: experience with a range of Cross Domain Systems (CDS) solutions and advanced understanding about the unique security requirements of CDS and multi-level systems
  • Virtualization Technologies: experience with VMware products, Microsoft virtualization technologies and/or other technologies
  • Mainframe: hardware, operating systems, networking, and security best practices
  • ***************************************************************************************************************************************************************************
  • All SAT candidates shall be comfortable using, configuring, troubleshooting, and administering both UNIX and Microsoft operating systems with extensive system engineering experience with at least one of these operating systems
  • Have a broad knowledge of security best practices, security solutions, and methodologies for conducting advanced security assessments, to include manual assessments and malicious user testing
  • Have a solid understanding of the Intelligence Community, DOJ, FBI security policies, and NIST security guidelines and special publications - especially 800-53 rev 3 and 800-53a
  • Have a broad and expert knowledge of security assessment tools (commercial, free/shareware) and manual security testing techniques. Advanced understanding of security tool strengths and weaknesses and ability to select, configure, troubleshoot and use the best “tool for the job”
  • Have a broad knowledge of cyber security threats and techniques used by adversaries to compromise systems – both technical and non-technical techniques
  • Have the ability to think creatively, to think critically, to analyze complex concepts, to articulate themselves clearly and concisely, and to conduct themselves in a professional manner
  • SAT members responsible for leading the assessment of web applications shall possess the GWAPT or equivalent certification and those leading penetration testing engagements shall possess the GPEN or equivalent
  • SAT members must possess extensive experience with methodologies for both Vulnerability Assessments and Penetration Test activities, and have solid experience conducting both in environment of varying size and business function
3

Information Security Service Implementation Manager Resume Examples & Samples

  • Initiate programmatic strategy and approach to implement security services across the enterprise, include developing policies and guidelines
  • Directly execute and/or select and lead cross-functional teams to execute Information Security service implementation programs
  • Develop service catalog and service execution concepts based on security industry best practices and process improvement best practices
  • Define scope, schedule and resource requirements for service implementation plans, and obtain necessary management support and funding
  • Define, select and oversee implementation of technologies and tools in support of the program, and manage the vendor relationships
  • Develop and implement or analyze and improve internal Information Security business processes that efficiently and effectively support the service catalog, including service metrics
  • Identify, plan and deliver all necessary process documentation, content management vehicles and protect identified process artifacts to ensure audit and compliance standards are met for the financial services industry
  • Develop and ensure successful change control for service implementations, including communications and training and ensure quality of website information for company personnel
  • Project manage service implementations, including all budgeting, forecasting, resource planning and accounting to financial industry and Visa standards
  • Coach, mentor and collaborate across Information Security staff and the company to ensure program success
  • 15+ years successfully implementing process and technology projects and programs over $10MM
  • PMP required
  • At least 2 years implementing Security-related service programs or projects
  • Significant experience in enterprise-wide methodology and business process improvement implementations and/or background in sustaining support for those methods and processes
  • Significant experience in technical vendor selection and relationships
  • Significant experience in enterprise-wide change management, communications, content development, and training
  • Understanding of audit and compliance for the financial services industry, and the ability to effectively plan to meet those requirements in processes and documentation
  • Outstanding written and presentation skills, including successful regular executive-level communications
  • Demonstrated ability to develop, plan and execute strategic initiatives
  • Strong leadership and collaboration skills, and the ability to work well with and communicate with people at all levels and backgrounds
  • MBA from top tier business school strongly preferred
4

Information Security Section Manager Barrie Resume Examples & Samples

  • Provide people management, coaching and mentoring for direct reporting staff on a daily bases
  • Oversees the implementation of all Human Resource programs and initiatives, consistent with the general directions and strategies provided at the enterprise and division levels, including
  • O PPA (Personal Performance Appraisal) and MyHR Processes
  • O Rewards and Recognition
  • Performs security knowledge transfer to assist making security part of normal IT and
  • Must possess a significant in depth understanding of security classification, security assessment process, project management processes, documentation, audit, signoff and authority processes
  • Demonstrates solid staffing skills
  • Exhibits fiscal and budgetary management skills
  • Demonstrated strong time management skills
  • Identity and Access Management experience an asset
5

Information Security Section Manager Scarborough Resume Examples & Samples

  • O Annual Employee Survey process
  • Displays advanced knowledge of T&O organization and processes
  • Possesses advanced communication skills, both written and oral
  • Access Provisioning experience in AD, RACF an asset
6

Information Technology Security Manager Resume Examples & Samples

  • Reviews and recommends information security solutions to customer problems based on an understanding of products/ systems test results
  • Conducts systems security analysis and implementation, system engineering, design assurance, testing, software engineering, configuration management, integration, and testing of information security products and techniques. Solutions are based on a firm understanding of industry policy, practices, procedures, and customer requirements
  • Candidate must possess a relevant industry standard certification such as: CISA, GSE, SCNA, CISSP, SANS GIAC, GCIH, CISM or CISSP-ISSMP
  • Must possess good interpersonal, organizational, communication, and writing skills as well as strong analytical and problem solving skills
  • This position requires a minimum of 5 years progressively responsible experience in security, information security, security engineering, network engineering with emphasis in cyber security issues and operations, computer incident response, system architecture and/or data management
  • Bachelor’s Degree in electrical or computer engineering, computer science or other closely related or IT Security discipline is required
  • Understanding of network technologies and the ability to develop security documentation
  • I ncident Response understanding
  • Familiarity with the full range of cyber technologies, policies, and industry best practices for operating and securing large global IT infrastructures
  • Experience working with common best practices, innovations, trends and challenges in the industry
  • Ability to deal with and resolve ambiguity
  • Ability to adjust personal style to different situations
7

Information Security COB & Controls Manager Resume Examples & Samples

  • Manage internal, external, regulatory and other audits end-to-end, providing proper perspective on risks and issues
  • Independently assess the effectiveness of controls, determine the impact of control issues, identify corrective action, and track issues to closure
  • Planning, leading, and executing strategic/tactical initiatives on controls and risk management
  • Developing and delivering reports and metrics for management
  • Provide consultation on controls and risk management
  • Working with partners in-region across the all technology sectors, and globally within Citi Technology Infrastructure
  • Graduate (business or IT related discipline) with two to five year experience in any one area or combined areas of control, risk management, compliance, audit and IT/business project management
  • Experience gained in Citi is definitely an advantage [Note: A non-graduate with at least seven years extensive experience with Citi and relevant job exposure to Control function, with strong interest in facilitating and ensuring the ASPAC Citi Technology Infrastructure (CTI) in compliance with Citi policies & standards and regulatory requirements will also be considered]
  • Exposure/familiarization of various regulations governing IT from various Asia Pacific regulators such as the Monetary Authority of Singapore (MAS), the Hong Kong Monetary Authority (HKMA) is definitely beneficial
  • Good technical skill for any platforms
  • Good verbal/written communication and analytic skills
  • Able to work with people from different levels independently with minimal supervision
  • Certified in at least one of the following: CISA, CISM, CRISC, CISSP will be advantage
8

Information Security Audit Manager Resume Examples & Samples

  • Lead IT regulatory compliance activities
  • Contribute security best practices to new and ongoing IT initiatives
  • Help conduct incident triage and investigation
  • Must be at work on a regular or predictable basis or as scheduled
9

IT Corporate Information Security Identity & Access Manager Resume Examples & Samples

  • Develop, implement, administer and report on identity management strategies, architectures, governance and project plans
  • Implement, administer and support complex Active Directory, messaging, collaboration solutions and systems. Determine optimum authentication services and solutions
  • Maintain and administer Active Directory, including daily monitoring, troubleshooting and performance analysis
  • Recommend, develop and implement system enhancements to improve system performance and reliability; facilitate business process design as it relates to managing identities and access privileges
  • During critical system outages, provide diagnostic and escalation leadership, as appropriate
  • Define and lead deployment of identity and access management solutions
  • Facilitate use of technology-based tools or methodologies to review, design, and/or implement products and services
  • Participate in technology solution implementations, upgrades, enhancements and conversions; stay current on emerging tools, techniques and technologies
  • Evaluate complex business and technology risks, internal controls that mitigate risks and related opportunities for internal control improvement
  • Assist in the selection and tailoring of approaches, methods and tools to support services
  • Bachelor’s degree in Computer Science, Technology, Business or related field, or equivalent education and related training
  • Ten years of experience in developing, implementing and/or architecting information and security systems
  • Three years of experience in managing deployments of at least one identity and access management product
  • Solution architecture experience integrating identity and access management software into infrastructure and applications
  • Experience managing projects through the full system development lifecycle
  • Experience and technical knowledge across multiple platforms, processes and/or architectures
  • Advanced knowledge of principles, philosophies and best practices for Identity and Access Management
  • Familiarity with major operating systems such as Microsoft Windows, Unix and mainframe security packages
  • Experience leading business requirements gathering and translating those into system requirements
  • Understanding of business processes, internal control risk management, IT controls and related standards
  • Effective written and verbal communication and presentation skills
  • Experience in driving organizational transformation initiatives to improve performance and time-to-market, leverage technology and reduce costs
  • Ability to interact effectively with Executive Management
  • Industry Certifications (e.g. Certified Information Security Systems Professional (CISSP), Information Security Systems Architecture Professional (ISSAP) and/or Certified Information Security Manager (CISM))
10

IT Corporate Information Security Technology Manager Resume Examples & Samples

  • Lead the implementation in partnership with other IT leaders, CIS managers, supervisors and associates in the planning, design, building, maintaining and implementation of security technologies and projects
  • Partner closely with architecture and strategy to prepare engineering for building solutions. Ensure security infrastructure remains current within an acceptable range of risk and expense
  • Reference one or more widely recognized technology standards, such as Control Objectives for Information and Related Technology (CobiT), National Institute of Standards and Technology (NIST), IT Infrastructure Library (ITIL), ISO 17799, BITS (Bank Information Technology Secretariat), and/or other industry publications for discrete controls
  • Drive engineering performance, availability, scalability and recoverability through collaboration with other IT organizations
  • Provide timely and accurate reporting to the CISO and other senior-level officers. Work with Information Security Governance to analyze and report on operating metrics, performance tracking, error resolution and effectiveness measures related to security engineering infrastructure
  • Attract, coach/develop, retain, and motivate a world-class security leadership team. Make personnel recommendations/decisions regarding employment, career development, performance evaluations, salary changes, promotions, transfers, and terminations within policy and guidelines
  • Fifteen years of progressively responsible managerial and leadership experience in technology; seven years of technology experience in a senior management capacity with a comparable organization
  • Broad understanding of technology concepts and architectures
  • Ability to lead teams through design, planning, and execution of projects, resolving issues and addressing resource constraints
  • Ability to think strategically while executing on multiple projects within deadlines
  • Demonstrated proficiency in basic computer applications, such as Microsoft office software products
11

Information Security Data Analytics Development Manager Resume Examples & Samples

  • Privacy/Protection: Provide the necessary subject matter expertise and ensure the implementation of the information security architecture, risk management standards, best practices and systems/processes to ensure information privacy/protection
  • Risk Management: Interact with management to determine acceptable levels of risks as the business model and risk profile changes and align the security program accordingly
  • Plan and develop functional unit budget in accordance with established guidelines; administer compliance to meet budgetary goals and negotiates changes as required
  • 25%/75% business/technology acumen
12

Information Security COB & Controls Manager Resume Examples & Samples

  • Management of the IT Risk Control program including the development and measurement of key risk indicators
  • Advises and provides direction to senior business and IT leaders on risk management decisions
  • Resolves the highest impact, highest profile problems/projects with significant business impact through in-depth evaluation of complex business processes, system processes and industry standards
  • Oversight of the operational risk and Sarbanes-Oxley compliance programs
  • Master’s degree is preferred or equivalent work experience
  • 8-10 years of people management experience with a proven track record of effective delegation, motivation and employee/customer satisfaction
  • 3-5 years of experience working with internal/external audit/regulatory groups is preferred
  • Proficiency with various audit/compliance software programs is a plus
  • Proficiency with Microsoft Office suite
  • Demonstrated relationship building, influencing and negotiation skills
  • Strong judgment and decision making skills
  • Excellent skills in preparing and presenting strategies, recommendations and value propositions to senior leadership teams
  • Broad knowledge of the interactions of an IT organization
  • Strategic and critical thinking skills
13

Latam Information Security Technology Group Manager Resume Examples & Samples

  • 7+ years of Information Security Risk Management or related business with appropriate certifications (CISSP, CISM, etc.)
  • Strong technical aptitude
  • Background in application security assurance, application vulnerability assessments, and software security
  • Strong risk management and internal control skills
  • Substantial understanding of Information Security Principles
  • Significant knowledge of regulatory requirements
  • Ability to build and maintain positive working relationships with all levels and across functions
  • Exceptional project management and analytical skills with the ability to manage multiple priorities within targeted timeframes
14

IT Corporate Information Security Analytics Manager Resume Examples & Samples

  • Perform cyber threat analysis, alerting and reporting based on intelligence gathered from internal and external sources; identify, escalate and fill intelligence gaps; perform risk and opportunity assessments
  • Apply expertise to conduct intrusion analysis to ascertain the impact of an attack and develop threat trends to design mitigation techniques and countermeasures to prevent future attacks
  • Conduct research using multiple data sources, perform analysis and disseminate findings; develop and maintain threat collection plans and ongoing critical reporting
  • Develop and deliver metrics and presentations targeting reporting for various levels of associates and managers, including Executive Management
  • Analyze network events to determine impact on current operations and conduct all-source research to determine adversary capability and intent; analyze, model and forecast performance trends to improve KPIs
  • Serve as subject matter expert for statistical tools and techniques; develop and drive high-level and tactical initiatives
  • Maintain current knowledge of issues, methods and development in CIS-related statistical, program evaluation and predictive modeling techniques
  • Attract, coach/develop, retain and motivate a world-class security leadership team. Make personnel recommendations/decisions regarding employment, career development, performance evaluations, salary changes, promotions, transfers and terminations within policy and guidelines
  • Bachelor’s degree in Information Security or related field, or equivalent education and related traing
  • Ten years of experience in CIS-related management or equivalent combination of training and/or related experience in a corporate environment, other large financial services or information security organization
  • Five years working in a threat intelligence job function; one year leading a cyber-threat analysis-related function
  • Maturity, sound judgment, negotiation skills, ability to influence and bar-raising analytical acumen
  • Ability to review information to determine significance, validate accuracy and assess reliability
  • Ability to apply a variety of structured analytic techniques to generate and test a hypothesis, create scenarios, assess cause and effect, challenge analysis and support decision-making
  • Experience managing projects; ability to prioritize based on strategic direction; ability to meet deadlines and follow through on the completion of complex, high-profile projects
  • Demonstrated experience sharing insights and recommendations to audiences with varying levels of CIS and analytical understanding
  • Exceptional communication, organization and presentation skills; ability to effectively communicate with all levels of senior management
  • Ability to work well in an individual and team environment
  • Demonstrated proficiency in basic computer applications, such as Microsoft Office software programs; adept in Microsoft Excel macros and report building tools
  • Information security and control certifications (e.g. CISSP, CISM, CEH, PCI QSA, CISA, CRISC)
  • Government security clearance
15

Information & Access Management Security Manager Resume Examples & Samples

  • Monitoring of security procedures and practices: Review on a timely basis the various reports and logs available. Investigate, report on and make recommendations for noted irregularities
  • Security policies for the bank: Be aware of and review the security features of new information security practices, systems and business services to ensure that they meet the security requirements of the existing policies. Review and propose changes to existing policy as external emerging issues and conditions warrant
  • Make recommendations for assigned personnel regarding employment, career development, performance evaluations, salary changes, promotions, transfers and terminations within established policies and guidelines
  • Maintain awareness of changes in industry: Attend classes and seminars as required to maintain a high level of proficiency in the fields of information security and business resumption. Network with other information security professionals. Read about and be aware of the trends regarding BRP and Security in the industry
  • Bachelor's degree in computer science, business, or related discipline, or equivalent education and related training
  • Six years experience in IS/IT, three years of which in the information security field in a leadership/supervisory position
  • Demonstrated SME level knowledge in one of the following areas: Firewall Administration, Intrusion Detection, Communications, Incident Response, RACF, Encryption, Access Control, Threat Management, or any other security-related field
  • A minimum of two years managing individual contributors and leading and conducting access remediation efforts is required. Experience in information security access management at a financial institution is a plus
  • Knowledge of financial institution business applications and related access requirements including segregation of duties is necessary
  • Knowledge of various types of access implementation including web application, distributed fat client, mainframe RACF, Active Directory, and server / database administrator access is required
  • *Strong organizational, meeting facilitation and both technical and business communication are required. A self-driven organized approach to leadership across a large organization is necessary to succeed in this position. Demonstrated ability to negotiate delivery in a multi-organizational, multi-priorities environment is necessary. Experience with on, and off, network access management processes and rules is a plus.****
16

Information Systems & Security Manager Resume Examples & Samples

  • Identify computer and systems technology to meet the company’s needs and goals. Work with company Managers and President in developing overall information systems and technology strategy for the company
  • Procure, install and maintain all computer technology, including hardware, software and other products and supplies necessary to keep computer systems operable
  • Work with TAG to ensure that the network security and all data proprietary to the company is protected and resilient. Provide for the complete backup of all essential computer systems in case of system failure or disaster
  • Provide top quality, consistently available computer and technology services. Support training and maintenance of all computer and technology systems used throughout the company
  • Fulfill requests for technology support. Act as liaison between hardware and software suppliers and company management for informational updates and problem resolution
  • Create, maintain and enforce written policies and procedures regarding computer operations in the IS Department and throughout Financial Pacific. Ensure compliance with Umpqua TAG policies and standards
  • Regularly evaluate equipment, software and technology processes. Recommend changes, as appropriate, and supervise their installation
  • Prepare IS department annual budgets and administer funds according to budget approval
  • Manage technology license agreements, third party risk and third party oversight
  • Train and develop staff to insure knowledge of and compliance with company policies and procedures. Complete Annual Performance Reviews and Skill/Performance worksheets. Recommend resolutions to performance issues. Make salary recommendations when appropriate, per company guidelines. Perform all other functions of personnel management of department employees
  • Work with TAG to maintain and expand expertise in best practices for security management, emerging security technologies, information technology directions, security regulations. Lead change and adoption of new processes and technologies
  • Develop and maintain security metrics and the communication of those metrics to Management
  • Manage vendor relationships to ensure business partner/customer satisfaction with all information system security services and compliance with all third party risk management requirements. Build and maintain effective working relationships with business partners
  • Ensure delivery of high quality service, consultation, and product to business partners through understanding of business needs and through the development of seamless transition of work processes across departments in the IT division. Develop and manage relationships throughout the organization to reinforce a culture of service and collaboration
  • Continually re-asses the status quo and consider alternative solutions. Keep abreast of best practices and apply as relevant to the organization. Lead change and adoption of new IS and security processes and technologies
  • Manage multiple projects and partner with peers and senior management teams to shift priorities as needed. Identify risks to projects and deliverables across departments. Ensure resolution of issues within area of responsibility
  • Perform accurate root-cause analysis for resolving problems that may have multiple system dependencies. Ensure logging and reporting of incidents and outages according to best practices
  • BA/BS Degree in Computer Science or equivalent and at least 10+ year's work experience
  • 5+ years proven track record of technical expertise in IS and IT Security
  • Demonstrated experience in all key functional areas in IT
  • 5+ years experience managing people or leading project teams, including proven experience providing effective coaching, feedback and development plans to team members
  • Formal certification in Information Security Management preferred (e.g.,CISSP, CISM)
  • Demonstrated ability to resolve sensitive issues with other departments and to present information to senior management
  • Demonstrated analytical and problem-solving skills applied to both technical and business challenges
  • The ability to relate business requirements and risks to technology implementation
  • Basic understanding of Microsoft server and client technologies with respect to authentication and communication with respect to the OSI model, including Windows Server Windows 7, Windows XP Professional
  • Knowledge of security monitoring, diagnostic and administrative tools
  • Knowledge and understanding of the secure integration of systems into the current network and server environment
17

Manager Information System Security Resume Examples & Samples

  • Manages development, documentation, and presentation of information system security education, awareness, and training activities for facility management, information system personnel, users and others, as appropriate
  • Oversees identification and documentation of unique local threats/vulnerabilities to information system
  • Manages coordination of the facility information system security program with other facility security programs
  • Oversees periodic self-inspections of the facility's information system program are conducted as part of the overall facility self-inspection program and that corrective action is taken for all identified findings and vulnerabilities
  • Manages development of facility procedures to govern marking, handling, controlling, removing, transporting, sanitizing, reusing, and destroying media and equipment containing classified information
  • Manages reports of information system security incidents. Follows up to ensure that proper protection or corrective measures have been taken when an incident/vulnerability has been discovered
  • Oversees implementation of vendor supplied authentication (password, account names) features or security relevant features
  • Oversees implementation of security features for the detection of malicious code, viruses, and intruders (hackers), as appropriate
  • Develops and implements specific and remote maintenance procedures based on requirements provided by the CSA
  • Oversees selection, hiring, training, and evaluation of employees to enhance their performance, development, and work product. Addresses performance issues and makes recommendations for personnel actions. Motivates and rewards employees including providing salary increases, bonuses and promotions within allocated budgets and company guidelines
  • Oversees preparation and recommendation of operating and personnel budgets for approval. Monitors spending for adherence to budget, recommends variances as necessary
  • Eleven or more years of experience in computer science, management information systems, systems analysis or data security
  • Strong communication skills to interact with team members and support personnel
18

Information Security Section Manager Resume Examples & Samples

  • Participates in fiscal and budgetary management, facilities and personnel acquisition to ensure the team operates within authorized limits and spending
  • Assists the Senior Manager in developing shorter term strategic direction as it pertains to the section, and provides input into longer term departmental strategies
  • Possesses a university degree/college diploma in Computer Science or equivalent work experience, and/or 8 to 10 years IT industry experience (development, infrastructure, security)
  • Demonstrates advanced knowledge of the T&O standard operating platforms, software install process, security threat/risk/data classification, security assessment process, Internet architecture and vulnerability analysis
  • Illustrates solid knowledge of emerging Information Security technologies and industry trends
  • Strong project management disciplines a must
19

Information Security Prof Group Manager Resume Examples & Samples

  • Coordinates and manages integration of PIM plans into project activities. Partner with the CATE and GIDA to implement the strategic plans
  • Track actual schedule against the project estimates. Report significant variances and develop corrective action plans, as required
  • Interact with O&T (CATE / CTI) and Sector Business representatives to support project activities as needed
  • Interaction can include senior management
  • Handle routine status and metrics reporting; prepare presentations for Senior Management
  • Minimum 5-10 years experience in project management and business analysis with experience using a structured methodology. Prior consulting experience is a plus
  • Experience in O&T risk management and/or Compliance is preferred
  • Experience with Privileged Identity Management tools, procedures and policies is a must
  • Experience with analyzing and documenting business requirements and interfacing with application developers
  • Must have experience in managing global projects in a matrix organizational structure
  • Leadership and adaptability when facing unique challenges encountered on projects
  • Proven ability to work independently and in a multi-tasking environment
  • Strong meeting organization and facilitation skills
  • Team player with good conflict resolution and influencing skills
  • Track record of managing work to achieve milestones on time and within budget in a fast-paced environment
  • Proficient in using Microsoft Office products (Word, Excel, PowerPoint, Project, Visio)
20

IT Corporate Information Security Technology Manager F Resume Examples & Samples

  • Work effectively with peers and others (up to and including members of Executive Management), both within IT Services, lines of business (LOBs), and subsidiary and affiliate organizations to accomplish assigned initiatives
  • Maintain a high-level of awareness of existing and emerging security technology and IT organizational strategies and trends
  • Assist in planning and developing departmental budgets
  • Bachelor’s degree in Engineering, Computer Science, Business, Management, or Management Information Systems or security-related field, or equivalent education and related training
21

Information / Account Security Manager Resume Examples & Samples

  • Operational Security Management
  • Be accountable for delivering end-2-end Security Services defined in the Contract and Security Policy
  • Act as a focal point to account management and delivery teams for all operational security related activities
  • Serve as a dedicated focal point for managing Security Incidents that occur in the customer's environment and provide appropriate advice to help resolve matters
  • Provide security consultancy, management and security focus to the account’s management team through the direction and provision of advice, guidance, strategic planning and project management
  • Websense for Webcontent Filtering
  • Email Security Gateway and Data Loss Protection
  • QRadar (SIEM) QRadar vulnerability manager
  • Network Intrusion Detection (NIDS)
  • File Integrity Monitoring PKI – Public Key Secure Sockets Layer (SSL) Service (Entrust) Hardware Security Modules (HSM)
22

Wintel Information Security & Migration Manager Resume Examples & Samples

  • Excellent understanding of end to end Citi processes, policies, regulations, and governance. Initiates process changes and improvements
  • Coordination of activities related to the migration of ISA functions to GIDA strategic sites in ASPAC, EMEA and NAM / LATAM, working with multiple business partners
  • Manages high visibility transition projects in connection with Global Identity Administration (GIDA) functions
  • Project Management of end-to-end transfers - including documentation, implementation in the areas of operations, training users, assisting in collecting and adjusting data to the requirements of automation
  • Establishes effective relationships with regional and global support teams to enforce and drive standards in order to be able to accept new requirements
  • Proactively manages changes in project scope, identify potential crises, and devise contingency plans
  • Tracks project milestones and deliverables
  • Manages the issues identified during the preparation of the process migration
  • Prepares comprehensive plan for groups of applications including technical, automation plans, volumes, budget etc
  • Coordinates legal review for possible transfer services, reporting to senior management
  • Works on process improvements including process redesign and tools enhancements
  • Leads meetings in fast paced environment communicating complex migration topics effectively at all levels of the organization
  • Assesses the applicability of previous or similar experiences and evaluate options under circumstances not covered by procedures
  • Performs tasks in accordance with the policies of Citigroup
  • Participates in audits
  • Bachelor's degree or higher desired or the candidate should have proven equivalent work experience
  • 5 years Project Management experience is required, preferable experience in transition projects or standardization projects
  • Knowledge of application security compliance processes and systems is a key requirement
  • Knowledge of access management processes in Citi including usage of systems like CSI, EERS, CISAR, Archer
  • Have good understanding of how GIDA team interacts with others in accomplishing Citi objectives
  • PMP or CISSP certification is preferable
  • Extensive experience in projects or other shared services/administration function, preferably on ID and access management
  • Enhanced knowledge of Microsoft Office products, i.e. Word, Excel, PowerPoint, Outlook and MS Project
  • Good understanding minimum one of the components: AD-Wintel/Database/Unix ID management processes.*
  • Excellent Presentation skills
  • Has to be able to pay attention to details and demonstrate logical thinking
  • Self-motivated, ability to work in virtual team
  • Has to take initiative and be creative and flexible
  • Ability to work with a variety of people from all areas of Citi
  • Excellent customer service orientation, interpersonal, negotiation skills and ability to set priorities and work under pressure
  • Proven ability to drive and execute innovative solutions and strategy into daily processing
  • Very good negotiation and troubleshooting skills
  • Skilled communicator who can influence solutions with business partners
  • Must have excellent written and verbal communication in English
  • Only for infrastructure positions
23

Information Security Identity Access Program Manager Resume Examples & Samples

  • Liaise with Technology /Business Information Security Officers, Technology compliance and application development community to assist in identifying and reducing IS risk within applications through driving the IAM program compliance
  • Gain through understanding of the program as well as different stakeholders and manage evolving scope of the program including scope, project planning, performance as well as communication to different stakeholders
  • Establish program/project requirements as well as define/manage key performance metrics (KPI/KRI)
  • Create/manage project plan and identify resource requirements while minimizing impact on internal clients (Development Unit)
  • Closely monitor program progress on regular basis and report any risks along with mitigation strategies to Sr program manager
  • Manage program scope change and its impact
  • Develop and provide program level reporting (Progress, Project Risk, IT Risk Reduction, etc.) to Sr. Management as well as to Development unit Managers (clients) as well as different partners
  • Lead and/or contribute to ad-hoc requests and projects as required by the management
  • Collaborate with program team as well as partners to create necessary awareness through training and communication to various stakeholders during program lifecycles
  • Identify opportunities for process improvements and provide recommendations to Sr. Program Manager
  • Professional project management certifications such as PMP required
  • IS certifications like CISSP are a plus or should have willingness to obtain certification within 12 months of start date
  • Minimum 5 years of experience managing projects/programs as project/program manager within Information Security, IT/IT Security Engineering/Operations
  • Good understanding of IT domain Identity & Access Management (Authentication, Access Control, Entitlement Management, Privileged User access management)
  • Good Understanding of IT infrastructure such as (e.g., UNIX, Linux, and WINTEL), Databases (e.g., Oracle, SYBASE, MS-SQL)
  • Experience with an enterprise scale financial or similar organization is required
  • A confident, dynamic individual capable of working with cross functional teams at different levels
  • Proactive approach to problem-solving and decision-making with minimum supervision
  • Good organizational skills to manage many tasks without losing sight of the highest priority items
  • Detailed oriented, results driven personality
  • Good analytical and problem solving skills with use of automation for efficient process execution
  • Proficient in MS Office products, particularly PowerPoint, Sharepoint, Access & Excel
24

Information Security Controls Manager Resume Examples & Samples

  • Demonstrated success in process optimization through the creation/ implementation of standard methodologies and continuous improvement approaches
  • Demonstrated ability to independently lead program work across diverse technical process areas
  • Exemplary written and oral communication skills which can be leveraged to consistently succeed
  • Experience in program management applying a structured approach to successful management, tracking, planning, monitoring and reporting of concurrent, multiple projects
  • Excellent influencing, facilitation, and partnering skills
  • Experience and ease in interfacing with Senior Management
  • Individual should be analytical, flexible, team-oriented, have good interpersonal, communication, and follow-up skills with strong attention to detail and ability to multi-task
  • Ability to manage multiple initiatives concurrently while prioritizing resources to drive results
  • Ability to build rapport with a broad range of personalities and different levels of seniority
  • Strong interest in continuous learning & development
25

Manager Information Systems Security Resume Examples & Samples

  • Leads a team to embed defined security strategy and roadmap initiatives in support of Global and Business strategies, and within Transamerica risk tolerances, including developing processes and procedures to meet organizational goals as it relates to assigned organization and business units. Collaborates with other strategic partners internal and external to the enterprise
  • Plan and allocate resources with management assistance. Understand department capacity. Resolve daily priority issues. Delivers objectives and commitments within defined timeframes, having high quality
  • Leads effort to continually develop staff, including the hiring, retention, performance manement, time and task administration, assiting in the facilitation of compensation decision, budget administration and reporting
  • Employee leadership duties including: Set goals and objectives for individuals and work groups, Motivating and mentoring individuals and work groups to meet objectives. Coaching behaviors to achieve desired results, Foster an environment for teamwork, Foster open and honest communication, Encourage individual and work group development
  • Oversees a team that researches, develops and implements complex and broad information security initiatives, including review of policy, program, process, procedural and technology improvements and solutions to ensure they are current and meet business needs
  • Coordinates research covering latest security threats and vulnerabilities. Identifies weaknesses and exposures. Recommends and presents protection and mitigation strategies for review, input and feedback. Champions key stakeholder approval
  • Supervises a team that administrates with the following
  • BCM activities as defined within the Business Continuity Program, such as BCM tests and exercises; ensure the completion of Business Impact Analysis and supporting plans; Explains and champions implications of technology or organizational changes, and leads improvements plans; oversees BCP coordinators; provides subject mater expertise during a crisis as requested by Crisis Management Team
  • Manages awareness and training activities, such as development and implementation of learning and awareness content, awareness week. Presents to target audiences relevant and clear information to educate and increase awareness
  • Lead activities found within third party assessments, such as working with third party to obtain due-diligence artifacts, reviewing and analyzing due-diligence artifacts, defining and overseeing certain tasks, reviewing and challenging results, recommending, discussing and challenging outcomes with key stakeholders
  • Possesses and applies broad knowledge of concepts and principles; exhibits technical expertise in a several areas; seen as a thought leader
  • Exhibits regular, reliable, punctual and predictable attendance
26

AOC Lead Information Systems Security Manager Resume Examples & Samples

  • Provides Information Assurance (IA) support services for all ACC/A5CX applications, tests, experiments, and exercises
  • Supports the creation and maintenance of Department of Defense Information Assurance Certification and Accreditation Process (DIACAP)/Risk Management Framework (RMF) and related documentation for both unclassified and classified information systems and networks to include NIPRNet, SIPRNet, and JWICS
  • Advises and assists in providing research, guidance, technical support and expertise on policy/procedures for the ACC/A5CX information systems and networks
  • This support shall include: research, review and recommend computer security levels of core service information systems prior to implementation or test, and/or experimentation and development for ACC/A5CX; develop/manage/maintain certification and accreditation packages of AOC systems; review accreditation packages of information systems and networks used in ACC/A5CX events; review DIACAP/RMF documentation for compliance with Federal, DoD, and Air Force information systems security directives and requirements critical accreditation, risk, and threat/vulnerability reviews; provide certification and accreditation assistance involving interoperability with other branches of service in support of ACC/A5CX events on both unclassified and classified networks
  • Serves as the focal point for IA concerns to include Computer, Communications, and Emissions security
  • Facilitates identification, evaluation, and mitigation strategies surrounding physical, technical, and administrative risks to the AOC and Air Force Global Information Grid
  • Maintains situational awareness and initiates actions to improve or restore IA posture as well as conducting annual security reviews of all IA controls and the testing of selected IA controls
27

Classified Information Systems Security Manager Resume Examples & Samples

  • Bachelor's degree in related field plus 10 years of experience information systems security experience
  • 5 years of experience in DoD SAP environments
  • CISM or GSLC
  • Final Top Secret clearance with a current SSBI
  • Master's degree in related field
  • Experience working in the NISP and SCI environments in addition to the DoD SAPs
28

Information Systems Security Manager / Issm Resume Examples & Samples

  • Make sound decisions and manage all aspects of information systems security as it applies to the SCI (ICD 503/DCID 6-3, RMF/JSIG), SAP (JAFAN & RMF/JSIG), and DoD community (NISPOM, RMF, NIST 800-37, NIST 800-53, CNSS Instruction 1253, and CNSSD 504), and DISA STIG’s
  • Assist the Information System Security Officer (ISSO) on preparing the Information System Security Plans, Protection Profiles, etc., working closely with local DSS, ODAA, and other government approval authorities to achieve system accreditation and maintain compliance for all collateral classified information systems
  • Conducts regular AIS audits to ensure accredited systems are being operated securely and computer security policies and procedures are implemented as defined in security plans
  • Provide technical and user support for numerous standalone and network systems to include routine backs-ups, virus updates, patches, service packs, and hot fixes, set-up of user accounts, password resets, adding/removing hardware and ensuring all secure related documentation is notated as required
  • Implements site procedures for marking, handling, and controlling, removing, transporting, sanitizing, reusing, and destroying media/equipment containing classified information
  • In-depth experience with Government procedures and policies, including Operations Security requirements and preparation of deliverable documentation.; maintaining security files, secure phones, COMSEC and cryptographic equipment; checking and initialing secure containers on a daily basis; maintaining overall building security; ensuring proper handling of classified materials
  • Applicant must meet DoD 8570 Baseline Certification for IAM Level II, if not be able to obtain within 6 months of being hired
  • High School diploma and 12 years of experience are required
  • Bachelor's Degree in Information Systems, Information Technology or other related degree
  • 4-6 years of related experience in INFOSEC administration
29

Information Technology Security Manager Resume Examples & Samples

  • Partner with product and technology teams to ensure product requirements and technical designs will lead to secure implementations
  • Lead and participate in security assessment as part of the project lifecycle
  • Act as the product owner for security across the technology teams by working with appropriate resources to prioritize security-related work on development and infrastructure teams
  • Work with technology leadership to develop, plan, implement and provide oversight of an enterprise security program and roadmap
  • Develop and maintain vulnerability management processes including identification, rating, remediation and monitoring
  • Raise awareness and adherence to secure development practices on development teams
  • Implement security projects, including evaluating and selecting vendors or open source solutions as appropriate
  • Work with the Sales Operations team to address customer security concerns and complete customer security questionnaires
  • Ongoing reviews of access controls by investigating improper access; revoking access; reporting violations; monitoring requests; recommending improvements
  • Ensure processes in place to drive continuous enhancement of security for SaaS solutions and internal systems
  • Formulate security policies, procedures, and standards (such as system hardening standards)
  • Collaborate with the HIPAA Compliance team to define and improve HIPAA security policies, compliance and audit
  • Keep abreast of industry security trends and developments, as well as applicable government regulations
  • Provide recommendations and oversight on security operations systems such as firewalls, IPS, IDS, end user protection, remote access, SIEM, etc
  • Lead internal reviews and testing processes to identify and remediate security risks
  • Lead projects to implement processes and tools to mitigate known and potential risks
  • Coordinate with Technology Leadership and Technology Teams to drive compliance with Wolters Kluwer Global Security Policy
  • Bachelor of Science degree in Computer Science, related field or equivalent experience
  • 10+ years’ experience in Information Technology roles with progression of technical responsibilities
  • Demonstrated ability to work successfully in a large matrix organization
  • At least 5 years’ experience in the architecture, design and implementation of secure solutions for infrastructure, applications, and compliance
  • Strong, hands on technical expertise in the areas of information security architecture, network access controls, Security Event Management, intrusion detection & remediation and perimeter security
  • Experience with Mobile Security
  • Experience defining, implementing, and complying with information security policies, procedures and standards
  • Experience in Healthcare Insurance Portability and Accounting Act (HIPAA), Payment Card Industry-Data Security Standards (PCI-DSS), Service Organization Controls (SOC)
  • Experience with risk frameworks such a NIST, OCTAVE
  • Experience with HITRUST is a plus
  • GIAC Certifications a plus (GCIH, GISP, GPEN, GCFE, etc.)
  • Security Governance Certifications a plus (CISSP, CISM, CISA, CGEIT, CRISC)
30

Information Systems Security Manager Issm Resume Examples & Samples

  • Be part of a team of IT Support and IT Security professionals who support a staff of engineers and scientists that carry out contract work for the U.S. government
  • Help ensure strict compliance with government, customer and company Automated Information System (AIS) security policies and procedures including the National Industrial Security Program Operating Manual (NISPOM), Joint Air Force-Army-Navy (JAFAN's) and Program Security Directives/Guides contractually imposed by customers and the Honeywell Corporate Security Plan (SPP)
  • Help carry out all phases of computer security program, enabling company to meet contractual requirements for AIS security
  • Help implement Information System Security Plans and Protection Profiles. - Work closely with local DSS Representatives and government Information System Security Professionals (ISSP) to maintain compliance in accordance with the NISPOM and JAFAN
  • Work closely with government IT professionals to maintain certification and accreditation
  • Help the team conduct regular audits to ensure that systems are being operated securely, and computer security policies and procedures are implemented as defined in security plans
  • Provide efficient technical and user support for numerous standalone and network systems
  • Help prepare materials for computer security education/awareness programs
  • Help conduct investigations of computer security violations and incidents, reporting as necessary to management
  • Respond to queries and requests for computer security information and reports
  • Keep informed and updated with regulatory policies and procedures
  • Active US Government clearance is required
  • Minimum of a High school diploma
  • Minimum of 5 years of systems administration experience (or relevant work experience)
  • Technical or Bachelor's degree desired
  • Experience in DOD, or other industrial security programs
  • System Administration experience with Windows/NT/2000/Server/XP, Sun Solaris, Linux, Group Policy Objects (GPOs)
  • MCP and/or MCSE certifications or equivalent, desired
  • Experience administering PGP environments on desktops and servers
  • Completion of the Defense Security Service Academy (DSSA) NISPOM Chapter 8 Requirements (IS 201.01)
  • Relocation is not available for this opportunity; must be located in the Minneapolis, MN, metro area
  • Completion of the Defense Security Service Academy (DSSA) Information Systems Security Courses, the NISP Network
  • Security Basics (IS 302.02)
  • Experience in working with DOD or other government security regulatory environments
  • Excellent written communication and organizational skills
  • Possess the interpersonal skills necessary to deal courteously and effectively with a diverse group of individuals and clients
  • Ability to work well under pressure, good problem solving skills
  • Self-starting, dynamic person whose quick learning and adaptability
  • Technical and team problem-solving skills
31

Manager Information Protection & Security Account Management Resume Examples & Samples

  • 3-7 years of management experience
  • Management experience required
  • Healthcare experience and/or information security and/or information technology experience required
  • Demonstrated ability to effectively lead teams with diverse interests and skills
  • Excellent communication skills; persuasive, encouraging, motivating, and inspiring; the ability to listen and understand; the ability to defuse tension among team members, should it arise
  • Ability to elicit cooperation from a wide variety of resources, including peers, management, other business units, and company leadership
  • Experience at working both independently and in a team-oriented, collaborative environment
  • Adaptable and flexible, with the ability to handle ambiguity and sometimes changing priorities
  • The ability to think and act: decisiveness, assertiveness, with the ability to achieve results quickly
  • A sense of responsibility and accountability – someone who takes ownership and initiative
  • Professional demeanor and positive attitude; customer service orientation
  • Creative thinker, always looking for a “better way” to deliver value; not stopped or discouraged by adversity
  • Mission Motivated – intent on making a positive difference in HCA’s primary mission – care of human life – through our work
  • Respect for diversity of experience, characteristics, viewpoints, and opinions
  • Ability to define, learn, understand, and apply new technologies, methods, and processes
  • Make tough decisions that are in the best interests of the business without procrastinating or succumbing to undue pressure
  • Results-oriented with an eye toward the end-goal and business results as the objective of our efforts
  • Knowledge of healthcare security regulations
32

Manager, CRP Information Security Oversight Resume Examples & Samples

  • Performs assessments of current security technology and authentication systems and evaluates against HIPAA, Federal and State Information Protection and Privacy regulations, CHI Information Security Policies, and other relevant regulations pertaining to the protection of Enterprise information assets with respect to information security. (25%)
  • Ensures the enterprise’s security and privacy strategy is optimally architected to enable the success of the Data Leakage Protection (DLP) Program by developing, managing and monitoring the program including oversight of the Information Security and Privacy Analysts supporting the DLP process who are direct reports to this position. (20%)
  • Manages independent information security reviews and risk assessments for major programs in coordination with ITS and other functional groups. (15%)
  • Works collaboratively in identifying and communicating industry best practices, regulatory, and security compliance requirements to ITS Security and IT Teams. Determines areas of non-compliance and prioritizes remediation of information security risks and compliance gaps. (10%)
  • Partners with ITS Security team for new technology and vendor evaluations to ensure that Corporate Responsibility provides continued oversight and compliance input and feedback. (10%)
  • Supports Vice President, CRP Privacy, Information Security and EHR Oversight to ensure that appropriate security policies and standards are in place by holding meetings with key stakeholders and managing security-related workgroups. (15%)
  • Manages collaborative security programs with personnel across IT Security functions to ensure that emerging security issues are addressed. (5%)
  • Minimum of ten or more (10+) years of progressive experience in information services including five (5) years in systems security, including maintenance and use of security products in a distributed enterprise environment, and experience in compliance with federal security regulations
  • Minimum of three (3) years experience in healthcare or security consulting
  • 3-4 years experience in independently managing security programs or projects required
  • Require in-depth understanding of Information Security practices for the network, servers, databases, applications, and advanced use of Information Security assessment techniques
  • Experience with vulnerability assessment tools is favorable
  • May substitute an equivalent combination of education and experience
  • Compassion: Feeling with others, being one with others in their sorrows and joys, rooted in the sense of solidarity as members of the human community
33

Information Security Policy Manager Resume Examples & Samples

  • Responsible for facilitating the development and maintenance of Information Security policies and standards based on knowledge of best practices and compliance requirements. Be the authority on the interpretation of published, mandated policies
  • Develop and maintain governance over Information Security policies, standards, and procedures within a structured, transparent framework
  • Collaborate with business, IT, Internal Audit, Legal, as well as external auditors to develop and maintain policies and standards documents which are consistent and concise
  • Develop effective change management processes which maintain quality while reducing overhead and expediting acceptance and publishing. Track new requirements for policy change and additions and implement changes and seek approval where required. Manage and track requested and approvals for policy exceptions
  • Collaborate with Communications and other responsible stakeholders to publish and distribute policy documents as appropriate
  • Oversee the annual review of policies and standards
  • Monitor and report on compliance with key policy requirements across the business. Monitor the effectiveness of the key rules and content of policies in influencing user behaviour and achieving the security goals agreed for the policies
  • Extensive and proven information security risk management experience, ideally in both traditional retail and ecommerce
  • Good knowledge of data protection and privacy regulations
  • Good understanding of data governance and the data lifecycle
  • Knowledge of ISO 27000 series of standards desirable
  • Experience in all of the following areas: IT Audit, Information Security, working within a control framework
  • Knowledge of NIST Cybersecurity Framework and CIS Critical Security Controls desirable
  • Knowledge of information management, security and risk strategies
  • Good knowledge of collaboration platforms including Office 365 SharePoint, Salesforce, on-premises and cloud-based
  • Knowledge of security controls used to protect information including Access Controls, DLP, Encryption, MDM
  • Good knowledge and understanding of software development lifecycle
  • Have excellent relationship management skills and able to influence business and IT stakeholders
  • Experience of working within a complex and dynamic business environment
  • Ability to work with a high degree of independence
  • Excellent policy documentation skills
34

Information Systems Security Manager / Issm Resume Examples & Samples

  • Bachelor’s degree and minimum of 6 years of industrial security experience
  • An active DoD TS clearance is required - US citizenship is required
  • An active TS/SCI+ clearance
35

Manager of Information Security Architecture Resume Examples & Samples

  • Leads group that acts as the central point of contact within Diebold when it comes to security architecture
  • Responsible for helping set the strategic direction of the security architecture program by then leading the team to implement the operational and tactical level needs in order to meet the strategic direction set
  • Responsible for envisioning and taking steps to implement the controls needed to protect both Diebold assets as well as information that have been entrusted to Diebold by third parties
  • Manages the responsible for the security architecture of systems and products at a global level
  • Leads the review of and provides consultation for product design, infrastructure, and network configurations as it pertains to security
  • Establishes and maintains strong working relationships with Diebold business units involved with
  • Security matters (Legal Department, Internal Audit Department, Financial Controls and Compliance, Human Resources,
  • Information Technology, Global Risk & Security, etc.)
  • Understands the fundamental business activities performed by Diebold, and based on this understanding, suggests
  • Appropriate security solutions that adequately protect these activities
  • Develops action plans, timelines, and reports to address and improve the security posture of Diebold’s environment
  • Bachelor's degree required, or equivalent work experience and certifications
  • Minimum 5 - 10 years of technical experience in the security aspects of multiple computer platforms, operating systems, software products, network protocols and system architecture. Emphasis is on system and security architecture
  • Solid understanding of design considerations for complex, high volume transaction systems with high availability, reliability, and manageability requirements
  • Experience working in a team environment and taking the leadership role when performing security related work
  • Knowledge of security and enterprise architecture frameworks like SABSA and TOGAF
  • Knowledge of application penetration assessment, threat models, security code reviews, and integration of security testing methodologies within corporate SDLC practices
  • Knowledge of database environments like MSSQL and Oracle
  • Understanding of application security flaws (i.e. OWASP Top 10) and preventative measures around application security
  • The ability to communicate with multiple business units and business owners and facilitate a strategy around security
36

Manager of Information Security Resume Examples & Samples

  • Oversee multiple technology and/ or business projects and play a key role as subject matter expert for successful design & implementation of identity solutions in a complex environment
  • Demonstrate knowledge of Program management frameworks and controls to provide IAM direction & input to multiple teams and projects
  • Bachelors Degree and 6 years relevant experience (minimum)
  • Masters degree and/or CISSP certification highly desired
  • Hands on Program Management experience in an IAM team
  • Background & understanding of Identity & Access Management (IAM) best practices, and how these relate to Regulatory requirements in Financial Services
37

Information Security Group Ops Support Manager Resume Examples & Samples

  • An advance degree in Math, Science, Computer Science/Data, Business Administration or equivalent work experience is a plus
  • A minimum of 5 years of experience across any combination of data operations, preferable in investment banking
  • Bilingual preferred
  • Ability to effectively communicate and present data and information
  • Ability to lead teams and meetings
  • Innovative thinking skills enabling simple solutions for complex business needs
  • Ability to build strong working relationships with internal and external partners and influence peers and higher level managers without authority
  • Ability to understand business priorities
  • Strong leadership, project and people management skills and demonstrated track record of delivering results in a highly pressurized environment
  • Ability to develop and deploy functional and business strategic plans, objectives and performance metrics and create organizational alignment
  • Understanding of the regulatory landscape within the region and country is essential. Actively monitor regulatory developments and trends in the market and assist in developing appropriate data requirements for the bank regulatory compliance program
  • Strong Microsoft skills: Word, Excel, PowerPoint
  • Strong focus on Control and Process optimisation and documentation
  • Proven project and process management skills
  • Proven people management
  • Proactive and able to work on own initiative
  • Flexibility
  • Good communication skills with the ability to be assertive
  • Organised with an excellent attention to detail
  • Comfortable working with large quantities of data
  • Comfortable working independently in a dynamic and challenging environment
38

Manager of Information Security Controls Engineering Resume Examples & Samples

  • Collaborates with IT stakeholders in operating and maintaining secure technology frameworks and partnerships
  • Provides management of teams that deploy and operate security management software and hardware devices including, but not limited to: antivirus defense, intrusion prevention, encryption systems, perimeter screening, authentication and access control systems, network scanning, vulnerability assessment, application security, etc
  • Establishes change and incident management procedures to address service operational excellence. Serves as the point of escalation for control failures. Ensures that any changes to Information Security services follows the current change management work practice
  • Identifies, prioritizes and evaluates opportunities to increase the efficiency and effectiveness of information security engineering functions
  • Collaborates on effective disaster recovery policies and standards to align with enterprise business continuity management program goals
  • Contributes to a culture where the fair treatment of customers is at the heart of the Experian business. Takes personal responsibility to ensure that all regulatory requirements are adhered to and applies appropriate controls in the interests of our customers
  • Provides operational guidance to the VP of Information Security and develops detailed work plans for the completion of tasks
  • Acts as manager for projects that are key to functional and strategic success
  • Conducts project status reviews with leadership team in support of identified goals. Provides reporting and metrics on performance of services
  • Provides leadership and management to a team of Technical Professionals
  • Acts as a principal aide to the VP of Information Security to coordinate effective Information Security engineering activities
39

Security Information Manager Resume Examples & Samples

  • Cross-team and cross-organizational collaboration to ensure information needs are being identified and met; communicating implementations in a clear, consistent manner
  • Researching, writing, and editing content with the goal of creating a single pane of glass for physical security information
  • Gathering data from multiple sources and S to create whitepapers, workbooks, guides, reference manuals, FAQs, events materials
  • Quality assurance and regular update cadences for a 75+ document repository
  • Coordination across teams to become central point of contact for primary source documentation
  • Build a metrics program that gives insight to the business needs and efficacy: Are materials being read? Are we targeting the correct level of user?
  • Write and deliver high-quality documentation for technical audiences and non-technical audiences
  • 3+ years of experience in Program Management or related field
  • Excellent writing skills, and the ability to translate technical content into effective learning solutions
  • The ability to adapt well to fast-paced environments with changing circumstances, direction, and strategy
  • The ability to conduct training needs assessments on a variety of data center related processes, procedures, tools and critical infrastructure
  • Demonstrated experience of authoring learning tools, learning management systems
  • Excellent communication skills for the purpose of knowledge transfer and skill development
  • Excellent coordination, project management, and organization skills
  • Experience working with structured and unstructured content
  • Experience with developing an evaluation method to gauge effectiveness of documentation delivery
40

Information Security Culture & Awareness Manager Resume Examples & Samples

  • Plan, manage and maintain complex, enterprise-wide, risk-based information security awareness campaigns and projects in support of the culture transformation initiative
  • Develop and manage surveys to measure the impact/effectiveness of awareness and culture projects; collect, analyze and interpret data in order to make recommendations
  • Support and assist with the existing information security Ambassador program, bringing new ideas and approaches for its continued success
  • Design, develop and deliver information security presentations and communication materials
  • Manage and support role-based and/or mandatory eLearning courses as needed
  • Extensive work experience in Information Security or Technology developing awareness programs and deliverables
  • Experience working with computer-based training development tools and learning management systems
  • Proven ability to confidently speak and present publicly
  • Excellent project management and organizational skills with the ability to meet tight and competitive deadlines
  • Superb verbal and written communication skills
  • Excellent interpersonal skills – ability to work with diverse personality types
  • Ability to partner effectively with peers, management and staff, and internal & external business partners and vendors
  • Ability to collaborate, influence and/or lead efforts as required
  • Enthusiastic – must be high-energy, motivated and driven to help your team excel
  • Effective facilitation and conflict resolution skills – must be able to facilitate discussion of multiple approaches and drive resolution
  • Understand that your role in the organization is broader than the details included in this particular job description
  • PMP or CISM certification
  • Experience in communications, human behavior or related field
  • Knowledge about information risks and the different elements that make up risk
41

Manager Information Systems Security Resume Examples & Samples

  • Development of Vulnerability Management and Testing programs
  • Development of workflows with external teams: Governance, Risk, Compliance, Application Development, Engineering, Security Awareness
  • Manage the teams scheduling
  • Ensure effective incident detection
  • Identify chronic operational and security issues and ensure that they are managed appropriately
  • Manage and/or escalate roadblocks that may jeopardize security operations or increase risk to the company
  • Serve as senior mentor to Vulnerability Management staff
  • Interface and collaborate with outside teams and organizations
  • Ensure analysts follow existing procedures and all procedures are documented in accordance with local guidelines
  • Manage process improvement program
  • 10 years of Information Technology related experience
  • 4+ years of Information Security related experience
  • Previous Management / Leadership experience (2 yr. min)
  • Previous experience with Penetration Testing, Dynamic and Static Code Analysis, and program development
  • Information Security Certification such as: CISSP, CISM, CISA, CEH, GCIH, GCIA, GCFA, GREM
42

Information Security Audit Manager Resume Examples & Samples

  • Oversees internal IT security audits including location audits, operating effectiveness audits, & Network & Application pen testing audits
  • Manages and acts as escalation point for external audits including ISAE 3402, SOC2 and HiTrust audits
  • Liaises with internal security practice, internal audit, external auditors, and outside consultants as necessary for independent security audits and audit validation
  • Establishes, refines and reports on metrics to gauge effectiveness of the security policy framework and publishes metrics reports
  • Serves as a subject matter expert on global security policies and standards with the audit targets
  • Directs the day-to-day IT security audit activities as required
  • Manages audit team personnel
  • Responsible for implementing Audit strategy and acting upon direction of senior leadership
  • Ability to think and operate strategically as well as tactically
  • Manages the IT security audit team that scopes internal IT security audits, liaises with internal and external auditors, and executes technical audits such as vulnerability assessments and configuration audits
  • Directs the progress of project work assigned to team members, and report status to management
  • Evaluates, counsels, mentors and provides feedback on performance of IT security audit team members
  • Plans the training and development of team members to develop their skills and maintains state-of-the-art knowledge in information security and audit techniques
  • Detailed understanding of ISAE 3402 / SOC2, and ISO 27001 audits
  • A working understanding of ISO 27002 security policy, and execution of a security compliance program in accordance with ISO 27001
  • Ability to manage team members remotely
  • 8 – 10 years of overall relevant experience
  • Three or more years of experience in scoping, managing and conducting IT security audits
  • Three or more years of experience managing personnel and teams
  • Five or more years of experience in the Information Security field
  • Experience managing a global team, and working in a global environment
  • Experience executing an audit program in accordance with common industry audit frameworks
  • Experience working with common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
  • Experience with enterprise governance, risk and compliance tools and processes is recommended
  • Working experience with desktop data aggregation and analytics tools (e.g., Microsoft Excel, Access, Spotfire)
  • Experience managing the communication to clients and vendors in relation to our security policies
  • Good management, interpersonal, communication, organizational, and decision-making skills
43

Information Systems & Security Manager Resume Examples & Samples

  • Directs and schedules all personnel and/or subcontractors in conjunction with project management as required for effective work completion of all tasks and functions
  • Provides leadership, training, motivation, performance evaluation, coaching, recognition and accountability for assigned employees and functions
  • Serve as the primary point of contact for all information technology systems and security functions between the company and customer as well as the site and corporate support. Maintain positive communication with all stakeholders
  • Obtain any and all new certifications and training required by the company or customer in relation to the assigned job duties in a timely manner
  • Manage the development, implementation and evaluation of the information and security systems and programs
  • Manage all services related to assigned job duties, i.e. alarm, communications, etc
  • Perform analysis and risk assessment of network security, based upon the Joint Special Access Program Implementation Guide (JSIG), Director of Central Intelligence Directive (DCID 6/3), Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP), and The DoD (Depart of Defense) Information Assurance Certification and Accreditation Process (DIACAP); advise customer on IT certification and accreditation status. Facilitate correction actions and advise customer program managers of methodology and process changes
  • Monitor and recommend changes to policies and technology as required
  • Develop and maintain a formal Information Systems Security Program including policies and processes for responding to incidents, investigating violations, correcting deficiencies and reporting on all
  • Ensure all security controls related to the protection level of the systems have been implemented and are compliant
  • Ensure that all Information Assurance Officers (IAOs), network administrators, and other AIS personnel receive the necessary technical and security training to execute their duties including data ownership and responsibility establishment for accountability, access and special handling
  • Develop, review, endorse, and recommend action by the designated approval authority (DAA) of system certification documentation
  • Ensure approved procedures are in place for clearing, purging, declassifying, and releasing security system memory, media, and output
  • Coordinate and conduct certification tests, audits, inspections and reviews that include verification that the features and assurances required for each protection level are functional. Facilitate corrections and recommendations
  • Evaluating trends and making recommendations to project management for all related areas of responsibility
  • Maintain a repository for all system certification/accreditation documentation and modifications
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training
  • Ensure that security testing and evaluations are completed and documented
  • Remain current on all regulation and process changes for the customer and company
  • Review and approve all security and IT related test plans. Manage plan accordingly
  • Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented
  • Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
  • Ensure all AIS security-related documentation is current and accessible to properly authorized individuals
  • Ensure that system security requirements are addressed during all phases of the system life cycle
  • Coordinate all technical security issues outside of area of expertise or responsibility with SSE
  • Provide expert research and analysis in support of expanding programs and area of responsibility
  • Perform file transfers between local systems to storage devices
44

Information Technology Security Manager Resume Examples & Samples

  • Implementing and maintaining processes which promote operational efficiencies and quality services. Interpreting internal policies and procedures, organizational structures and productivity standards, and overseeing compliance to these standards. Prioritizing and monitoring requests for systems changes and enhancements
  • Balancing the demands with sometimes conflicting requirements and perception of operations. Training and developing subordinates in relevant technical facilitation, industry and company related policies and procedures
  • Ensuring timely and comprehensive communication with key stakeholders, peers and management; providing superior customer service. Using innovative thinking when tackling principles, theories and concepts relating to wide a scope of problems. Continually demanding excellence, pledging a commitment and maintaining a team dedicated to the highest qualities and achievements
  • Manages the day-to-day activities of the operations around access administration governance
  • Work collaboratively across the enterprise to derive, approve and implement IAM best practices
  • Using a risk management approach, negotiate risk levels and response
  • Creates/coaches to a customer focused environment that motivates and empowers team to deliver high quality customer service to increase customer satisfaction and enhance customer relationships
  • Execute strategies to align department with business objectives and division goals
  • Partner with other business lines to maximize internal efficiencies
  • Oversees compliance with SLA’s, company policies and regulatory requirements
  • Creates/coaches to a customer focused environment
  • Researches and assists in resolving complex customer issues
  • Uses insights into customer needs to recommend solutions to business problems
  • Analyzes and prepares reports for management on team goal achievement, workflow, productivity and performance
  • Responsible for the professional development of a team of senior level specialists
  • Directs day-to-day workflow and site management of team of associates
  • Responsible for personnel related matters, personnel review and appraisals, salary recommendations, promotions, terminations, etc
  • Recruit operations staff for site, including variable and temporary staffing. Recommend changes to job descriptions, grade levels and associated responsibilities
  • 8 or more years of Identify Access Management or IT Security experience
  • Management and leadership experience in a technical environment, including managing a team of 10 or more associates
  • Knowledge one or more identity management systems, including SailPoint or Oracle Identity Manager
  • Familiarity with security industry standards (ISO, NIST series, etc.)
  • Demonstrated leadership skills that foster collaboration, respect and harmony amongst team
  • Strong coaching abilities - takes responsibility for coaching to drive performance
  • Excellent time management skills; goal driven while also meeting day to day business needs
  • Advanced problem solving skills
  • Ability to negotiate through difficult situation with customer recovery as end result
45

Manager of Information Security Resume Examples & Samples

  • Manage a team of security and compliance members
  • Responsible for Security Service Management for the Company
  • Log Monitoring, Alerting and Triage
  • Malware, SPAM, Virus Defense
  • Security Incident Response
  • Policies and Procedure Review and Oversight
  • Security System Implementation and Management
  • Rotational On-Call Team
  • Specific technical knowledge in McAfee's Enterprise Security Suite, EPO, Windows Operating Systems, Linux, Internet technologies, Networking technologies and Encryption technologies
  • Demonstrated SIEM experience, understanding and assessing information security vulnerabilities and threats and to confidently make recommendations for remediation
  • Familiar with ISO 2700 and NIST security standards
  • Extensive experience in researching IT security issues and products
  • Proven analytical and problem solving skills
  • Provide IT security direction and/or mentoring
  • Ability to stay abreast of global and regional regulations and identify company impact
  • Specific knowledge related to HIPAA, PCI DSS, SOX, ITAR and Privacy Shield compliance
  • Some Knowledge preferable in Checkpoint or Cisco solutions
  • Minimum 5 years IT Security Experience
  • Senior IT role experience where mentoring or management of direct reports is required
46

Information Technology Security Manager Resume Examples & Samples

  • Demonstrable relevant experience
  • Security Risk Assessment and Management
  • JSP440 – Defence Manual of Security
  • Knowledge of the Data Protection Act 1998
  • Ideally you will be at CESG Certified Practitioner Level (including CESG Standards 1-7 and Good Practice Guides)
  • Network Infrastructure and hosting experience would be desirable
  • JSP604 – Network Joining Rules
  • Security Policy Framework, CESG Standards 1-7 and CESG Good Practice Guides are also high desirable
47

Manager of Information Security Resume Examples & Samples

  • Directly manages the Information Security Team. Works closely with Leadership and teams to prioritize work to accomplish goals and maintain operations
  • Performs investigations as necessary, to ensure compliance with privacy/security policies. Conducts annual risk assessments, develops appropriate action plans to minimize risk potential and coordinates periodic reporting on remediation activities until formal closure
  • Establishes and maintains enterprise risk management and incident response processes
  • Develops quality measures to assess the overall success of the team and the information security program
  • Oversee and guide the implementation of new and existing information security solutions such as SEIM, IDS/IPS, DLP, MDM, etc
  • Coordinates with other teams to perform regular network assessments to ensure adherence to policies and procedures and ensure confidentiality, availability and integrity of information systems
  • Develops company policies and procedures consistent with applicable laws, rules and regulations for information security. Reviews and proposes changes to existing policy as condition warrants
  • Monitors changes in state and federal legislation and accreditation standards that affect information privacy and security
  • Helps to develops and communicate company-wide security awareness program
  • Ensures that end-to-end processes are implemented to maintain compliance with Federal and State laws
48

Information Technology Security Manager Resume Examples & Samples

  • Implementing and maintaining processes which promote operational efficiency and quality services. Interpreting internal policies and procedures, organizational structures and productivity standards, and overseeing compliance to these standards. Prioritizing and monitoring requests for systems changes and enhancements
  • Managing the day-to-day activities of the Generic ID Remediation effort and site management of team of associates
  • Oversight of vendor and vendor relationship management to ensure value driven task completion with strategic partner teams
  • Woringk collaboratively across the enterprise to derive, approve and implement IAM best practices
  • Providing industry expertise and influencing peers across the enterprise to adopt best practices in support of IAM strategic goals
  • Using a risk management approach, negotiating risk levels and response
  • Creating / coaching to a customer focused environment that motivates and empowers team to deliver high quality customer service to increase customer satisfaction and enhance customer relationships
  • Executing strategies to align department with business objectives and division goals
  • Partnering with other business lines to maximize internal efficiency
  • Ensuring compliance with SLA’s, company policies and regulatory requirements
  • Analyzing and preparing reports for management on team goal achievement, workflow, productivity and performance
  • Management and leadership experience in a technical environment, including managing a team of 10 or more associates. Experience preferably in a financial services environment
  • Knowledge of key Infrastructure and Asset Management systems and their interdependency
  • Familiarity with security and technical industry standards (ITIL, ISO, NIST series, etc.)
  • Strong coaching abilities - proven experience and responsibility for coaching to drive performance of team and peers
  • Ability to negotiate through difficult situation
49

Manager Information Systems Security Resume Examples & Samples

  • In depth knowledge and experience in all faucets of cyber security related issues
  • Recognized as an expert in area of specialization
  • Ability to undergo government security investigation and must meet eligibility requireemtns for access to classified information
  • Demonstrated initiative and ability to work well under pressure
  • Recognized leader/achiever
  • Innovative
  • Exceptional problem solving skills, organization and analytical skills
  • Ability to lead and direct the work of others
  • Effective business communication and consultation skills to communicate with all levels throughout the organization and outside professionals
50

Information Technology Security Manager Resume Examples & Samples

  • Managing the day-to-day activities of the operations around access administration governance
  • Working collaboratively across the enterprise to derive, approve and implement IAM best practices
  • Creating and coaching to a customer focused environment that motivates and empowers the team to deliver high quality customer service to increase customer satisfaction and enhance customer relationships
  • Establishing, monitoring and maintaining goals, as well as implement policies and procedures
  • Overseeing compliance with SLA’s, company policies and regulatory requirements
  • Researching and assisting in resolving complex customer issues
  • Responsibility for the professional development of a team of senior level specialists
  • Directing day-to-day workflow and site management of team of associates and responsibility for personnel related matters, personnel review and appraisals, salary recommendations, promotions, terminations, etc
  • 10 or more years of prior direct operation experience, including managing a team of 6 or more associates
  • Demonstrated leadership skills that foster collaboration, respect and harmony amongst team with experience building a climate that values collaborative/innovative thinking
  • Strong coaching abilities with experience taking responsibility for coaching to drive performance
  • Demonstrated experience influencing at senior levels within an organization
  • Identity Access Management or IT security experience preferred
  • Management and leadership experience in a technical environment preferred
  • Industry experiences in financial services and/or technology preferred
51

Regional Security Information Manager Resume Examples & Samples

  • Oversee 24/7 delivery of regional travel security assessment and reporting 24/7 to internal and external clients
  • Ensure 24/7 assessments coverage is maintained through effective rostering of RSC staff
  • Monitor Americas regional and global Aviation security events, initiate reports and provide analytical guidance and source information to the central reporting work flow on a daily basis
  • Produce a weekly Regional Security Forecast, a monthly Insight Report, a Monthly Security Forecast, and a quarterly Insight Briefing
  • Oversee the regular review of regional City and Country Guides (as per review schedule) and take responsibility for the quality of all relevant regional and Aviation information products
  • Provide direct management of regional and Aviation assessments staff, including performance development
  • Develop and maintain an extensive professional network of contacts to provide ‘value added’ regional travel information
  • Respond to client enquiries on regional travel security issues as required
  • Maintain close interaction with Regional Security centre staff to provide high quality intelligence support to operations, including case management and consulting
  • Provide support to the regional promotion of information products and effective representation to clients
  • Participate in and lead marketing events, and provide expert input to assist business development staff
  • Demonstrate strong stakeholder management in developing relationships with International SOS and Control Risks colleagues, as well as global TSS team
  • Contribute to the development of new regional and global information products
  • Maintain preparedness to deploy as part of an Incident Management Team during crisis
  • Proven experience managing the intelligence cycle and analytical process
  • Proven experience of open source intelligence processes
  • Managing a team, including international and remote staff
  • Experience of developing a network of sources
  • Personal network of intelligence, travel security and other contacts able to provide relevant information and insight is desirable
  • Relating & Networking -Establishes good relationships with customers and staff; Builds wide and effective networks of contacts inside and outside the organization. Relates well to people at all levels; Manages conflict; Uses humor appropriately to enhance relationships with others
  • Personnel Management, Coaching and Mentoring - Manages the technical and career advancement of direct reports through leadership, coaching and mentoring
  • Presenting & Communicating information -Speaks clearly and fluently; Expresses opinions, information and key points of an argument clearly; Makes presentations and undertakes public speaking with skill and confidence; Responds quickly to the needs of an audience and to their reactions and feedback; Projects credibility
  • Writing & Reporting -Writes clearly, succinctly and correctly; Writes convincingly in an engaging and expressive manner; Avoids the unnecessary use of jargon or complicated language; Writes in a well-structured and logical way; Structures information to meet the needs and understanding of the intended audience
  • Delivering Results & Meeting Customer Expectations -Focuses on customer needs and satisfaction; Sets high standards for quality and quantity; Monitors and maintains quality and productivity; Works in a systematic, methodical and orderly way; Consistently achieves project goals
  • Previous experience in intelligence or a corporate security information service or related area of journalism/ academia
  • Experience managing a team
  • Work experience in the region
  • Experience working within a matrix organization (desirable)
  • Post graduate university degree in the field of, or associated with international relations, political science or a security or intelligence discipline
  • Enterprise risk management or relevant security risk management training/ qualifications