VP Information Security Resume Samples

4.5 (80 votes) for VP Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the vp information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GB
G Bergnaum
Guillermo
Bergnaum
74590 Luella Plain
Houston
TX
+1 (555) 711 9918
74590 Luella Plain
Houston
TX
Phone
p +1 (555) 711 9918
Experience Experience
Chicago, IL
Assistant VP, Information Security
Chicago, IL
Cremin-Kshlerin
Chicago, IL
Assistant VP, Information Security
  • Plans, develops, and analyses and implementation of Navy Federal Information Security Programs and supporting technologies
  • Directs the analysis of technologies critical in maintaining/improving information security, and participate in development of information security strategic growth initiatives
  • Leads the design, analysis and implementation of the Navy Federal Incident Management Program to identify and address security incidents and events that may adversely affect information assets, normal business operations, or the reputation of Navy Federal
  • Directs technical and analytical activities and collaborative relationships with internal/external personnel to detect, mitigate and prevent information security events
  • Develops procedures for responding to security incidents/events which includes incident identification, containment, eradication, and recovery
  • Provides tactical oversight of the use of external resources involved in the Information Security Programs including selection, manage contract and costs etc
  • Provides guidance to Senior Management on a broad range of information security technologies, best practices, standards, current trends, and threat landscapes
Houston, TX
VP Information Security
Houston, TX
Franecki-Runolfsdottir
Houston, TX
VP Information Security
  • Managing the enterprise's information security and business records organization, including hiring, training, talent development and performance management
  • Creating information security and risk management awareness training programs for all employees, contractors and approved system users
  • Providing strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls
  • Ensures that international, national and local Information Security and Privacy regulations are being followed
  • Collaborating with Risk, Compliance, and Legal function to develop a high level of consistent, comprehensive and effective practices
  • Improves and implements specific security policies, procedures, and processes relevant to Newell Brands Information Security Program
  • Coordinating and collaborating with information security functions across the global platform of Fresenius operations to ensure that practices in North America are consistent with global initiatives and frameworks,
present
San Francisco, CA
VP, Information Security
San Francisco, CA
Grady, Cassin and Marvin
present
San Francisco, CA
VP, Information Security
present
  • Consistently orients, trains, and develops staff. Demonstrates commitment to staff's continual learning, growth, and development. Continues self-development
  • Perform technology risk assessments with the companies to identify areas for improvement
  • Maintain ownership of development, compliance and exceptions to established policy
  • Managing complex business relationships and providing exceptional customer service to key accounts
  • Improves and implements specific security policies, procedures, and processes relevant to OneAmerica Information Security Program
  • Established relationships within cybersecurity, law enforcement, and business communities is a plus
  • Provide active leadership for incident response and crisis situations
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Belmont University
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience protecting aspects of an e-commerce web presence
  • Knowledge of applicable industry rules (including PCI, SOX, and HIPAA), and expertise in Information Security best practices and implementing Information Security Frameworks
  • Strong subject matter experience in application security, vulnerability testing and development of a risk appetite
  • Risk management experience with proven ability to effectively apply risk principles to challenging business situations
  • Impeccable executive presentation and communication skills
  • Excellent influencing and problem resolution skills
  • 15+ years’ experience
  • 5+ years’ experience internal senior management level role (e.g., Vice President); or 5+ years’ external experience in a senior management level role
  • Mastery level understanding of information security concepts, principles and drivers
  • Mastery level understanding of security, privacy, IT audit and legal security standards, guidelines and principles, including relevant US and global laws, regulations and policies related to Personal Health Information (PHI) and Personal Identifying Information (PII)
Create a Resume in Minutes

6 VP Information Security resume templates

1

VP, Information Security Resume Examples & Samples

  • At least 15 years experience
  • Advanced degree in Cybersecurity, Information Assurance, Computer Science or related field
  • Proven experience in cyber incident response
  • Proven experience in conducting forensic analysis of Windows-based and Apple-based devices
  • Proven experience in conducting investigative interviews, including writing memorandums of interviews. Formal interview training is preferred
  • Strong knowledge of IBMs Lotus Notes platform, especially of available forensic artifacts
  • EnCE , ACE, CFCE, CISSP, or similar industry-accepted certifications preferred
  • Experience using EnCase or similar forensic tools
  • Must have at least 10 years law enforcement, internal incident response or consulting experience, as well as at least 5 years of cybersecurity management experience
  • Excellent writing, interpersonal and presentation skills
2

VP, Information Security Resume Examples & Samples

  • Manage the security function of the businesses. Identify risks and system needs, perform threat assessment of identified vulnerabilities, define solutions and set standards, establish security policies and procedures
  • Delivers expert level security engineering advisement and consulting to IT, Product R&D, and business personnel in order to implement 'security by design' for programs and projects
  • Provide active leadership for compliance focused activities for PCI, SOX and other regulatory agencies
  • Provide active leadership for incident response and crisis situations
  • Work with other team members on policy compliance efforts in accordance with Live Nation Entertainment, industry regulations (PCI, HIPAA, SOX) and guidelines set forth by federal and local laws as applicable
  • Works closely with enterprise IT, PMO, other functional area specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Minimum 5 years’ experience in IT infrastructure
  • Advanced technical capabilities in a wide array of platforms and systems (e.g., VMware, Windows, UNIX, SQL, etc.)
  • In-depth internal control knowledge of core IT technologies and processes (e.g., network systems, operating systems databases, change control tools and processes, computer system operations, application and system development, help desk and monitoring, information security, data backup/retention/recovery, IT vendor management, asset management, disaster recovery, etc.)
  • Proficiency working with recognized IT Security-related standards and technologies
3

VP, Information Security Architecture Resume Examples & Samples

  • Bachelor’s degree in Computer Science or closely related discipline, required. Graduate or a PhD in Computer Science or closely related discipline preferred
  • 15+ years-experience in security architecture with mastery of defining technical security requirements across various domains such as: data, operating systems, networks, applications, etc
  • Experience managing and working with geo-distributed team
  • Proven track record building global teams in delivering large-scale enterprise class security architecture and solutions; deep understanding of security architecture and frameworks
  • Experience in technology, ecommerce, retail and/or financial services industries
  • Serve as the de-facto security expert and leader across various security disciplines including mobile, network, infrastructure, application, big data, cloud, virtualization, etc
  • Build strong cross-organizational relationships and effectively influence staff across the IT organization and broader enterprise
  • Manage the life cycle of all security technologies; research security standards, security processes and solutions and drive its enterprise adoption
  • Works closely with the other technology architects to ensure that security is properly baked-in in their technology domains
  • Provide leadership to extend the organization s ability to optimize use of emerging technologies
  • Architect, design and help deploy tailor made security technologies necessary to ensure a highly secure yet usable computing environment
  • Participates in management of customer satisfaction, best practices and benchmarking
  • Assist in the evaluation of overall risk for IT systems and the data they contain and process, accounting for the people, processes, and technologies that provide security controls
  • Maintain an expert knowledge in the field of Information Security and the related issues, systems, processes, products, and services
  • Assist in the audit process
  • Serving as an Information Security expert contributes to the definition of overall IT architecture
  • Demonstrated ability to envision and integrate various security technologies and controls into a cohesive architecture that sufficiently mitigates risk to the company
  • Creates security architecture requirements and works with product and engineering teams security implementation is consistent with standards and technical requirements
  • Proven ability to author strategic security roadmaps and translate into execution plans to drive desired outcomes
  • Deep technical understanding of and experience with security technologies including, but not limited to, intrusion detection/prevention, event correlation, firewall, antivirus, anti -spam, policy enforcement, patch/configuration management, usage monitoring, audit, secure application development, etc
  • Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe, Oracle, MS SQL Server, J2EE and .NET applications, etc
  • Thought leader in the areas of hosted and cloud services, especially IAAS, PAAS, SAAS services, mobile security, big data, data sciences and the related security implications and control approaches
  • Ability to communicate clearly end effectively with the technical and business stakeholders
  • Ability to use personal influence and communications processes to align technology to business objectives
  • Strong analytical and conceptual skills
  • Experience with applicable control frameworks and compliance mandates, including FFIEC, SOX 404, PCI, GLBA, HIPAA, SSAE16, etc
  • Strong people management skills with demonstrated ability to grow and mentor a high performing team
  • Reputation for being a collaborative thought partner and business leader, skilled at leveraging formal and informal networks with the company
  • Leading, recruiting, growing and retaining high-caliber data talent at scale
  • High impact executive with a technology background and the ability to engage in high bandwidth conversations with business and technology executives. S/he must be able to think broadly about Visa’s business and articulate and drive business value of technology initiatives
  • Leading organizational transformations along dimensions such as deep partnerships and agile collaboration with business, fostering a culture that encourages innovation
4

PA to VP Information Security Resume Examples & Samples

  • Management, coordination and support of the VP Information Security’s calendar, meetings, schedule and availability
  • Booking of meetings for the VP Information Security (with supporting tasks including coordinating required attendees availability, booking of facilities and rooms and capturing/publishing meeting minutes)
  • Booking, scheduling and managing of travel arrangements, itineraries and plans (including and considering, travel allowances, accommodation, taxis, rail, air etc.)
  • Maintain strong relationships with cross functional and virtual team members including other PAs to facilitate effective delivery
  • Ensuring effective and timely communications with appropriate stakeholders in terms of communications from the VP Information Security (as advised)
  • Development and maintenance of a consistent template for communications and standard worksheet to support the VP Information Security
  • Clear, accurate and up to date picture maintained at all times of VP Information Security’s diary in order to support their management of this
  • Attend reviews and meetings as advised by VP Information Security
  • Proven track record of working effectively as a PA to a VP or Director level leader in a large, complex organisation
  • Demonstrable experience of managing multiple time-bound tasks and constraints in a fast moving, demanding global technology environment (essential)
  • Good understanding of service management principles would be beneficial - ITIL/ITSM etc
  • Proven Track Record
  • Team player with strong aptitude to pick up ideas and to add value
  • Ability to communicate and interact well with other people from CxO down
  • Delivery orientated
  • Highly collaborative
5

Associate VP, Information Security Engineer Resume Examples & Samples

  • Provides leadership and direction through team members
  • Executes the organizational strategy set by top management, clarifying expectations for team members
  • Develops and oversees the execution of functional/departmental strategy to achieve key business/organizational objectives
  • Interacts regularly with top management to communicate status and provide reports on the performance of the business unit/function
  • Grows the organization globally through awareness and application of global trends and markets in one’s business unit
  • Coaches and inspires lower level managers to achieve better performance
  • Design global strategy for information systems security software
  • Design global strategy for solutions to remediate exploitable conditions on devices such as Web servers, mail servers, routers, firewalls and intrusion detection systems
  • Acts as a strategic advisor on the most complex, global system vulnerability issues
  • Designs global strategy for conducting security assessments
  • Develops global strategy for security policies, procedures, and measures
  • Provides subject matter expertise and knowledge of internal/external market trends on global security issues
  • Develops global security solutions strategies for highly complex assignments
  • Designs solutions which impact the business, IT function and strategy, and/or organization as a whole, improving operational effectiveness
6

VP, Information Security Resume Examples & Samples

  • At least 7 years experience in Information Security
  • University degree, graduate degree preferred and demonstrated passion in ongoing professional and personal growth and development
  • Strong collaboration skills and proven ability to work across organization levels and cultures
  • International experience preferred. Ability to travel 25% of the time
7

VP-information Security Resume Examples & Samples

  • Undergraduate degree in Information Technology, Engineering, Business, or related discipline. Masters degree a plus
  • 6-10 years work experience in information security risk management, auditing or consulting in a diverse, multi-platform environment
  • Technical knowledge of network devices and architectures, firewalls, intrusion detection/prevention systems DLP tools, security forensic techniques, web application technologies, and mobile platforms
  • Familiarity with operating systems, databases, storage technologies, and E-Mail/Instant Messaging systems
  • Financial services experience preferred, but not required
  • CISSP, CEH, or CISM certifications
  • Excellent oral and written communications skills (English mandatory) in order to integrate with global audit teams and gain an understanding of IT Risks/controls of the process under review, and articulate assessment to business auditors and Bank management
  • Highly motivated, results oriented professional and an effective team player who will establish effective links with peers and auditees to promote a favorable profile in the department. The candidate should motivate others, display integrity, enthusiasm and be approachable
  • The candidate should demonstrate a commitment to self-development, actively seek feedback to develop/update own skills and knowledge, accept and be responsive to constructive feedback
8

VP, Information Security Operations Resume Examples & Samples

  • 7 plus years relevant work experience with general industry experience in the cyber security field
  • Bachelor’s degree in Computer Science, Cyber Systems, Engineering, or Business. Master’s degree preferred
  • Extensive experience in various security technologies and techniques including the aspects of leading the engineering of these technologies
  • Extensive experience in organizing resources, establishing priorities, and leading cyber security related systems projects
  • Actively participate in the budgeting process to ensure adequate funding is available and business cases are developed to support cyber security activities / requirements
  • Experience in operating within a heterogeneous computing environment with heavy cross-functional coordination
  • Experience in designing and implement security policies, procedures and standards that describe pragmatic, risk-based mechanisms to maintain the confidentiality, integrity and availability of cyber systems and the data processed therein
  • Experience in creating and maintaining an enterprise-wide security awareness and education program
  • Experience in security incident response, investigations, and forensics
  • Collaborate with members of IT, business units, functional teams, field personnel, internal and external audit functions, regulatory bodies and third party service providers with regards to cyber security priorities and assessments
  • Develop, publish and maintain policies, procedures, standards and supporting practices that address technical and operational cyber security requirements
  • Develop and implement a cyber security program to detect, prevent and remediate cyber security issues and/or inappropriate uses of cyber technology resources
  • Represent LPL Financial at cyber security related events and conferences
  • Knowledge of cyber security regulations, guidance and policies (e.g., PCI, GLBA, HIPAA, SP1386, etc.)
  • Knowledge of the various industry and government strategies and standards in privacy and security, including Cyber Technology Infrastructure Library (ITIL), Control Objectives for Cyber and related Technology (COBIT), International Organization for Standardization (ISO 27001), SAS70, US National Institute for Standards and Technology (NIST), and others where applicable
  • Knowledge of disaster recovery, business continuity planning, auditing, and risk management
  • Knowledge of general security concepts and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, and governance
  • Knowledge of current and upcoming IT security technologies and techniques that cover all levels of IT architecture, including those that affect business processes, data, applications, and network and systems infrastructure, and their effects on a diverse computing environment, and a passion to stay abreast of emerging technologies
  • Project management of cyber security projects including development of project charters and plans; management of project execution and successful implementation of the planned solution
  • Certified Cyber Security Systems Professional (CISSP), preferred
  • Certified Cyber Security Manager (CISM), preferred
  • Certified Cyber Systems Auditor (CISA), preferred
9

VP Information Security Resume Examples & Samples

  • Develops an understanding of Newell Brands current and forward-looking threat profile using requirements to Newell Brands Information Security Program
  • Improves and implements specific security policies, procedures, and processes relevant to Newell Brands Information Security Program
  • Manages the IT Security and Risk & Compliance functions to implement consistent security safeguards and controls throughout the organization
  • Ensures that international, national and local Information Security and Privacy regulations are being followed
  • Bachelor’s degree in Information Security, Computer Science, Information Management Systems, or related field required. Master’s degree preferred
  • 15+ years of progressive IT experience in a combination of risk management, information security and IT jobs. At least three years must be in a Director level leadership role
  • Knowledge of applicable industry rules (including PCI, SOX, and HIPAA), and expertise in Information Security best practices and implementing Information Security Frameworks
  • Global experience preferred
10

VP Information Security Resume Examples & Samples

  • Delivering expert cyber intelligence services and material to Fiserv BU and ETG business leaders within domestic and international sites/locations/environments. Prepare appropriate threat intelligence content for internal and external audiences where appropriate
  • Liaison with other teams in information security (security operations, incident response and vulnerability management) along with BU ISO’s, BU technology teams and ETG management to help guide cyber security strategy. Enhance security monitoring and incident response team knowledge to support their respective missions and work with team members to enhance security monitoring tools with contextual information
  • Consuming both qualitative and quantitative data sources to produce research and intelligence products to support the needs of technology and business audiences
  • Identify new threat tactics, techniques and procedures used by cyber threat actors. Publish actionable threat intelligence for BU and ETG management
  • Create and model threat assessments to understand relevance to Fiserv environments, products and services along with potential impact. Assist the vulnerability management and threat assessment team in the assessment of vulnerabilities as they relate to Fiserv’s overall environment
  • Acquire threat intelligence and technical indicators from external sources; develop tactical intelligence and technical indicators internally. Leverage systems for automated threat intelligence sharing using industry standard protocols. Provide feeds for consumption for technology products to drive automation where available with next generation security solutions
  • Interface with industry peers, government and law enforcement organizations as appropriate to acquire and share threat intelligence information where relevant
  • Bachelor's degree in computer science or a related discipline, or equivalent work experience required, advanced degree preferred. Industry certifications such as CISSP required and GCIH is considered a plus
  • 10-12 years of experience in information security or related technology experience required, experience in the financial services, payment or securities industry is a plus
  • Minimum five years of dedicated cyber security focus and strong experience within a threat intelligence function
  • Experience in leveraging big data platforms, network/endpoint/identity threat indicators across UBA and/or SIEM solutions to correlate and conduct analysis of large data sets for the purpose of identifying malicious activity
  • Ability to communicate with clarity, effectively perform situational awareness and respond in dynamic situations across a matrixed organization
11

VP-information Security Resume Examples & Samples

  • Lead and oversee the information security and partner with key members to monitor critical security functions and Architecture to ensure alignment with corporate guidelines
  • Direct security, stability and reliability to all security infrastructure, security policies, and security operations
  • Access current approaches and establishes standards and procedures to enhance business practices and goals
  • Keep abreast of information security issues, threats, and changes and introduce and implement updates, upgrades, solution and best practices
  • Analyze and identifies vulnerabilities and makes recommendations for information security changes and manages remediation process
  • Plan and enforce security and system standards and risk management
  • Design and ensure disaster recovery procedures are in place and can be well executed to minimize the impact to the business
  • Conduct the performance of annual information security audits; ensure confidentiality and integrity of information; ensure security controls are in place
  • Collaborate with internal compliance and governance team; Monitor security concerns and alerts regarding data integrity
  • Bachelor’s degree in computer science or technology or risk management or related discipline or demonstrated equivalent experience or certifications
  • 10- 15 years of hands on experience in information security and risk management and 5 plus years managing a team
  • Innovative team leader with a strategic vision to build from bottom up
  • Strong analytical problem solving and crisis management skills
  • Ability to communicate effectively, challenge and motivate all levels of staff
  • Solid background in developing and inspiring team to innovate and achieve operational excellence
  • Experience with several information security frameworks
  • Flexibility to travel 10-20 percent
  • Strong experience in Palo Alto, Tripwire, ObserveIT and LogRhythm
12

VP-information Security & Quality Resume Examples & Samples

  • Play key role to help develop and implement world class security programs across BMC
  • Work closely with cross-functional teams and company leaders to ensure security threats are addresses and solutions are provided to mitigate risk
  • Ensure alignment with the key business stakeholders. Effectively manage resources and remove obstacles to accomplish business goals
  • Selects, develops, and evaluates personnel ensuring the efficient operation of the function
  • LI-JL1
  • BSCS/MSCS, technical degree and/or 15+ years software development experience and 7-10 years of dedicated Quality Assurance experience
  • 5+ years in executive level management & leadership role
  • Proven track record of building strong, highly productive and cohesive teams by your own contribution, professionalism and leadership
  • Proven experience in the discipline of QA with strong evidence of managing rigorous testing methodologies for enterprise products
  • Experience working in large organizations with a track record of handling a portfolio of interdependent products and suites
  • Experience in an organization that has grown through organic and M&A growth is a distinct plus as BMC has acquired several products into the overall portfolio
  • Effective leader with exceptional interpersonal & communication skills and strong experience with staff development
  • Deep knowledge in enterprise software security
  • Ability to apply tools, methodologies and practices for the improvement of the project delivery process including agile processes
  • Previous experience leading a QA testing environment for products used in a Sass and Cloud computing environment
  • Ability to connect and interact with other departments & customers – Face of Engineering (Product Management/Product Owners, Hardware, Sales, Marketing, etc.)
13

VP, Information Security Resume Examples & Samples

  • Set clear direction and lead the transformation of HMH towards progressive data management and information security
  • Development, implementation and monitoring of enterprise-wide initiatives that reduce information security risk
  • Identifying security trends and evolving technologies
  • Reporting information security risks in a manner that meets compliance and regulatory requirements (SOX, HIPAA, FERPA, CIPPA, EU Data Protection)
  • Collaborating closely with legal counsel to achieve the organizations’ compliance with data privacy laws
  • The cataloging of data types, locations and access credentials across the organization’s platforms and products
  • Communicating effectively with senior leadership and legal counsel about information security issues
  • Tracking violations of privacy and security
  • Ensuring security and privacy of customer data is achieved and articulated to the customers
  • Promoting utilization of industry standards and best practices
  • Managing complex business relationships and providing exceptional customer service to key accounts
  • Significant contact with cross-functional teams
14

VP, Information Security Product Resume Examples & Samples

  • Determine target market, portfolio offering and branding to enhance current solutions in addition to defining Security Solutions as a stand-alone product
  • Creates business value and establishes competitive advantage by building and leading high-performance cybersecurity threat and vulnerability assessment services that empower our clients to make risk-informed telecom solutions decisions
  • Define/create business case and strategy for launch/growth of the Security portfolio
  • Manage a portfolio of compliance products covering Cyber Security and Sanctions across all verticals
  • Specify market requirements through market research, regulatory engagement and direct interface with customers and non-customers
  • Create the business case for product investment and secure internal and external buy-in
  • Manage the product through the development lifecycle working with an agile engineering team to deliver rapid time-to-market
  • Develop product positioning and pricing strategies
  • Partner with the product marketing team to create a successful product launch
  • Perform periodic technology assessments to validate the technology direction of your product line
  • Analyze potential partner relationships
  • Represent Comcast speaking at industry events including customer advisory boards, user groups and other forums
  • Bachelor's degree in Engineering, Operations or related discipline. MS Preferred
  • 10+ years related experience
  • Minimum of 5 years' experience in managing people within a decentralized (matrixed) organization
15

Assistant VP Information Security PMO Resume Examples & Samples

  • Manage the Information Security’s budget framework: actual, forecast and budget, for both expenses and resources
  • Provide reports to management, Finance and PMO teams, on the financial and budget situation
  • Work on budget change requests
  • Identify management requirements for visibility on the Department’s activity, and coordinate accordingly to ensure a timely provision of the requested information by each team
  • Facilitate the department’s administration (expenses management, maintenance of the organization chart…)
16

Assistant VP, Information Security Resume Examples & Samples

  • Plans, develops, and analyses and implementation of Navy Federal Information Security Programs and supporting technologies
  • Directs the analysis of technologies critical in maintaining/improving information security, and participate in development of information security strategic growth initiatives
  • Develops, communicates, and monitors implementation of the enterprise information security program and related support technologies/applications required to ensure compliance with Navy Federal Instructions, policies, guidelines, standards, regulatory agency requirements, and federal, state, and local laws
  • Leads the design, analysis and implementation of the Navy Federal Incident Management Program to identify and address security incidents and events that may adversely affect information assets, normal business operations, or the reputation of Navy Federal
  • Directs technical and analytical activities and collaborative relationships with internal/external personnel to detect, mitigate and prevent information security events
  • Develops procedures for responding to security incidents/events which includes incident identification, containment, eradication, and recovery
  • Provides tactical oversight of the use of external resources involved in the Information Security Programs including selection, manage contract and costs etc
  • Provides guidance to Senior Management on a broad range of information security technologies, best practices, standards, current trends, and threat landscapes
  • Acts as the Information Security Division liaison and subject matter expert with the Office of General Counsel, Compliance, Internal Audit, Information Services (ISD), Human Resources, and other business units and management teams
  • Provide strategic and tactical information security guidance on new products and services and business unit projects, including evaluation and recommendation of appropriate solutions to protect information assets
  • Oversees the analyses/review of Navy Federal information technology/applications to ensure accurate level of security to support growth to current/new products and services requiring remote/global accessibility by our members
  • Reviews translation of complex information security topics and threats to ensure they are translated/documented in easily understood terms to be incorporated into business requirements
  • Directs the information security risk management program to assess enterprise risk focusing on operational security controls designed to protect member PII, identify threats, remediate vulnerabilities, and provide oversight to address remediation activities
  • Directs the assessment and vulnerability of the use of or access to member PII
  • Develops standard processes for business units to incorporate risk assessment processes into initiatives to identify acceptable risk tolerance levels and establish information classification standards
  • Collaborates with the ISD to ensure alignment of technologies with Information Security policies
  • Presents analytical findings, recommendations and proposed policy changes designed to manage, mitigate, or avoid risk to the VP, Information Security
  • Facilitates communication and information sharing with business units through collaborative meetings of the Navy Federal Information Security Advisory Council
  • Updates department representatives on current information security initiatives, and the current threat landscape and its potential impact on business initiatives
  • Collaborates with business units to assess their initiatives to facilitate risk analysis, assess the risk of potential service providers and vendors, and provide guidance and responsibilities for information classification and protection, and vendor management oversight
  • Creates, implements, and maintains Navy Federal information security related awareness training for members, employees, and contractors
  • Performs managerial duties
  • Prepares, conducts, and reviews performance appraisal; counsels and trains employees; participate in selecting key staff members
  • Develops, mentors, and motivates staff; establishes team performance goals and priorities to meet Navy Federal objectives
  • Prepares Annual Financial Plan and budgetary recommendations including, proposals and recommendations regarding equipment, services and staffing requirements
  • Performs other related duties as assigned and appropriate
  • Bachelor's degree in Business Administration, Information Systems or a related field, or the equivalent combinations of educations, training or experience
  • Experience in developing and maintaining an enterprise information security management program and skill in interpreting and translating complex information security concepts to develop business requirements
  • Experience directing large project efforts from a technical perspective, focusing on information security techniques and methodologies
  • Extensive knowledge and experience with information security concepts, principles, technologies and methodologies
  • Broad knowledge of IT systems, infrastructures, processes, application development, and current technologies
  • Excellent verbal, written, interpersonal, and presentation skills to communicate clearly and concisely technical and non-technical information to all levels of management
  • Excellent negotiations skills to obtain consensus in controversial situations involving staff and all levels of management, and external vendors/consultants
  • Demonstrated experience designing systems methodologies that focus on confidentiality, integrity, and availability
  • Extensive experience in vendor risk management and oversight
  • In-depth knowledge of at least one industry-leading risk management framework (e.g. OCTAVE, COBIT etc.)
  • Knowledge of NCUA and FFIEC regulations, GLBA, PCI and other information security requirements and frameworks
  • Advanced degree in Business Administration or a related field
  • Knowledge of Navy Federal’s mission, objectives, and functions
  • Professional certification in the information security sector (CRISC, CISM, CISSP)
  • Demonstrated thought leadership through applicable associations, authored whitepapers, leading seminars, or conference presentations
17

VP, Information Security Resume Examples & Samples

  • Develops an understanding of OneAmerica current and forward-looking threat profile using requirements to OneAmerica Information Security Program
  • Improves and implements specific security policies, procedures, and processes relevant to OneAmerica Information Security Program
  • Participate in the strategic decisions about technology, definition, and implementation of business processes and systems which impact our information technology security stance
  • Ensures that national and local Information Security and Privacy regulations are being followed
  • Creates vision and strategy for the integration of security consciousness, tools, and architectural elements into One America’s daily operating activities
  • Effectively demonstrates and leads his/her group through change, dealing positively with change. Promoting the concept of being a change agent with staff and helping them to lead this role as project leaders
  • Advanced analytical and problem solving capabilities
  • Excellent communication skills to form strong working relationships with the team, management and internal customers; able to analyze and clearly articulate complex issues and technologies understandably and engagingly
  • Familiarity with and expertise in security architecture, frameworks, and cyber technology
  • Effectively coaches employees. Provides ongoing feedback to staff, and develops staff level competencies with the staff. Develops a culture of responsive customer-oriented services and internal accountability
  • Appropriately supervises, delegates, schedules and assigns work to achieve goals
  • Consistently orients, trains, and develops staff. Demonstrates commitment to staff's continual learning, growth, and development. Continues self-development
  • Bachelor’s degree in Information Technology, Computer Science or related field. Advanced degree preferred
  • 15+ years’ experience managing IT staff
  • 15+ years of experience leading IT security planning and response
  • ITIL Foundations certifications preferred
  • Demonstrated ability to effectively build and manage teams
  • Previous experience in the Insurance and/or Financial Services industry preferred
18

VP Information Security Resume Examples & Samples

  • Driving the continuous evolution and deployment of an enterprise-wide, world-class information, technology and data risk management and business records function, including appropriate data breach response programs,
  • Identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and supports the risk posture of the enterprise,
  • Defining and driving policies, standards and processes to ensure that our practices meet the North American, regional and local needs of the business, while complying with relevant U.S. and global laws, regulations and policies,
  • Establishing and maintaining world-class integrated information security and business records function within the North American operations in a manner consistent with the company’s global initiatives and infrastructure,
  • Serving as the process owner of all ongoing activities related to business record storage and maintenance with the goal of maintaining information access and the integrity and confidentiality of customer, business partner, employee and business information, in compliance with the organization's information security policies,
  • Proactively working with business units and member firms in North America to implement practices that meet defined policies and standards for information security,
  • Coordinating and collaborating with information security functions across the global platform of Fresenius operations to ensure that practices in North America are consistent with global initiatives and frameworks,
  • Working with board and governance committees to determine acceptable levels of information security risk for the organization and ensuring that information security is managed effectively and efficiently in terms of program evaluation, reporting and cost management. Lead operational efforts through subordinates to complete the administration of business processes and services to ensure the operations effective achievement of goals within the assigned business unit(s)
  • Leading the development and publishing of an up-to-date data breach response plan, along with security policies, standards and guidelines, and enterprise-wide training and dissemination of information security policies and practices
  • Managing the enterprise's information security and business records organization, including hiring, training, talent development and performance management
  • Ensuring that information security programs are in compliance with relevant U.S. and global laws, regulations and policies to minimize or eliminate risk and audit findings
  • Setting, implementing and continuing evaluation of consistent standards for IT security operations and support (i.e. intrusion detection systems, cyber security, firewalls, vulnerability assessment systems, penetration testing, secure email system, access control & identity management systems, network security, etc.)
  • Managing research and development activities designed to assess need, analyze costs and benefits, and develop strategies for deploying and integrating progressive information security techniques and technologies
  • Coordinating the use of external resources involved in the information security and business records operations, including, but not limited to, interviewing, negotiating contracts and fees, managing external resources, and coordinating insurance resources
  • Providing strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls
  • Creating information security and risk management awareness training programs for all employees, contractors and approved system users
  • Communication, collaboration and coordination with the Global Data Protection Office
  • Facilitating a metrics and reporting framework to measure the efficiency and effectiveness of the business function, facilitating appropriate resource allocation, and increasing the maturity of the information security infrastructure
  • Understanding and interacting with related disciplines to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, data privacy and security, risk management, compliance, information access and business continuity management
  • Interacting with clients and client service teams to ensure a level of understanding and confidence in FMCNA security and business records practices
  • Collaborating with Risk, Compliance, and Legal function to develop a high level of consistent, comprehensive and effective practices
  • The ideal candidate will be a thought leader in the area of information security and privacy and business record maintenance. Success in this role will depend on the ability to collaborate with a number of key constituents, both internal and external. He or she will be a consensus builder with a track record of integrating people and processes to drive a cohesive security strategy for a complex and diverse enterprise
  • Assist with various projects as assigned
  • 15+ years’ experience
  • 5+ years’ experience internal senior management level role (e.g., Vice President); or 5+ years’ external experience in a senior management level role
  • Mastery level understanding of information security concepts, principles and drivers
  • Mastery level understanding of security, privacy, IT audit and legal security standards, guidelines and principles, including relevant US and global laws, regulations and policies related to Personal Health Information (PHI) and Personal Identifying Information (PII)
  • Mastery level understanding of information technology within a large, highly-distributed organization
  • Strong understanding of state of the art security technology and technical concepts
  • Demonstrated ability to leverage advanced knowledge of a business structure and components of a product or service to identify current state for a project or endeavor; Ability to analyze gaps caused by change initiatives and determine potential opportunities
  • Experience conducting and/or coordinating technical security scanning, penetration testing, social engineering testing, application security testing, mobile device security analysis, network security analysis/operations
  • Experience with enforcing secure coding practices, threat modeling, identity and access management, and/or security incident response/recovery
  • Industry-recognized information security management certifications such as: Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), or Certified in Risk and Information Systems Control (CRISC) desired
  • Proficiency with common information security management frameworks
  • Multiple years of successful leadership experience operating within a complex corporate or consulting organization preferably including experience in a health care organization
  • Demonstrated ability to communicate effectively with stakeholders and customers regarding technical concepts
  • Comprehensive understanding of strategic planning and program management
  • High degree of personal integrity and ethics as well as a passion for securing data systems and networks
  • Constantly striving for excellence using objective, transparent and agreed-upon standards
  • Excellent written and verbal communication and presentation skills for leadership, technical and business audiences
  • Exhibits strong leadership and management skills, business acumen, and the ability to build relationships to influence and drive change
  • Prior knowledge and/or experience with budget management
  • Superior analytical/problem solving ability; Superior critical thinking skills
  • Ability to work under constantly changing conditions and tight deadlines
  • Ability to manage multiple goals and deadlines
19

VP-information Security, Santa Ana Resume Examples & Samples

  • Management of Information Security as it relates to data systems, network and web across the enterprise
  • Subject matter expert for file integrity management and network baselining activities
  • Develop procedures and standards that meet existing and newly developed policy and regulatory requirements including SOX and FFIEC guidance
  • Facilitate security testing and training including phishing campaigns
  • Serve as project manager/lead within security projects
  • Promote awareness of applicable regulatory standards, upstream risks and industry best practices across the Bank
  • This position requires regular, predictable and timely attendance at work to meet department workload demands
  • Conducts continual research to maintain knowledge of technology, customer needs and overall requirements
  • Stays current with advancements in technology relative to data administration, security, related services, and FFIEC Guidelines
  • Makes recommendations to evolve information security practices and procedures to accommodate such changes
  • Maintains advanced knowledge and awareness of financial industry technical status and trends
  • Monitors security in daily operations and quality control
  • Consistently applies superior decision making techniques pertaining to inquiries, approvals and requests as they apply to existing policies and procedures, keeping within assigned approval limits and using these instances as learning tools for employee development
  • Treats people with respect; keeps commitments; inspires the trust of others; works ethically and with integrity; upholds organizational values; accepts responsibility for own actions
  • Demonstrates knowledge of and adherence to EEO policy; shows respect and sensitivity for cultural differences; educates others on the value of diversity; promotes working environment free of harassment of any type; builds a diverse workforce and supports affirmative action
  • Follows policies and procedures; completes tasks correctly and on time; supports the company’s goals and values
  • Performs the position safely, without endangering the health or safety to themselves or others and will be expected to report potentially unsafe conditions. The employee shall comply with occupational safety and health standards and all rules, regulations and orders issued pursuant to the OSHA Act of 1970, which are applicable to one’s own actions and conduct
  • Performs duties specific to the position and other functions as assigned
  • Bachelor’s Degree, Information Systems, Computer Science, Information Security or related field desired
  • 7-10 years IT security or information security experience with a proven ability to engage with business units, management and regulators
  • 4+ years’ experience conducting security risk assessments (Sarbanes-Oxley, FFIEC, NIST)
  • 4+ years’ experience in administering information security controls in an organization
  • Knowledge of technical infrastructure, networks, databases and systems in relation to Information Security
  • Experience with IPS/IDS and SIEM technologies
  • Certified Information Systems Security Professional (CISSP), or related certification
  • Prior experience working within a financial service organization preferred
  • Knowledge of FFIEC guidelines preferred
  • Prior experience performing security reviews and risk assessments
  • Demonstrates knowledge of, adherence to, monitoring and responsibility for compliance with state and federal regulations and laws as they pertain to this position including but not limited to the following: Gramm-Leach-Bliley Act (GLBA), California Financial Information Privacy Act, (Regulation Z (Truth in Lending Act), Regulation B (Equal Credit Opportunity Act), FHA (Fair Housing Act), Home Mortgage Disclosure Act, Real Estate Settlement Procedures Act, Fair Credit Reporting Act, Bank Secrecy Act in conjunction with the USA PATRIOT Act, Anti-Money Laundering and Customer Information Program, Right to Financial Privacy Act (state and federal) and Community Reinvestment Act
  • Effective organizational and time management skills
  • Intermediate skills in computer terminal and personal computer operation; mainframe computer system; word processing, spreadsheet and specialty software programs
  • Effective oral, written and interpersonal communication skills with the ability to apply common sense to carry out instructions, interpret documents, understand procedures, write reports and correspondence, and speak clearly to customers and employees
  • Ability to make informal presentations, inside the organization; speaking before assigned team
  • Ability to deal with difficult problems involving multiple facets and variables in non-standardized situations
  • Bachelor’s degree from an accredited university; or a minimum of 10 years of related experience and/or training. Work related experience must consist of information systems management experience in the financial services industry. Educational experience, through in-house training sessions, formal school or financial industry related curriculum, should be business or financial industry related
  • Certified Information Security Professional (CISSP) and other industry certifications
  • In depth experience of Information Security practices and implementation in Banking or financially related industry
20

VP Information Security Engineer Resume Examples & Samples

  • Strong Organizational and Management skills
  • Ability to collect information, analyze and assess improvement opportunities
  • Bank Operational Experience A broad knowledge of Identity & Access Management principles
  • Strong analytical skills/problem solving/conceptual thinking / Process Improvement Experience