empty

Information Security Manager - Windows

Job Description

Posted on: 
November 12, 2024

Summary and company overview

The Information Security Manager is responsible, as a member of the security team, for analyzing the information security environment and developing security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. Assists in determining methods of implementing and enforcing security policies; confers with other IT and business staff to identify and implement security plans for data, software applications, hardware, telecommunications, and computer installations. Position reports to the Director of Information Security. Provide technical expertise and guide the administration of security tools that control and monitor information security Assist in the monitoring of compliance with security controls Assist IT and business staff in understanding and responding to security audit failures reported by internal and external auditing departments Assist in the response to security questionnaires, RFP responses, and audits. Train staff in the implementation of necessary computer security controls or new/upgraded security software and devices Research, evaluate, design, test, recommend and plan implementation of new or improved information security software or devices. Proactively protect the integrity, confidentiality and availability of information in the custody of or processed by the company by responding in a timely manner to a loss or misuse of information assets Participating in investigations of suspected information security misuse or in compliance reviews as requested by auditors or customers Communicating unresolved security exposures, misuse, or noncompliance situations to management Review operation logs and event console activity to determine cause of security related events or to identify potential security-related events Advise security administration staff on normal and exception processing of security authorization requests Document security policies; maintain resource classification scheme

Responsibilities

NA

Job Requirements

NA

Additional commentary

NA

Summary and company overview

The Information Security Manager is responsible, as a member of the security team, for analyzing the information security environment and developing security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. Assists in determining methods of implementing and enforcing security policies; confers with other IT and business staff to identify and implement security plans for data, software applications, hardware, telecommunications, and computer installations. Position reports to the Director of Information Security. Provide technical expertise and guide the administration of security tools that control and monitor information security Assist in the monitoring of compliance with security controls Assist IT and business staff in understanding and responding to security audit failures reported by internal and external auditing departments Assist in the response to security questionnaires, RFP responses, and audits. Train staff in the implementation of necessary computer security controls or new/upgraded security software and devices Research, evaluate, design, test, recommend and plan implementation of new or improved information security software or devices. Proactively protect the integrity, confidentiality and availability of information in the custody of or processed by the company by responding in a timely manner to a loss or misuse of information assets Participating in investigations of suspected information security misuse or in compliance reviews as requested by auditors or customers Communicating unresolved security exposures, misuse, or noncompliance situations to management Review operation logs and event console activity to determine cause of security related events or to identify potential security-related events Advise security administration staff on normal and exception processing of security authorization requests Document security policies; maintain resource classification scheme

Apply now