The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews. 2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board. 3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. 4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers. 5. Develop and manage information security budgets and monitor them for variances. 6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users. 7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk. 8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program. 9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection. 10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance. 11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. 12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. 13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams. 14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. 15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required. 16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. 17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation. 18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action. 19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. 20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. 21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. 22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. 23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management 24. Perform related duties and fulfill responsibilities as required.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Industry
Hospitals
Number of Employees
1,001-5,000 employees