Security & Protective Services Instructor - Treasure Island

EquusSouth San Francisco, CA
$74,053 - $82,765

About The Position

Information Security Officers (ISOs) are responsible for safeguarding an organization's information and IT systems. They develop and implement security policies, monitor and respond to security threats, and ensure compliance with regulations. The role involves a combination of strategic planning, risk management, and operational oversight. The Information Security Officer works with the wider Cyber Security Team, Digital and Technology, Business Units, Corporate Risk Office, and other key security stakeholders to select, implement and define processes and standards to ensure that APM’s security risks are adequately managed and governed. Develop and Implement Security Policies Create and maintain information security policies and procedures to protect the organization's data and IT infrastructure. Ensure policies are aligned with industry standards and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS). Risk Management Conduct risk assessments to identify potential vulnerabilities and threats to information systems. Develop and implement risk mitigation strategies and manage security incidents and breaches. Compliance and Auditing Ensure compliance with relevant laws, regulations, and industry standards. Prepare for and manage security audits and assessments. Maintain documentation and records related to information security. Security Operations Monitor and analyze security alerts and incidents. Oversee the implementation and operation of security tools and technologies (e.g., firewalls, intrusion detection systems, encryption). Respond to and manage security incidents, coordinating with other IT and business units. Training and Awareness Develop and deliver information security training programs for employees. Promote security awareness and best practices within the organization. Vendor Management Assess and manage third-party vendor security risks. Collaborate with vendors to ensure they meet security requirements. Incident Response Lead incident response efforts and coordinate with other teams to address and resolve security incidents. Conduct post-incident reviews and implement improvements to prevent future occurrences. Strategic Planning Contribute to the development of the organization's overall IT security strategy and roadmap. Stay updated on the latest security threats, trends, and technologies.

Requirements

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 5+ years’ experience in a similar role or equivalent environment
  • Proven experience in information security or IT security roles, typically 5-10 years.
  • Experience in a leadership or managerial position is often required.
  • Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), or CompTIA Security+.
  • Strong knowledge of security technologies, protocols, and best practices.
  • Excellent analytical and problem-solving skills.
  • Experience with security risk assessment tools and techniques.
  • Strong, self-motivated, outcome-driven, and productive work ethic
  • Participant in state, national and international cyber security bodies, and networks
  • Highly developed communication, organisational, influencing, and interpersonal skills

Nice To Haves

  • Cloud security experience preferred

Responsibilities

  • Develop and Implement Security Policies
  • Create and maintain information security policies and procedures to protect the organization's data and IT infrastructure.
  • Ensure policies are aligned with industry standards and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS).
  • Risk Management
  • Conduct risk assessments to identify potential vulnerabilities and threats to information systems.
  • Develop and implement risk mitigation strategies and manage security incidents and breaches.
  • Compliance and Auditing
  • Ensure compliance with relevant laws, regulations, and industry standards.
  • Prepare for and manage security audits and assessments.
  • Maintain documentation and records related to information security.
  • Security Operations
  • Monitor and analyze security alerts and incidents.
  • Oversee the implementation and operation of security tools and technologies (e.g., firewalls, intrusion detection systems, encryption).
  • Respond to and manage security incidents, coordinating with other IT and business units.
  • Training and Awareness
  • Develop and deliver information security training programs for employees.
  • Promote security awareness and best practices within the organization.
  • Vendor Management
  • Assess and manage third-party vendor security risks.
  • Collaborate with vendors to ensure they meet security requirements.
  • Incident Response
  • Lead incident response efforts and coordinate with other teams to address and resolve security incidents.
  • Conduct post-incident reviews and implement improvements to prevent future occurrences.
  • Strategic Planning
  • Contribute to the development of the organization's overall IT security strategy and roadmap.
  • Stay updated on the latest security threats, trends, and technologies.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service