Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Ciso - VP Of Security

Expired Job

Corus Group, LLC Aurora , CO 80017

Posted 5 months ago

One of our customers has an immediate opening for a Chief Information Security Officer. The CISO is responsible for establishing and maintaining an enterprise-wide information security management program to ensure that information assets are adequately protected.

This position is responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and align with and support the risk posture of the enterprise. Must have experience as a CISO within the healthcare field.

The CISO position requires a visionary leader with sound knowledge of business management and a working knowledge of information security technologies. The CISO will proactively work with business until to implement proactive that meet defined policies and standards for information security. He or she will also oversee a variety of IT relation risk management activities.

The ideal candidate is a thought leader, a consensus builder, and an integrator of people and processes. While the CISO is the leader of the security program, he or she must also be able to coordinate disparate drivers, constraints and personalities, while maintaining objectivity and a strong understanding that security is just one of the business activities.

It cannot be undertaken at the expense of the enterprises ability to deliver on its goals and objectives. Ultimately, the CISO is a business leader and should have a track record of competency in the field of information security or risk management, with eight to ten years of relevant experience, including four years in a significant leadership role.

Minimum Qualifications:

Education/Licensing/Certification:

BA in Computer Science, Business Administration or a technology-related field related field. A master's degree in Healthcare Administration, Business Administration, or related field is preferred.

Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials is desired.

Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and ones from NIST.

Experience:

Minimum of eight to ten years of experience in a combination of risk management, information security and IT jobs. At least four must be in a senior leadership role. Employment history must demonstrate increasing levels of responsibility.

Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic environment.

Exhibit excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives.

Project management skills: financial/budget management, scheduling and resource management.

Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.

Experience with contract and vendor negotiations.

Knowledge and Skills:

Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act, Health Insurance Portability and Accountability Act (HIPAA) and Payments Card Industry/Data Security Standard.

Must be a critical thinker, with strong problem-solving skills.

Poise and ability to act calmly and competently in high-pressure, high-stress situations.

Excellent written and verbal communication skills, interpersonal and collaborative skills.

Ability to communicate security and risk-related concepts to technical and nontechnical audiences.

High level of personal integrity, as well as ability to professionally handle confidential matters, and show an appropriate level of judgment.

IEC 27001, ITIL, COBIT and ones from NIST.

Skills:
CISSP, CISM, CISA, ISO/IEC27001
Permanent



upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Information System Security Officer (Isso)

Solutions By Design II, LLC

Posted Yesterday

VIEW JOBS 1/17/2019 12:00:00 AM 2019-04-17T00:00 Solutions By Design II, LLC (SBD) is seeking an <strong>Information System Security Officer (ISSO) </strong>to join our team in support of our Federal Defense customer in Aurora, CO.  The individual(s) in this role will be joining a team that is responsible for maintaining, operating, and providing engineering and technical support to an Oracle Federal Financials (OFF) based e-Commerce system.  The team is responsible for administration and maintenance of the existing custom software; administration and upgrade of the existing Commercial-Off-The-Shelf (COTS) software and tools; maintenance of the existing COTS extensions and COTS configurations; corrective software maintenance of custom software, COTS extensions and COTS configurations, including all efforts to diagnose and correct application processing or performance errors; coordination for and troubleshooting of web-based applications executing on remote, Defense Information Systems Agency (DISA) computing platforms and network infrastructure; and support of DISA upgrades of Operating System and Network infrastructure.<br /> <br /> <br /> <strong>Responsibilities: </strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Shall serve as the Information System Security Officer (ISSO), provide weekly updates to the Information System Security Manager (ISSM), and assist the ISSM with security implementation, compliance, and reporting.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Determines enterprise information assurance and security standards.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develops and implements information assurance/security standards and procedures.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Identifies, reports, and resolves security violations.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Supports customers at the highest levels in the development and implementation of doctrine and policies.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Performs analysis, design, and development of security features for system architectures.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Designs, develops, engineers, and implements solutions that meet security requirements.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provides integration and implementation of the computer system security solution.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Ensures that all information systems are functional and secure.</li> </ul>  <br /> <br /> <strong>Qualifications (Requirements): </strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">The ISSO shall have a college degree, a minimum of 10 years of experience to include IA experience with a program of the size and complexity of the contract.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> The ISSO shall have at least five years’ experience in planning, documenting, and resolving security and information assurance issues on a college degree, a minimum of 10 years of experience to include IA experience technical program of the size and complexity of the contract;</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">The ISSO shall have experience leading the overall role of relevant System Engineering and Integration efforts on a technical program of the size and complexity of the contract and <strong>possess a CISSP</strong>, Security+ certification helpful.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">For each individual, a bachelor’s degree from an accredited university in an IA related field (e.g., computer science, engineering, management, accounting, finance).  15 years of experience may substitute a bachelor’s degree.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">IA personnel shall have a minimum of 5 years of experience to include experience with applications, databases, and projects of the size and scope of the contract. </li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Security DBA skills with a minimum of 5 years of experience with database IA (specifically Oracle) to include the application of DoD Security Technical Implementation Guides (STIGs)/ RMF CCIs and the completion of IA checklists (e.g., DoD 8500.2).</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Application security skills with a minimum of 3 years of experience with application IA to include the application of STIGs and the completion of IA checklists. Specific experience should include WebLogic, JAVA, IIS, Apache, at a minimum.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">A Minimum of 1 year of experience with communications security to include familiarity with communications software products (e.g., government-provided Connect:Direct®, Secure File Transfer Protocol [SFTP]), the application of STIGs, and the completion of IA checklists [e.g., DoD 8500.2]).</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Additional requirements for IA Personnel shall include experience in Information Assurance (IA) requirements analysis; RMF; experience with Virtual Machines (VMs) in an Enterprise level environment; experience in STIG/IAVA implementation and DoD 8500.2 IA Check list; and experience with assimilating systems.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">IA certifications (e.g., CISSP, CISA, CISM) to support the consolidated IA workforce requirements.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Must be a US Citizen possessing or able to obtain Privileged (IT-1) clearance, with either a Single Scope Background Investigation (SSBI) or pending SSBI with Interim IT-1 National Agency Check (NAC portion of the SSBI completed).</li> </ul>  <br />   Solutions By Design II, LLC Aurora CO

Ciso - VP Of Security

Expired Job

Corus Group, LLC