CLASSIFICATION SPECIFICATION FORM

Size: px
Start display at page:

Download "CLASSIFICATION SPECIFICATION FORM"

Transcription

1 CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information Security Office Information Security Information Technology and Business Transformation cityplace H. R.: DATE: May 2016 A. SUMMARY OF RESPONSIBILITY Security Clearance is required for this position Under the general direction of the Vice President, Information Technology and Business Transformation & Chief Information Officer (CIO), the Executive Director, Information Security Office is responsible for developing and implementing a comprehensive information security program designed to protect information assets and supporting information systems from any unauthorized access, use, disclosure, corruption or destruction. The Executive Director, Information Security Office directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The Executive Director, Information Security Office is a senior-level executive responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected in accordance to the corporate risk tolerance.

2 B. TYPICAL DUTIES Strategic Planning, Development & Execution Leads the development of a long-term Corporate IT Security strategy and programs to ensure information security and information risk management messaging and implementation are aligned on an enterprise-wide level. Monitors integrity, confidentiality and availability of information to ensure it is owned, controlled and processed by the organization. Provides leadership and strategic direction for the function, identifying protection goals, objectives, and metrics that align with the corporate strategic plan. Anticipates threats and opportunities related to corporate reputation, and develops strategies to mitigate risks. Directs, manages, and is accountable for the implementation of IT security components of operational initiatives and projects, from conceptualization and planning through to implementation. Provides strategic direction to related governance functions and stakeholders throughout the organization on information security matters, such as routine security activities, plus emerging security risks and control technologies. Information Security Controls Oversees the corporate information security management system to identify, quantify, catalog, and remedy information security risk across the enterprise and monitors the overall costs. Leads the information security management system governance committee, providing guidance on best-practices, governance and leadership. Responsible for the development and implementation of corporate information security policy, standards, guidelines and procedures to ensure ongoing maintenance of information security. Establishes a centre of excellence for information security management, offering advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively. Creates a framework for roles and responsibilities with regard to information ownership, accountability, and protection. Oversees the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies and applicable laws and regulations to minimize or eliminate risk and audit findings. Responsible for ensuring effective information security awareness, training and educational activities. Responsible for information security activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties. Oversees information security incident response team (ISIRT) planning as well as the investigation of security breaches, and assists with disciplinary and legal matters associated with such breaches as necessary. Responsible for identity and access management governance. Liaises among information security team, corporate compliance, audit, legal, and HR as required.

3 Develops the metrics and reporting framework to measure the efficiency and effectiveness of IT security components of corporate programs and initiatives. Information Risk Management Defines, implements, and is responsible for the organization s global information risk management strategy and framework, collaborating with business units, stakeholders, and committees to get buy-in and build momentum. Oversees the process to administer policy exceptions, ensuring that they are subject to appropriate controls, both before and after approval. Ensures that strategic information security and risk guidance is provided to third-party suppliers in accordance with internal frameworks, and assesses to ensure compliance with required controls. Coordinates and manages any external resources involved in programs, including interviewing and negotiating contracts and fees. Oversees information security risk assessments and controls selection activities. Works with outside consultants as appropriate for independent security audits. Security Architecture and Engineering Ensures that information security architecture standards, policies, and procedures are available and enacted consistently across application development projects and programs. Collaborates with enterprise architecture to define physical, virtual, and logical information security architecture specifications. Collaborates with application owners to understand the risk position around key business applications. Liaises with the enterprise architecture team to ensure alignment between the security and enterprise architectures, coordinating the strategic planning implicit in these architectures. General Leadership Assists the Vice President, Information Technology and Business Transformation & Chief Information Officer with the planning, management, and implementation of corporate information security projects and initiatives. Conducts all activities of an Executive Director, including participation in strategic planning, long- term human resource planning, budgeting, and support for the Information Technology and Business Transformation division. Provides leadership, coaching and direction to direct reports. Provides direction to Security Operations staff and management (currently titled Security, Compliance and Risk Management) by way of a dotted line reporting structure. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives. Represents the corporation at meetings with external organizations, professional and business associations related to Information Security issues and development. Remains current in new technologies, platforms, threats, and risks; actively engages in a defined process to keep current on trends, new practices and new solutions and emerging technologies and threats. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives.

4 Displays leadership by continually motivating, encouraging and inspiring the development of strong, effective, efficient, ethical and professional teams with a clear focus on the delivery of planned outcomes and the continual development of the capabilities and capacities of the individual team members. C. QUALIFICATIONS 1. Education: Bachelor or Master s Degree in Computer Science, Information Systems, Commerce, Business Administration or related field. Completion of one or more of the following professional designations is preferred: o Information security management qualifications such as: CISSP, CISM, CRISC, CISA or other information security credentials. An MBA would be considered an asset. 2. Experience: Ten years of related senior level experience successfully leading comparable information security management and/or related functions (such as an ISMS, IT audit, and IT Risk Management), including five years at a senior management level. Experience must include a minimum of five years managing multiple, large, cross-functional teams or projects, influencing senior level management and key stakeholders. 3. Technical Knowledge & Skills: Solid understanding of the enterprise information security architecture discipline, processes, concepts, and best practices. Knowledge of information security and risk control frameworks such as COBiT, ISO 27001, ITIL, and ISO is preferred. Knowledge of business continuity and IT disaster recovery frameworks such as BS and BS is preferred. Demonstrated personal values aligned with the corporate values, providing a role model for the team. Demonstrated ability to work effectively with a team, delivering high performance and customer satisfaction, in a global, matrix management environment. Strong facilitation skills and a clear ability to build strong relationships with business stakeholders at all levels, including executive managers and vendors. Strong, proven problem-solving skills and the ability to identify, analyze, and resolve problems, driving solutions through to completion. Proficiency in the use of standard software packages, such as Microsoft Word, Excel, and PowerPoint. Strong affinity with technology and an interest in the wider implications of technology. Proven integrity and the ability to handle confidential matters in a professional manner, applying the appropriate level of judgment and maturity. Strong leadership and management skills and recognized as a key strategic thinker. In-depth knowledge of information technology management, including hardware and software.

5 In-depth knowledge of enterprise application and data architecture principles, and associated tools, technologies, methods. Proven capabilities in research, analysis, and a demonstrated ability to interpret and synthesize complex data. Proven capabilities in the area of project management with the ability to plan and manage multiple complex projects simultaneously. Superior oral and written communication skills, with demonstrated ability to clearly convey complex information in a concise and straightforward manner. Excellent interpersonal skills, with experience of superior performance in public speaking and formal presentations. Proven ability to handle conflict and criticism in a positive and professional manner. Proven ability to adapt to, and effectively contribute to, rapid business transformation. Proven ability to work under pressure and meet deadlines. Superior negotiation skills in working with key stakeholders and vendors. 5. Security Clearance Must be able to obtain and maintain the required level of security clearance as a condition of employment in this classification including: Reliability Status: Consent to a Criminal Name Record Check Consent to a Credit Check Secret (Level II) Security Clearance: Consent to a CSIS (Canadian Security Intelligence Service) Indices Check

Chief Information Officer

Chief Information Officer Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

IT Risk & Security Specialist Position Description

IT Risk & Security Specialist Position Description Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Qulliq Energy Corporation Job Description

Qulliq Energy Corporation Job Description Qulliq Energy Corporation Job Description Position Title Senior Enterprise Systems Specialist Unionized Reports to: Manager, Information Technology Reporting to this Position Enterprise Systems Specialist

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the

More information

Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance)

Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance) Job Description Job Title: Reports to: Team: Location: Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance) BIS Nelson Job Purpose To be responsible the organization

More information

JOB SPECIFICATION. Service Support Manager ORGANISATION CHART: JOB PURPOSE:

JOB SPECIFICATION. Service Support Manager ORGANISATION CHART: JOB PURPOSE: JOB SPECIFICATION JOB TITLE: GRADE: Service Support Manager SMP ORGANISATION CHART: JOB PURPOSE: Management responsibility for the Service Support within the Trust delivering an efficient and cost effective

More information

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:

More information

Applicants for administrative staff employment with Debevoise & Plimpton LLP

Applicants for administrative staff employment with Debevoise & Plimpton LLP Date: November 13, 2014 To: Applicants for administrative staff employment with From: Human Resources Thank you for inquiring about administrative staff employment opportunities with Debevoise & Plimpton

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Head of Engineering Job Description

Head of Engineering Job Description Head of Engineering Job Description (Job Code and Level: E006) Definition: Overall responsibility and accountability for the Engineering function across the UK which will include people and budgetary management.

More information

IT Senior Audit Leader

IT Senior Audit Leader IT Senior Audit Leader Locations: Minneapolis, MN; Phoenix, AZ; Denver, CO; Des Moines, IA; Philadelphia, PA; Charlotte, NC; San Francisco, CA and San Antonio, TX Job Description Wells Fargo Audit Services

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM

HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM FORTUNE 500 HIGH-TECH EQUIPMENT AND SERVICES COMPANY Process-focused job description indicates low potential for career enhancement and discourages talent from

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure.

Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure. Network Operation Manager About the Education Achievement Authority: The Education Achievement Authority is a new statewide school system that will assume operation of the lowest five (5) percent of performing

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

OPPORTUNITY PROFILE. Associate Dean Executive Education

OPPORTUNITY PROFILE. Associate Dean Executive Education OPPORTUNITY PROFILE Associate Dean Executive Education THE ORGANIZATION - ALBERTA SCHOOL OF BUSINESS EXECUTIVE EDUCATION The Alberta School of Business is one of the world s leading institutions in business

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

SAMPLE Short-form Job Profile

SAMPLE Short-form Job Profile SAMPLE Short-form Job Profile (This profile type is included free with the survey data for each position ordered) Foote Partners, LLC www.footepartners.com Senior Information Security Analyst Assists in

More information

Information Security Governance:

Information Security Governance: Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens

More information

S86810, page 1 Manager, Technology Operations Job Description

S86810, page 1 Manager, Technology Operations Job Description S86810, page 1 Manager, Technology Operations Job Description Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. FUNCTIONAL

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

POSITION DESCRIPTION YEARLY PERCENT OF TIME 25% ESSENTIAL FUNCTIONS:

POSITION DESCRIPTION YEARLY PERCENT OF TIME 25% ESSENTIAL FUNCTIONS: POSITION DESCRIPTION PROPOSED TITLE: Chief Information Security Officer CATEGORY: Administrative ETENDED TITLE: Chief Information Security Officer FLSA STATUS: Exempt GRADE: E JOB SUMMARY: Responsible

More information

Company Synlait Milk Ltd Date: August 2014

Company Synlait Milk Ltd Date: August 2014 Position Reports to Senior Marketing Advisor Marketing and Communications Manager Company Synlait Milk Ltd Date: August 2014 Location 1028 Heslerton Road, Dunsandel, Canterbury Purpose Our marketing champion,

More information

COMMUNIQUE. Information Technology (IT) Governance Guidance

COMMUNIQUE. Information Technology (IT) Governance Guidance COMMUNIQUE 14-COM-002 July 14, 2014 Information Technology (IT) Governance Guidance The Credit Union Prudential Supervisors Association (CUPSA) has established an IT Risk Working Group to focus on IT governance

More information

Ambulance Victoria. Position Description

Ambulance Victoria. Position Description Position Title: IT Project Manager Team Leader Position Description Division: Information & Technology Department: Solution Delivery Reports To: Manager Solution Delivery Direct Reports: IT Project Managers

More information

This document includes information about the role for which you are applying and the information you will need to provide with the application.

This document includes information about the role for which you are applying and the information you will need to provide with the application. Further Particulars This document includes information about the role for which you are applying and the information you will need to provide with the application. 1. Role details Vacancy reference: 10481

More information

SAMPLE JOB DESCRIPTIONS

SAMPLE JOB DESCRIPTIONS SAMPLE JOB DESCRIPTIONS In this section we have provided a number of sample job descriptions. We hope that they will provide you with guidance as you develop job descriptions(s). Level Title Page Consultant

More information

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security

More information

Information and Communication Technology

Information and Communication Technology Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication

More information

The ICMCI CMC Competence Framework - Overview

The ICMCI CMC Competence Framework - Overview This CMC Competence Framework specifies the cluster of related abilities, commitments, knowledge, and skills that a management consultant should demonstrate in practice in order to successfully complete

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

INFORMATION TECHNOLOGY & MEDIA SERVICES

INFORMATION TECHNOLOGY & MEDIA SERVICES INFORMATION TECHNOLOGY & MEDIA SERVICES Head of IT Operations Permanent, Full-time Grade SENIOR STAFF: Salary to be determined by the Vice Chancellor De Montfort University is home to more than 27,000

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

Job Description Solutions Lead

Job Description Solutions Lead Solutions Lead Department: Group: Direct Line Manager: Direct Reports: Business Support Manager - Information Services Database Applications Analyst, Technical Business Analyst Delegations: Primary Location:

More information

DEPARTMENT OF THE PREMIER AND CABINET

DEPARTMENT OF THE PREMIER AND CABINET DEPARTMENT OF THE PREMIER AND CABINET POSITION DESCRIPTION: TEAM LEADER, ICT SERVICE DESK (ASO5) ORGANISATIONAL CONTEXT Organisational Role As a leader in the public sector, we have a clear role to support

More information

Big Data Engineer Position Description

Big Data Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

Duration: One year with the option of an additional year based on performance.

Duration: One year with the option of an additional year based on performance. Position: Adviser to the Internal Audit Unit Objectives: A person to support the newly established Internal audit unit to transform it from its infancy stage to a unit that is a trusted adviser, and more

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement ANNOUNCEMENT NO: 20130411 POSITION: Security Administrator OPENING DATE: April 11, 2013 CLOSING DATE: Open until filled TOUR OF DUTY:

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

SENIOR INFORMATION SYSTEMS MANAGER

SENIOR INFORMATION SYSTEMS MANAGER CITY OF PORTLAND Multiple SENIOR INFORMATION SYSTEMS MANAGER FLSA Status: Union Representation: Exempt Nonrepresented DEFINITION To plan, manage, supervise and coordinate information systems activities

More information

Chief Information Security Officer

Chief Information Security Officer Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Derbyshire Constabulary

Derbyshire Constabulary h Derbyshire Constabulary Job Description Closing Date Wednesday 28 October 205 at midday HR Service Centre Contact Rachael Stone Tel int 733 00 Extl 0300 330 330 Role Title Technical Support Manager Grade

More information

Project Manager Job Descriptions

Project Manager Job Descriptions Promotion Criteria Position Overview Statement Principal Duties and Responsibilities PROJECT MANAGER Admin Level 4 Typically >8 years in increasing responsible IT leadership role; typically managed one

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes

B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to 1. contribute to the development,

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by: CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)

More information

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary

More information

John Smith Washington Street, 11 +1-541-754-3010

John Smith Washington Street, 11 +1-541-754-3010 John Smith Washington Street, 11 +1-541-754-3010 Boston MA 02201-1020 JohnSmith@mail.com United States of America LinkedIn Profile Link CAREER OBJECTIVE To obtain a managerial position in IT support, business

More information

Business Logistics Specialist Position Description

Business Logistics Specialist Position Description Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

POSITION INFORMATION DOCUMENT

POSITION INFORMATION DOCUMENT POSITION INFORMATION DOCUMENT Position Title: Manager, ICT Continuity Planning Classification Code: ASO7 Division: ICT Services Directorate: ICT Operations Type of Appointment: Branch: ICT Security Ongoing

More information

TOP 10 Security Questions Introduction Breaches and other privacy and security incidents in healthcare are on the rise due to the vast size of the industry and the oneoffs of protected health information

More information

Ambulance Victoria Position Description

Ambulance Victoria Position Description Ambulance Victoria Position Description Position Title: Manager Performance Analysis and Data Governance Division: Strategy and Planning Department: Performance Analysis and Data Governance Reports To:

More information

Senior Payroll Officer / Accounts Administrator. 1028 Heslerton Road, Dunsandel, Canterbury

Senior Payroll Officer / Accounts Administrator. 1028 Heslerton Road, Dunsandel, Canterbury Position Reports to Senior Payroll Officer / Accounts Administrator Accounting Company Synlait Milk Ltd Date: January 2015 Location 1028 Heslerton Road, Dunsandel, Canterbury Purpose Payroll: To provide

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

Work Toward Your Bachelor s Degree

Work Toward Your Bachelor s Degree By completing a series of Walden s Professional Development courses, you can earn credits toward a number of bachelor s programs at Walden University. To receive credit, you will need to complete all of

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

Utica College. Information Security Plan

Utica College. Information Security Plan Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles

More information

ISO 27000 Information Security Management Systems Foundation

ISO 27000 Information Security Management Systems Foundation ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality

More information

Competency Requirements for Executive Director Candidates

Competency Requirements for Executive Director Candidates Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives

More information

DevOps Engineer Position Description

DevOps Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Guide for the Role and Responsibilities of an Information Security Officer Within State Government Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities

More information

JOB DESCRIPTION/PERSON SPECIFICATION

JOB DESCRIPTION/PERSON SPECIFICATION JOB DESCRIPTION/PERSON SPECIFICATION A POSITION DETAILS DIVISION: Business Support JOB TITLE: MIS Security Analyst DEPARTMENT/BUSINESS SECTOR: MIS REPORTING TO: MIS Security Manager GRADE: 11 B KEY RESPONSIBILITIES

More information

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

SUMMARY OF POSITION ROLE/RESPONSIBILITIES: SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant

More information

Customer-Facing Information Security Policy

Customer-Facing Information Security Policy Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security

More information

IT Consultant Job Family

IT Consultant Job Family JOB TITLE Promotion Criteria Position Overview Statement: Principal Duties and Responsibilities IT Consultant I (may be Support or Admin) Entry level little or no IT experience required; however, experience

More information

Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax

Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax UFIT Classification Specifications Revised March 20, 2014 Job Title: IT Senior

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas

POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas POSITION DESCRIPTION Position Title Manager, Technical Services Support Position Number Reports to Manager Technology Services Functional Auth HRM Auth Region IT Services Centre Head Office Date Feb 2011

More information

UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014. Page 1 of 5

UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014. Page 1 of 5 UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014 Each key skill is linked to relevant strategic objectives and/or the Board s Statement of Primary Responsibilities. To assist with the assessment of Board Members

More information

Business Relationship Manager Position Description

Business Relationship Manager Position Description Manager Position Description February 9, 2015 Manager Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

IT Project Manager III

IT Project Manager III Career Service Authority IT Project Manager III Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs advanced, specialized, professional project management work on one or more medium to large moderately

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799

Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799 Canadian ISO 17799 User Group Conference Sun Life Financial s Experience with Security Governance & ISO 17799 Deloitte & Touche, 79 Wellington West, 20th Floor Toronto, ON 30 January 2004 D.A. Stolovitch,

More information

Business Intelligence Engineer Position Description

Business Intelligence Engineer Position Description Business Intelligence Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Business Analyst Position Description

Business Analyst Position Description Analyst Position Description September 4, 2015 Analysis Position Description September 4, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Ongoing N/A TBC. Baseline

Ongoing N/A TBC. Baseline Position Title: Executive General Manager, Core Services Systems Operations Classification: SES Band 2 Position Number: 1018 Position Status (ongoing/nonongoing): Ongoing Division: Core Services Systems

More information

Business Intelligence Analyst Position Description

Business Intelligence Analyst Position Description Business Intelligence Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Role Description Enterprise Architect and Solutions Delivery Manager

Role Description Enterprise Architect and Solutions Delivery Manager Role Description Enterprise Architect and Solutions Delivery Manager Cluster Agency Division Location Classification/Grade/Band Kind of Employment NSW Health Cancer Institute NSW Information Technology

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

SUPERVISOR, SERVICE DESK (Existing position)

SUPERVISOR, SERVICE DESK (Existing position) Edmonton Catholic Schools is now accepting applications for the position of SUPERVISOR, SERVICE DESK (Existing position) Edmonton Catholic Schools is a large urban school district whose mission is to provide

More information