CLASSIFICATION SPECIFICATION FORM

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CLASSIFICATION SPECIFICATION FORM"

Transcription

1 CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information Security Office Information Security Information Technology and Business Transformation cityplace H. R.: DATE: May 2016 A. SUMMARY OF RESPONSIBILITY Security Clearance is required for this position Under the general direction of the Vice President, Information Technology and Business Transformation & Chief Information Officer (CIO), the Executive Director, Information Security Office is responsible for developing and implementing a comprehensive information security program designed to protect information assets and supporting information systems from any unauthorized access, use, disclosure, corruption or destruction. The Executive Director, Information Security Office directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The Executive Director, Information Security Office is a senior-level executive responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected in accordance to the corporate risk tolerance.

2 B. TYPICAL DUTIES Strategic Planning, Development & Execution Leads the development of a long-term Corporate IT Security strategy and programs to ensure information security and information risk management messaging and implementation are aligned on an enterprise-wide level. Monitors integrity, confidentiality and availability of information to ensure it is owned, controlled and processed by the organization. Provides leadership and strategic direction for the function, identifying protection goals, objectives, and metrics that align with the corporate strategic plan. Anticipates threats and opportunities related to corporate reputation, and develops strategies to mitigate risks. Directs, manages, and is accountable for the implementation of IT security components of operational initiatives and projects, from conceptualization and planning through to implementation. Provides strategic direction to related governance functions and stakeholders throughout the organization on information security matters, such as routine security activities, plus emerging security risks and control technologies. Information Security Controls Oversees the corporate information security management system to identify, quantify, catalog, and remedy information security risk across the enterprise and monitors the overall costs. Leads the information security management system governance committee, providing guidance on best-practices, governance and leadership. Responsible for the development and implementation of corporate information security policy, standards, guidelines and procedures to ensure ongoing maintenance of information security. Establishes a centre of excellence for information security management, offering advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively. Creates a framework for roles and responsibilities with regard to information ownership, accountability, and protection. Oversees the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies and applicable laws and regulations to minimize or eliminate risk and audit findings. Responsible for ensuring effective information security awareness, training and educational activities. Responsible for information security activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties. Oversees information security incident response team (ISIRT) planning as well as the investigation of security breaches, and assists with disciplinary and legal matters associated with such breaches as necessary. Responsible for identity and access management governance. Liaises among information security team, corporate compliance, audit, legal, and HR as required.

3 Develops the metrics and reporting framework to measure the efficiency and effectiveness of IT security components of corporate programs and initiatives. Information Risk Management Defines, implements, and is responsible for the organization s global information risk management strategy and framework, collaborating with business units, stakeholders, and committees to get buy-in and build momentum. Oversees the process to administer policy exceptions, ensuring that they are subject to appropriate controls, both before and after approval. Ensures that strategic information security and risk guidance is provided to third-party suppliers in accordance with internal frameworks, and assesses to ensure compliance with required controls. Coordinates and manages any external resources involved in programs, including interviewing and negotiating contracts and fees. Oversees information security risk assessments and controls selection activities. Works with outside consultants as appropriate for independent security audits. Security Architecture and Engineering Ensures that information security architecture standards, policies, and procedures are available and enacted consistently across application development projects and programs. Collaborates with enterprise architecture to define physical, virtual, and logical information security architecture specifications. Collaborates with application owners to understand the risk position around key business applications. Liaises with the enterprise architecture team to ensure alignment between the security and enterprise architectures, coordinating the strategic planning implicit in these architectures. General Leadership Assists the Vice President, Information Technology and Business Transformation & Chief Information Officer with the planning, management, and implementation of corporate information security projects and initiatives. Conducts all activities of an Executive Director, including participation in strategic planning, long- term human resource planning, budgeting, and support for the Information Technology and Business Transformation division. Provides leadership, coaching and direction to direct reports. Provides direction to Security Operations staff and management (currently titled Security, Compliance and Risk Management) by way of a dotted line reporting structure. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives. Represents the corporation at meetings with external organizations, professional and business associations related to Information Security issues and development. Remains current in new technologies, platforms, threats, and risks; actively engages in a defined process to keep current on trends, new practices and new solutions and emerging technologies and threats. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives.

4 Displays leadership by continually motivating, encouraging and inspiring the development of strong, effective, efficient, ethical and professional teams with a clear focus on the delivery of planned outcomes and the continual development of the capabilities and capacities of the individual team members. C. QUALIFICATIONS 1. Education: Bachelor or Master s Degree in Computer Science, Information Systems, Commerce, Business Administration or related field. Completion of one or more of the following professional designations is preferred: o Information security management qualifications such as: CISSP, CISM, CRISC, CISA or other information security credentials. An MBA would be considered an asset. 2. Experience: Ten years of related senior level experience successfully leading comparable information security management and/or related functions (such as an ISMS, IT audit, and IT Risk Management), including five years at a senior management level. Experience must include a minimum of five years managing multiple, large, cross-functional teams or projects, influencing senior level management and key stakeholders. 3. Technical Knowledge & Skills: Solid understanding of the enterprise information security architecture discipline, processes, concepts, and best practices. Knowledge of information security and risk control frameworks such as COBiT, ISO 27001, ITIL, and ISO is preferred. Knowledge of business continuity and IT disaster recovery frameworks such as BS and BS is preferred. Demonstrated personal values aligned with the corporate values, providing a role model for the team. Demonstrated ability to work effectively with a team, delivering high performance and customer satisfaction, in a global, matrix management environment. Strong facilitation skills and a clear ability to build strong relationships with business stakeholders at all levels, including executive managers and vendors. Strong, proven problem-solving skills and the ability to identify, analyze, and resolve problems, driving solutions through to completion. Proficiency in the use of standard software packages, such as Microsoft Word, Excel, and PowerPoint. Strong affinity with technology and an interest in the wider implications of technology. Proven integrity and the ability to handle confidential matters in a professional manner, applying the appropriate level of judgment and maturity. Strong leadership and management skills and recognized as a key strategic thinker. In-depth knowledge of information technology management, including hardware and software.

5 In-depth knowledge of enterprise application and data architecture principles, and associated tools, technologies, methods. Proven capabilities in research, analysis, and a demonstrated ability to interpret and synthesize complex data. Proven capabilities in the area of project management with the ability to plan and manage multiple complex projects simultaneously. Superior oral and written communication skills, with demonstrated ability to clearly convey complex information in a concise and straightforward manner. Excellent interpersonal skills, with experience of superior performance in public speaking and formal presentations. Proven ability to handle conflict and criticism in a positive and professional manner. Proven ability to adapt to, and effectively contribute to, rapid business transformation. Proven ability to work under pressure and meet deadlines. Superior negotiation skills in working with key stakeholders and vendors. 5. Security Clearance Must be able to obtain and maintain the required level of security clearance as a condition of employment in this classification including: Reliability Status: Consent to a Criminal Name Record Check Consent to a Credit Check Secret (Level II) Security Clearance: Consent to a CSIS (Canadian Security Intelligence Service) Indices Check

Chief Information Officer

Chief Information Officer Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to

More information

IT Senior Audit Leader

IT Senior Audit Leader IT Senior Audit Leader Locations: Minneapolis, MN; Phoenix, AZ; Denver, CO; Des Moines, IA; Philadelphia, PA; Charlotte, NC; San Francisco, CA and San Antonio, TX Job Description Wells Fargo Audit Services

More information

Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure.

Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure. Network Operation Manager About the Education Achievement Authority: The Education Achievement Authority is a new statewide school system that will assume operation of the lowest five (5) percent of performing

More information

CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

Qulliq Energy Corporation Job Description

Qulliq Energy Corporation Job Description Qulliq Energy Corporation Job Description Position Title Senior Enterprise Systems Specialist Unionized Reports to: Manager, Information Technology Reporting to this Position Enterprise Systems Specialist

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

IT Risk & Security Specialist Position Description

IT Risk & Security Specialist Position Description Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Applicants for administrative staff employment with Debevoise & Plimpton LLP

Applicants for administrative staff employment with Debevoise & Plimpton LLP Date: November 13, 2014 To: Applicants for administrative staff employment with From: Human Resources Thank you for inquiring about administrative staff employment opportunities with Debevoise & Plimpton

More information

SAMPLE Short-form Job Profile

SAMPLE Short-form Job Profile SAMPLE Short-form Job Profile (This profile type is included free with the survey data for each position ordered) Foote Partners, LLC www.footepartners.com Senior Information Security Analyst Assists in

More information

Information and Communication Technology

Information and Communication Technology Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

INFORMATION TECHNOLOGY & MEDIA SERVICES

INFORMATION TECHNOLOGY & MEDIA SERVICES INFORMATION TECHNOLOGY & MEDIA SERVICES Head of IT Operations Permanent, Full-time Grade SENIOR STAFF: Salary to be determined by the Vice Chancellor De Montfort University is home to more than 27,000

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

JOB SPECIFICATION. Service Support Manager ORGANISATION CHART: JOB PURPOSE:

JOB SPECIFICATION. Service Support Manager ORGANISATION CHART: JOB PURPOSE: JOB SPECIFICATION JOB TITLE: GRADE: Service Support Manager SMP ORGANISATION CHART: JOB PURPOSE: Management responsibility for the Service Support within the Trust delivering an efficient and cost effective

More information

Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance)

Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance) Job Description Job Title: Reports to: Team: Location: Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance) BIS Nelson Job Purpose To be responsible the organization

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Head of Engineering Job Description

Head of Engineering Job Description Head of Engineering Job Description (Job Code and Level: E006) Definition: Overall responsibility and accountability for the Engineering function across the UK which will include people and budgetary management.

More information

S86810, page 1 Manager, Technology Operations Job Description

S86810, page 1 Manager, Technology Operations Job Description S86810, page 1 Manager, Technology Operations Job Description Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. FUNCTIONAL

More information

Job Description Solutions Lead

Job Description Solutions Lead Solutions Lead Department: Group: Direct Line Manager: Direct Reports: Business Support Manager - Information Services Database Applications Analyst, Technical Business Analyst Delegations: Primary Location:

More information

POSITION DESCRIPTION YEARLY PERCENT OF TIME 25% ESSENTIAL FUNCTIONS:

POSITION DESCRIPTION YEARLY PERCENT OF TIME 25% ESSENTIAL FUNCTIONS: POSITION DESCRIPTION PROPOSED TITLE: Chief Information Security Officer CATEGORY: Administrative ETENDED TITLE: Chief Information Security Officer FLSA STATUS: Exempt GRADE: E JOB SUMMARY: Responsible

More information

Company Synlait Milk Ltd Date: August 2014

Company Synlait Milk Ltd Date: August 2014 Position Reports to Senior Marketing Advisor Marketing and Communications Manager Company Synlait Milk Ltd Date: August 2014 Location 1028 Heslerton Road, Dunsandel, Canterbury Purpose Our marketing champion,

More information

SAMPLE JOB DESCRIPTIONS

SAMPLE JOB DESCRIPTIONS SAMPLE JOB DESCRIPTIONS In this section we have provided a number of sample job descriptions. We hope that they will provide you with guidance as you develop job descriptions(s). Level Title Page Consultant

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

OPPORTUNITY PROFILE. Associate Dean Executive Education

OPPORTUNITY PROFILE. Associate Dean Executive Education OPPORTUNITY PROFILE Associate Dean Executive Education THE ORGANIZATION - ALBERTA SCHOOL OF BUSINESS EXECUTIVE EDUCATION The Alberta School of Business is one of the world s leading institutions in business

More information

POSITION INFORMATION DOCUMENT

POSITION INFORMATION DOCUMENT POSITION INFORMATION DOCUMENT Position Title: Manager, ICT Continuity Planning Classification Code: ASO7 Division: ICT Services Directorate: ICT Operations Type of Appointment: Branch: ICT Security Ongoing

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

Ambulance Victoria. Position Description

Ambulance Victoria. Position Description Position Title: IT Project Manager Team Leader Position Description Division: Information & Technology Department: Solution Delivery Reports To: Manager Solution Delivery Direct Reports: IT Project Managers

More information

Chief Information Security Officer

Chief Information Security Officer Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will

More information

John Smith Washington Street, 11 +1-541-754-3010

John Smith Washington Street, 11 +1-541-754-3010 John Smith Washington Street, 11 +1-541-754-3010 Boston MA 02201-1020 JohnSmith@mail.com United States of America LinkedIn Profile Link CAREER OBJECTIVE To obtain a managerial position in IT support, business

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Municipal Joint Services Board, Lunenburg Region

Municipal Joint Services Board, Lunenburg Region Municipal Joint Services Board, Lunenburg Region Position Job Description: Manager of Human Resources Position Overview: This position plans, manages and oversees the operations and services of Human Resources

More information

Duration: One year with the option of an additional year based on performance.

Duration: One year with the option of an additional year based on performance. Position: Adviser to the Internal Audit Unit Objectives: A person to support the newly established Internal audit unit to transform it from its infancy stage to a unit that is a trusted adviser, and more

More information

HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM

HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM FORTUNE 500 HIGH-TECH EQUIPMENT AND SERVICES COMPANY Process-focused job description indicates low potential for career enhancement and discourages talent from

More information

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities

ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:

More information

COMMUNIQUE. Information Technology (IT) Governance Guidance

COMMUNIQUE. Information Technology (IT) Governance Guidance COMMUNIQUE 14-COM-002 July 14, 2014 Information Technology (IT) Governance Guidance The Credit Union Prudential Supervisors Association (CUPSA) has established an IT Risk Working Group to focus on IT governance

More information

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by: CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)

More information

UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014. Page 1 of 5

UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014. Page 1 of 5 UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014 Each key skill is linked to relevant strategic objectives and/or the Board s Statement of Primary Responsibilities. To assist with the assessment of Board Members

More information

ROLE PROFILE. Performance Consultant (Fixed Term) Assistant Director for Human Resources

ROLE PROFILE. Performance Consultant (Fixed Term) Assistant Director for Human Resources ROLE PROFILE Job Title Reports to Service area No. of staff responsible for Budget responsibility ( ) Performance Consultant (Fixed Term) Assistant Director for Human Resources HR 0 None Purpose of Job

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

Facing Information Security Challenges

Facing Information Security Challenges AKTINA Event Information Security & Cloud Challenges March 17, 2016 Facing Information Security Challenges ISACA Cyprus Chapter Paschalis Pissarides CRISC, CISM, CISA Immediate Past President (2010-2014)

More information

Information Security Governance:

Information Security Governance: Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens

More information

This document includes information about the role for which you are applying and the information you will need to provide with the application.

This document includes information about the role for which you are applying and the information you will need to provide with the application. Further Particulars This document includes information about the role for which you are applying and the information you will need to provide with the application. 1. Role details Vacancy reference: 10481

More information

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

SUMMARY OF POSITION ROLE/RESPONSIBILITIES: SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant

More information

SENIOR INFORMATION SYSTEMS MANAGER

SENIOR INFORMATION SYSTEMS MANAGER CITY OF PORTLAND Multiple SENIOR INFORMATION SYSTEMS MANAGER FLSA Status: Union Representation: Exempt Nonrepresented DEFINITION To plan, manage, supervise and coordinate information systems activities

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement ANNOUNCEMENT NO: 20130411 POSITION: Security Administrator OPENING DATE: April 11, 2013 CLOSING DATE: Open until filled TOUR OF DUTY:

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Position: Director of Learning Technologies Incumbent: Responsible to: Principal Direct Reports: 3 Status: Full-time Classification: Fixed-term contract (5 years) Preamble Pulteney

More information

Project Manager Job Descriptions

Project Manager Job Descriptions Promotion Criteria Position Overview Statement Principal Duties and Responsibilities PROJECT MANAGER Admin Level 4 Typically >8 years in increasing responsible IT leadership role; typically managed one

More information

Kenya Revenue Authority (KRA) Chief Manager - Strategy, Planning and Policy

Kenya Revenue Authority (KRA) Chief Manager - Strategy, Planning and Policy Kenya Revenue Authority (KRA) Chief Manager - Strategy, Planning and Policy Job details Reference Number: KRA/HR01/14 Job Title: Chief Manager - Strategy, Planning and Policy Supervisor: Deputy Commissioner

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

Big Data Engineer Position Description

Big Data Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

SUPERVISOR, SERVICE DESK (Existing position)

SUPERVISOR, SERVICE DESK (Existing position) Edmonton Catholic Schools is now accepting applications for the position of SUPERVISOR, SERVICE DESK (Existing position) Edmonton Catholic Schools is a large urban school district whose mission is to provide

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

IT Consultant Job Family

IT Consultant Job Family JOB TITLE Promotion Criteria Position Overview Statement: Principal Duties and Responsibilities IT Consultant I (may be Support or Admin) Entry level little or no IT experience required; however, experience

More information

Ambulance Victoria Position Description

Ambulance Victoria Position Description Ambulance Victoria Position Description Position Title: Manager Performance Analysis and Data Governance Division: Strategy and Planning Department: Performance Analysis and Data Governance Reports To:

More information

IT Auditor (Excluded) Salary Range: $73,000 - $80,000 (Applied Leadership)

IT Auditor (Excluded) Salary Range: $73,000 - $80,000 (Applied Leadership) IT Auditor (Excluded) Salary Range: $73,000 - $80,000 (Applied Leadership) The search is on. You re searching for challenging and meaningful work. We re searching for qualified CISA,CISM, CISSP or IT experts

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management

More information

BRITISH COLUMBIA INSTITUTE OF TECHNOLOGY POSITION DESCRIPTION. Vice President, Human Resources and People Development

BRITISH COLUMBIA INSTITUTE OF TECHNOLOGY POSITION DESCRIPTION. Vice President, Human Resources and People Development BRITISH COLUMBIA INSTITUTE OF TECHNOLOGY POSITION DESCRIPTION POSITION: DEPARTMENT: REPORTS TO: Manager, Total Compensation and Analytics Human Resources Vice President, Human Resources and People Development

More information

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE EXECUTIVE BEHAVIORAL INTERVIEW GUIDE INTERVIEW GUIDE INSTRUCTIONS: This Interview Guide is intended to help hiring executives conduct behavioral interviews for executive classifications covered by the

More information

CHIEF INFORMATION OFFICER (CIO) San Francisco, California ORGANIZATIONAL OVERVIEW

CHIEF INFORMATION OFFICER (CIO) San Francisco, California ORGANIZATIONAL OVERVIEW CHIEF INFORMATION OFFICER (CIO) San Francisco, California ORGANIZATIONAL OVERVIEW As the University of California's first law school, UC Hastings College of the Law boasts a rich history of achievement

More information

Position Description: Chief Information Officer Department: Information Technology Information Technology FLSA Status: Exempt. Revised: October, 2014

Position Description: Chief Information Officer Department: Information Technology Information Technology FLSA Status: Exempt. Revised: October, 2014 Position Description: Chief Information Officer Department: Information Technology Division: Information Technology FLSA Status: Exempt Location: Griffiss Revised: October, 2014 PURPOSE: I. Assure the

More information

Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax

Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax UFIT Classification Specifications Revised March 20, 2014 Job Title: IT Senior

More information

Corporate Services Directorate Number of staff responsible for 7 Budget responsibility ( )

Corporate Services Directorate Number of staff responsible for 7 Budget responsibility ( ) Role Profile template Job Title Service Desk Manager Barnet Band and scale range BBB 47-50 Reports to Head of IS Service area Corporate Services Directorate Number of staff responsible for 7 Budget responsibility

More information

Business Analyst Position Description

Business Analyst Position Description Analyst Position Description September 4, 2015 Analysis Position Description September 4, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

DevOps Engineer Position Description

DevOps Engineer Position Description Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

Job Description. Project Manager National Clinical Audit & Patient Outcomes Programme (NCAPOP)

Job Description. Project Manager National Clinical Audit & Patient Outcomes Programme (NCAPOP) Job Description Job Title: Reporting to: Responsible for: Project Manager National Clinical Audit & Patient Outcomes Programme (NCAPOP) NCAPOP Programme Manager None Works closely with: Operations director

More information

B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes

B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to 1. contribute to the development,

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

Job description. Job title: Server Infrastructure Analyst 1

Job description. Job title: Server Infrastructure Analyst 1 Job description Job title: Server Infrastructure Analyst 1 Department: Resources Service: IT Service Grade: G Post reference number: 1 Job purpose To provide specialist enterprise level design, planning,

More information

Position Description. NZIC SIEM Analyst. GCSB mission and values. Our mission. Our values

Position Description. NZIC SIEM Analyst. GCSB mission and values. Our mission. Our values Position Description NZIC SIEM Analyst Business unit: Responsible to: Position purpose: Information Technology Security team SIEM Team Leader The Security Information and Event Management (SIEM) Analyst

More information

Position Summary Goals and Worker Activities 40% A. Manage the Data Center Planning and Operations Section.

Position Summary Goals and Worker Activities 40% A. Manage the Data Center Planning and Operations Section. Position Description Department of Administration, Division of Enterprise Technology Management Information Chief - 13530 Data Center Planning and Operations Section Chief Bureau of Infrastructure Support

More information

IT Project Manager III

IT Project Manager III Career Service Authority IT Project Manager III Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs advanced, specialized, professional project management work on one or more medium to large moderately

More information

Ongoing N/A TBC. Baseline

Ongoing N/A TBC. Baseline Position Title: Executive General Manager, Core Services Systems Operations Classification: SES Band 2 Position Number: 1018 Position Status (ongoing/nonongoing): Ongoing Division: Core Services Systems

More information

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement

DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement *** Successful pre-employment criminal, financial, educational and certification background check required *** ABOUT THE D.C. RETIREMENT BOARD: DISTRICT OF COLUMBIA RETIREMENT BOARD Position Vacancy Announcement

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

Skills Framework Light. AXELOS.com. Sept 2015 PUBLIC

Skills Framework Light. AXELOS.com. Sept 2015 PUBLIC Skills Framework Light AXELOS.com Sept 2015 2 Skills Framework Light Contents 1 INTRODUCTION 3 1.1 SOURCES FOR THE SKILLS FRAMEWORK 3 1.2 STRUCTURE OF THE SKILLS FRAMEWORK 3 2 SKILL DEFINITIONS 4 2.1 SKILLS

More information

Derbyshire Constabulary

Derbyshire Constabulary h Derbyshire Constabulary Job Description Closing Date Wednesday 28 October 205 at midday HR Service Centre Contact Rachael Stone Tel int 733 00 Extl 0300 330 330 Role Title Technical Support Manager Grade

More information

Mott Community College Job Description

Mott Community College Job Description Title: Department: Information Technology Services Reports To: Chief Technology Officer Date Prepared/Revised: May 2009/Revised July 2011 Purpose, Scope & Dimension of Job: The role of the Director of

More information

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com

Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate

More information

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO

More information

CLASS SPECIFICATION. Business Intelligence Supervisor

CLASS SPECIFICATION. Business Intelligence Supervisor San Diego Unified Port District Class Code: B843-UE08 CLASS SPECIFICATION FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented GENERAL PURPOSE Under general

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Utica College. Information Security Plan

Utica College. Information Security Plan Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles

More information

JOB DESCRIPTION FORM. Location: A1

JOB DESCRIPTION FORM. Location: A1 JOB DESCRIPTION FORM Job Title: Healthcare Revenue Cycle Manager Location: A1 Job Summary: Reports directly to the Finance Administrator and responsible to develop, plan, organize and implement current

More information