CLASSIFICATION SPECIFICATION FORM
|
|
|
- Antonia Ryan
- 9 years ago
- Views:
Transcription
1 CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information Security Office Information Security Information Technology and Business Transformation cityplace H. R.: DATE: May 2016 A. SUMMARY OF RESPONSIBILITY Security Clearance is required for this position Under the general direction of the Vice President, Information Technology and Business Transformation & Chief Information Officer (CIO), the Executive Director, Information Security Office is responsible for developing and implementing a comprehensive information security program designed to protect information assets and supporting information systems from any unauthorized access, use, disclosure, corruption or destruction. The Executive Director, Information Security Office directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The Executive Director, Information Security Office is a senior-level executive responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected in accordance to the corporate risk tolerance.
2 B. TYPICAL DUTIES Strategic Planning, Development & Execution Leads the development of a long-term Corporate IT Security strategy and programs to ensure information security and information risk management messaging and implementation are aligned on an enterprise-wide level. Monitors integrity, confidentiality and availability of information to ensure it is owned, controlled and processed by the organization. Provides leadership and strategic direction for the function, identifying protection goals, objectives, and metrics that align with the corporate strategic plan. Anticipates threats and opportunities related to corporate reputation, and develops strategies to mitigate risks. Directs, manages, and is accountable for the implementation of IT security components of operational initiatives and projects, from conceptualization and planning through to implementation. Provides strategic direction to related governance functions and stakeholders throughout the organization on information security matters, such as routine security activities, plus emerging security risks and control technologies. Information Security Controls Oversees the corporate information security management system to identify, quantify, catalog, and remedy information security risk across the enterprise and monitors the overall costs. Leads the information security management system governance committee, providing guidance on best-practices, governance and leadership. Responsible for the development and implementation of corporate information security policy, standards, guidelines and procedures to ensure ongoing maintenance of information security. Establishes a centre of excellence for information security management, offering advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively. Creates a framework for roles and responsibilities with regard to information ownership, accountability, and protection. Oversees the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies and applicable laws and regulations to minimize or eliminate risk and audit findings. Responsible for ensuring effective information security awareness, training and educational activities. Responsible for information security activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties. Oversees information security incident response team (ISIRT) planning as well as the investigation of security breaches, and assists with disciplinary and legal matters associated with such breaches as necessary. Responsible for identity and access management governance. Liaises among information security team, corporate compliance, audit, legal, and HR as required.
3 Develops the metrics and reporting framework to measure the efficiency and effectiveness of IT security components of corporate programs and initiatives. Information Risk Management Defines, implements, and is responsible for the organization s global information risk management strategy and framework, collaborating with business units, stakeholders, and committees to get buy-in and build momentum. Oversees the process to administer policy exceptions, ensuring that they are subject to appropriate controls, both before and after approval. Ensures that strategic information security and risk guidance is provided to third-party suppliers in accordance with internal frameworks, and assesses to ensure compliance with required controls. Coordinates and manages any external resources involved in programs, including interviewing and negotiating contracts and fees. Oversees information security risk assessments and controls selection activities. Works with outside consultants as appropriate for independent security audits. Security Architecture and Engineering Ensures that information security architecture standards, policies, and procedures are available and enacted consistently across application development projects and programs. Collaborates with enterprise architecture to define physical, virtual, and logical information security architecture specifications. Collaborates with application owners to understand the risk position around key business applications. Liaises with the enterprise architecture team to ensure alignment between the security and enterprise architectures, coordinating the strategic planning implicit in these architectures. General Leadership Assists the Vice President, Information Technology and Business Transformation & Chief Information Officer with the planning, management, and implementation of corporate information security projects and initiatives. Conducts all activities of an Executive Director, including participation in strategic planning, long- term human resource planning, budgeting, and support for the Information Technology and Business Transformation division. Provides leadership, coaching and direction to direct reports. Provides direction to Security Operations staff and management (currently titled Security, Compliance and Risk Management) by way of a dotted line reporting structure. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives. Represents the corporation at meetings with external organizations, professional and business associations related to Information Security issues and development. Remains current in new technologies, platforms, threats, and risks; actively engages in a defined process to keep current on trends, new practices and new solutions and emerging technologies and threats. Fosters the use of leading-edge business research and analysis for the development of policies and initiatives.
4 Displays leadership by continually motivating, encouraging and inspiring the development of strong, effective, efficient, ethical and professional teams with a clear focus on the delivery of planned outcomes and the continual development of the capabilities and capacities of the individual team members. C. QUALIFICATIONS 1. Education: Bachelor or Master s Degree in Computer Science, Information Systems, Commerce, Business Administration or related field. Completion of one or more of the following professional designations is preferred: o Information security management qualifications such as: CISSP, CISM, CRISC, CISA or other information security credentials. An MBA would be considered an asset. 2. Experience: Ten years of related senior level experience successfully leading comparable information security management and/or related functions (such as an ISMS, IT audit, and IT Risk Management), including five years at a senior management level. Experience must include a minimum of five years managing multiple, large, cross-functional teams or projects, influencing senior level management and key stakeholders. 3. Technical Knowledge & Skills: Solid understanding of the enterprise information security architecture discipline, processes, concepts, and best practices. Knowledge of information security and risk control frameworks such as COBiT, ISO 27001, ITIL, and ISO is preferred. Knowledge of business continuity and IT disaster recovery frameworks such as BS and BS is preferred. Demonstrated personal values aligned with the corporate values, providing a role model for the team. Demonstrated ability to work effectively with a team, delivering high performance and customer satisfaction, in a global, matrix management environment. Strong facilitation skills and a clear ability to build strong relationships with business stakeholders at all levels, including executive managers and vendors. Strong, proven problem-solving skills and the ability to identify, analyze, and resolve problems, driving solutions through to completion. Proficiency in the use of standard software packages, such as Microsoft Word, Excel, and PowerPoint. Strong affinity with technology and an interest in the wider implications of technology. Proven integrity and the ability to handle confidential matters in a professional manner, applying the appropriate level of judgment and maturity. Strong leadership and management skills and recognized as a key strategic thinker. In-depth knowledge of information technology management, including hardware and software.
5 In-depth knowledge of enterprise application and data architecture principles, and associated tools, technologies, methods. Proven capabilities in research, analysis, and a demonstrated ability to interpret and synthesize complex data. Proven capabilities in the area of project management with the ability to plan and manage multiple complex projects simultaneously. Superior oral and written communication skills, with demonstrated ability to clearly convey complex information in a concise and straightforward manner. Excellent interpersonal skills, with experience of superior performance in public speaking and formal presentations. Proven ability to handle conflict and criticism in a positive and professional manner. Proven ability to adapt to, and effectively contribute to, rapid business transformation. Proven ability to work under pressure and meet deadlines. Superior negotiation skills in working with key stakeholders and vendors. 5. Security Clearance Must be able to obtain and maintain the required level of security clearance as a condition of employment in this classification including: Reliability Status: Consent to a Criminal Name Record Check Consent to a Credit Check Secret (Level II) Security Clearance: Consent to a CSIS (Canadian Security Intelligence Service) Indices Check
Chief Information Officer
Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Qulliq Energy Corporation Job Description
Qulliq Energy Corporation Job Description Position Title Senior Enterprise Systems Specialist Unionized Reports to: Manager, Information Technology Reporting to this Position Enterprise Systems Specialist
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
CHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033
CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the
Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance)
Job Description Job Title: Reports to: Team: Location: Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance) BIS Nelson Job Purpose To be responsible the organization
JOB SPECIFICATION. Service Support Manager ORGANISATION CHART: JOB PURPOSE:
JOB SPECIFICATION JOB TITLE: GRADE: Service Support Manager SMP ORGANISATION CHART: JOB PURPOSE: Management responsibility for the Service Support within the Trust delivering an efficient and cost effective
ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Head of Engineering Job Description
Head of Engineering Job Description (Job Code and Level: E006) Definition: Overall responsibility and accountability for the Engineering function across the UK which will include people and budgetary management.
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM
HOW NOT TO ATTRACT AN ENTREPRENEURIAL PM FORTUNE 500 HIGH-TECH EQUIPMENT AND SERVICES COMPANY Process-focused job description indicates low potential for career enhancement and discourages talent from
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure.
Network Operation Manager About the Education Achievement Authority: The Education Achievement Authority is a new statewide school system that will assume operation of the lowest five (5) percent of performing
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
OPPORTUNITY PROFILE. Associate Dean Executive Education
OPPORTUNITY PROFILE Associate Dean Executive Education THE ORGANIZATION - ALBERTA SCHOOL OF BUSINESS EXECUTIVE EDUCATION The Alberta School of Business is one of the world s leading institutions in business
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
SAMPLE Short-form Job Profile
SAMPLE Short-form Job Profile (This profile type is included free with the survey data for each position ordered) Foote Partners, LLC www.footepartners.com Senior Information Security Analyst Assists in
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
S86810, page 1 Manager, Technology Operations Job Description
S86810, page 1 Manager, Technology Operations Job Description Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. FUNCTIONAL
ASAE s Job Task Analysis Strategic Level Competencies
ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management
How To Be A Security Officer
POSITION DESCRIPTION PROPOSED TITLE: Chief Information Security Officer CATEGORY: Administrative ETENDED TITLE: Chief Information Security Officer FLSA STATUS: Exempt GRADE: E JOB SUMMARY: Responsible
Company Synlait Milk Ltd Date: August 2014
Position Reports to Senior Marketing Advisor Marketing and Communications Manager Company Synlait Milk Ltd Date: August 2014 Location 1028 Heslerton Road, Dunsandel, Canterbury Purpose Our marketing champion,
Ambulance Victoria. Position Description
Position Title: IT Project Manager Team Leader Position Description Division: Information & Technology Department: Solution Delivery Reports To: Manager Solution Delivery Direct Reports: IT Project Managers
This document includes information about the role for which you are applying and the information you will need to provide with the application.
Further Particulars This document includes information about the role for which you are applying and the information you will need to provide with the application. 1. Role details Vacancy reference: 10481
SAMPLE JOB DESCRIPTIONS
SAMPLE JOB DESCRIPTIONS In this section we have provided a number of sample job descriptions. We hope that they will provide you with guidance as you develop job descriptions(s). Level Title Page Consultant
Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com
Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management
Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security
Information and Communication Technology
Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication
The ICMCI CMC Competence Framework - Overview
This CMC Competence Framework specifies the cluster of related abilities, commitments, knowledge, and skills that a management consultant should demonstrate in practice in order to successfully complete
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
INFORMATION TECHNOLOGY & MEDIA SERVICES
INFORMATION TECHNOLOGY & MEDIA SERVICES Head of IT Operations Permanent, Full-time Grade SENIOR STAFF: Salary to be determined by the Vice Chancellor De Montfort University is home to more than 27,000
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Job Description Solutions Lead
Solutions Lead Department: Group: Direct Line Manager: Direct Reports: Business Support Manager - Information Services Database Applications Analyst, Technical Business Analyst Delegations: Primary Location:
Big Data Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
SENIOR INFORMATION SYSTEMS MANAGER
CITY OF PORTLAND Multiple SENIOR INFORMATION SYSTEMS MANAGER FLSA Status: Union Representation: Exempt Nonrepresented DEFINITION To plan, manage, supervise and coordinate information systems activities
Chief Information Security Officer
Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will
IRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Project Manager Job Descriptions
Promotion Criteria Position Overview Statement Principal Duties and Responsibilities PROJECT MANAGER Admin Level 4 Typically >8 years in increasing responsible IT leadership role; typically managed one
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes
B408 Human Resource Management MTCU code - 70223 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to 1. contribute to the development,
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:
CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact [email protected] http://www.uxcconsulting.com.au This summary
Business Logistics Specialist Position Description
Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
POSITION INFORMATION DOCUMENT
POSITION INFORMATION DOCUMENT Position Title: Manager, ICT Continuity Planning Classification Code: ASO7 Division: ICT Services Directorate: ICT Operations Type of Appointment: Branch: ICT Security Ongoing
Ambulance Victoria Position Description
Ambulance Victoria Position Description Position Title: Manager Performance Analysis and Data Governance Division: Strategy and Planning Department: Performance Analysis and Data Governance Reports To:
Senior Payroll Officer / Accounts Administrator. 1028 Heslerton Road, Dunsandel, Canterbury
Position Reports to Senior Payroll Officer / Accounts Administrator Accounting Company Synlait Milk Ltd Date: January 2015 Location 1028 Heslerton Road, Dunsandel, Canterbury Purpose Payroll: To provide
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
Work Toward Your Bachelor s Degree
By completing a series of Walden s Professional Development courses, you can earn credits toward a number of bachelor s programs at Walden University. To receive credit, you will need to complete all of
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Competency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
DevOps Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
SUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
IT Consultant Job Family
JOB TITLE Promotion Criteria Position Overview Statement: Principal Duties and Responsibilities IT Consultant I (may be Support or Admin) Entry level little or no IT experience required; however, experience
Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax
Human Resource Services PO Box 115009 Classification and Compensation Gainesville, FL 32611-5009 352-392-2477 352-846-3058 Fax UFIT Classification Specifications Revised March 20, 2014 Job Title: IT Senior
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas
POSITION DESCRIPTION Position Title Manager, Technical Services Support Position Number Reports to Manager Technology Services Functional Auth HRM Auth Region IT Services Centre Head Office Date Feb 2011
UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014. Page 1 of 5
UNIVERSITY BOARD SKILLS REVIEW MATRIX 2014 Each key skill is linked to relevant strategic objectives and/or the Board s Statement of Primary Responsibilities. To assist with the assessment of Board Members
Business Relationship Manager Position Description
Manager Position Description February 9, 2015 Manager Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
IT Project Manager III
Career Service Authority IT Project Manager III Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs advanced, specialized, professional project management work on one or more medium to large moderately
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799
Canadian ISO 17799 User Group Conference Sun Life Financial s Experience with Security Governance & ISO 17799 Deloitte & Touche, 79 Wellington West, 20th Floor Toronto, ON 30 January 2004 D.A. Stolovitch,
Business Intelligence Engineer Position Description
Business Intelligence Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Business Analyst Position Description
Analyst Position Description September 4, 2015 Analysis Position Description September 4, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Business Intelligence Analyst Position Description
Business Intelligence Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Role Description Enterprise Architect and Solutions Delivery Manager
Role Description Enterprise Architect and Solutions Delivery Manager Cluster Agency Division Location Classification/Grade/Band Kind of Employment NSW Health Cancer Institute NSW Information Technology
OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:
OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,
SUPERVISOR, SERVICE DESK (Existing position)
Edmonton Catholic Schools is now accepting applications for the position of SUPERVISOR, SERVICE DESK (Existing position) Edmonton Catholic Schools is a large urban school district whose mission is to provide
