JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.



Similar documents
Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

BUSINESS CONTINUITY PLANNING

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Physical Security Services

FFIEC Cybersecurity Assessment Tool

11/12/2013. Role of the Board. Risk Appetite. Strategy, Planning and Performance. Risk Governance Framework. Assembling an effective team

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) Fax: (718)

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

BUSINESS CONTINUITY POLICY

CYBER SECURITY GUIDANCE

White Paper on Financial Institution Vendor Management

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Vendor Risk Management Financial Organizations

DTCC RISK COMMITTEE CHARTER

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012

CLASSIFICATION SPECIFICATION FORM

Federal Bureau of Investigation s Integrity and Compliance Program

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Homeland Security for Schools: Threat Status Alert Worksheet

Legislative Language

Global Security Program Overview

Regulatory Compliance Management for Energy and Utilities

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

CyberSecurity Solutions. Delivering

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

Audit of NRC s Network Security Operations Center

BCP and DR. P K Patel AGM, MoF

Business Continuity Management Framework

Business Continuity Management

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

El Camino College Homeland Security Spring 2016 Courses

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Organizational Security Track FAQ

The Next Generation of Security Leaders

ICBA Summary of FFIEC Cybersecurity Assessment Tool

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Enterprise Security Tactical Plan

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

Global Statement of Business Continuity

National Cyber Security Policy -2013

Purpose of the Governor s strategy. Guiding Principles

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Italy. EY s Global Information Security Survey 2013

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Standards for the Professional Practice of Internal Auditing

Cybersecurity Enhancement Account. FY 2017 President s Budget

Business Continuity Position Description

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Travel Emergency, Risk Mitigation, and Duty of Care Considerations and Tools for Today s Challenging World

Internal Auditing: Assurance, Insight, and Objectivity

PRIORITIZING CYBERSECURITY

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Business Continuity Policy and Business Continuity Management System

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Birmingham CrossCity Clinical Commissioning Group. Business Continuity Management Policy

Cybersecurity The role of Internal Audit

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

OCCUPATIONAL STANDARD (For use in the development of supply chain related job descriptions, performance evaluations, career development plans, etc.

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Emergency Preparedness: Learning Objectives. Minimizing and Controlling Future Disasters. SHRM Disaster Preparedness Survey 3.

CORE Security and GLBA

Company Management System. Business Continuity in SIA

Introduction. Special thanks to the following individuals who were instrumental in the development of the toolkits:

Database and Marketing Insight Officer

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02

NATIONAL CYBER SECURITY AWARENESS MONTH

The PNC Financial Services Group, Inc. Business Continuity Program

BUSINESS CONTINUITY MANAGEMENT FRAMEWORK

Business Continuity and Disaster Planning

Business Continuity Management Governance. Frank Higgins Abu Dhabi March 2015

ACCOUNTING CLERK Position Code: PRAC. ASST. AIRCRAFT TECHNICAL SPECIALIST Position Code: PRAATS. BUSINESS ANALYST Position Code: PRBA

Address C-level Cybersecurity issues to enable and secure Digital transformation

Aligning Compliance Program Priorities with Business Objectives

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

Executive Management of Information Security

LAW ENFORCEMENT PROGRAM ACCREDITATION MANAGER (PROGRAM SPECIALIST 4)

INFORMATION SECURITY STRATEGIC PLAN

OCC 98-3 OCC BULLETIN

ASSE On-Site Seminar Course Selections

Transcription:

JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President and is accountable for the development and execution of the organization s global security risk management strategy and related programs. Specifically, this position is responsible for four dimensions of security risk management with respect to the viability and survivability of the enterprise: Financial, Operational, Compliance, and Strategic. The position will lead global programs to safeguard people, assets and information systems, mitigate physical risk and manage loss prevention. The Vice President and Chief Security Risk Officer will convene an enterprise security risk management council or committee to enhance whole ofenterprise security risk management. The Vice President and Chief Security Risk Officer is responsible for (1) providing regional security teams globally with the necessary standards, processes and guidance to ensure consistent implementation of established security programs and (2) serving as the focal point for security enterprise wide. Knowledge Extensive knowledge and experience is required in the security industry including security of personnel, assets, information systems (corporate and Industrial Control System), loss prevention, travel, and incident response. Knowledge of federal and international government security agencies and contacts is desired. Knowledge of natural gas / Liquefied Natural Gas (LNG) industry is desired. Critical Domains of Knowledge The Chief Security Risk Officer should be familiar with the following corporate security domains: 1. Program Development: Every critical domain, including program strategy and structure; leadership, staffing and organization; finance and budget 1420 Beverly Road 888 733 5007 5000 Birch Street 1

management; policies, procedures and protocols; technologies and technical systems; physical security; awareness; training; stakeholder communication; enterprise security risk management; and benchmarking against organizations comparable in risk, size, industry focus and business model. 2. Communications, Monitoring and Intelligence: Develop and later monitor command center operations, communications, and protective intelligence collection and analysis. 3. Emergency Preparedness: Understanding of planning frameworks, such as the National Response Plan, to prevent/mitigate, prepare, respond and recover from security events, worldwide, including but not limited to acts of targeted violence. 4. Security Continuity of Operations and Disaster Recovery: Planning required to achieve three elements as relates to information security or physical security event(s): organizational resilience, recovery and contingency. 5. Executive Protection: Planning, designing implementing, and overseeing a highly customized protective security program that reflects the goals, preferences, lifestyle and privacy of the executive afforded protection. Key areas range from trip logistics, transportation, and advances to residential security, protective intelligence and counter surveillance. Understanding the thinking and behavior of individuals who have attacked or approached prominent public figures in the United States. 6. Physical and Facilities Security: From access control and CCTV systems, to perimeter security and physical security personnel, to mail and delivery processing. 7. Information Security/Cybersecurity: Planning, designing, and managing a sophisticated information security program, including physical and cybersecurity elements, that accounts for the risk profile and risk tolerance of the company. Key areas include risk management (familiarity with ISO27001, SANS 20 Critical Security Controls, NIST 800 37, and/or NIST Cybersecurity Framework), whole of enterprise governance, strategy, policies and procedures, technology, technical incident response oversight, and crisis management. 8. Domestic and International Travel: Provide and continually update travel related security bulletins, alerts, tips and guidance for company 1420 Beverly Road 888 733 5007 5000 Birch Street 2

employees on business travel, and manage appropriate security functions for personnel on business travel. In the next three years, travel is anticipated to include select executives traveling to over 15 countries primarily in the Americas, Europe, and Asia, with key offices in the United States and United Kingdom. 9. Workplace Violence Prevention and Threat Assessment: Companywide initiatives including active shooter planning, behavioral threat assessment, threat management strategies and support, policy development, threat assessment team management, and employee training and awareness. 10.Open Source Monitoring and Protective Intelligence Collection: Knowledge of how to enhance a program to leverage online research, assessment and monitoring of multiple websites, online discussions, chat rooms, message boards, talkbacks and dozens of other forums to uncover issues impacting the company, its assets, employees, brands and reputation. Understanding about how to enhance this program and integrate it with other security program components. 11.Major Event Security: Planning and coordinating security for major corporate events (estimated ~three per year) and ensuring the security of all participants and stakeholders 12.Internal Investigations: Areas such as libelous accusations, compliance violations, employee misconduct, fraud and misrepresentation and other internal affairs. 13.Background Screening: Monitoring of enterprise wide background screening policies for pre employment, current employees, and contractors. Familiarity with the necessary scope of background checks required for comprehensive screening. 14.Aviation Security: All aspects of aviation security, both domestically and internationally. Responsibilities and Essential Duties Essential Duties and Responsibilities Strategy Design and Implementation: In close collaboration with senior business and functional leaders, develop a formal, documented, risk driven global security strategy. Ensure that, at minimum, the strategy (1) defines the program s mission, vision, risk basis, goals, organizational chart and structure, 1420 Beverly Road 888 733 5007 5000 Birch Street 3

strategic program components, special focus areas, and the processes and resources required to maintain and improve the program over time; and, (2) establishes clear and specific operational priorities to achieve these goals within a three to five year period. Oversee its day to day implementation across the enterprise. Risk Assessment and Information Gathering: Understand and assess the risks, threats and vulnerabilities confronting the organization and continuously align business and security resources behind these in a prioritized, risk driven manner. Gather intelligence and information to assess the risk and exposure of company assets, information, and personnel in the countries, cities and areas in which assets, information, and people are located and business is conducted. Monitor, on a continuous basis, all security threats (such as terrorist incidents, significant protests or civil disturbance, and other country specific security events) with potential implications for the program s protective and due diligence mission and objectives. Analyze business and global trends, including by market and geography, in type and level of security risks facing the company s global operations to determine and implement programs to mitigate risk into the strategic planning processes for the operations. Advise management on security issues and risks that may threaten personnel or assets. Organizational Resilience and Preparedness: Lead and direct the organization s preparation for events that could disrupt the continuity of business operations including targeted attacks (e.g., physical, cyber, informational); and criminal activity (e.g., fraud, embezzlement, theft). In addition to continuity of operations with regard to security incidents, oversee the company s global emergency response and crisis management communication as it pertains to response to a cyber or physical attack. As part of this focus, undertake a robust approach to security incident prevention, response, management and recovery. Provide leadership during times of crisis. Proactively develop programs for risk reduction and response to local, regional and global threats. Participate on the company s Business Continuity Plan and Emergency Management s Team, leading these issues with regard to security incidents. Develop and maintain an effective enterprise wide security incident management tracking and response system. 1420 Beverly Road 888 733 5007 5000 Birch Street 4

Represent the company on security matters including audits and investigations, involving varied operations (corporate, facilities, pipelines, chartered and/or owned vessels). Protection of Human Capital, Core Assets, Information and Reputation: Ensure the security of the organization s financial, physical and intangible assets through a balanced, holistic and integrated approach to the following: People: Identify, develop and maintain the skills and capabilities of the internal and external security personnel assigned to the corporate security program at a best practice level, including implementing training programs for security and non security personnel globally regarding pertinent security or risk mitigation topics. o Provide the regional security teams with the tools, processes and training requirements to manage security proactively including development of response teams and contingency plans. o Develop security plans for global corporate travel, events, and business activities. o Review and coordinate executive and personnel travel protection. Process: Define, develop and implement global security policies, protocols, procedures and guidelines as they pertain to all facets of security risk management. Develop and implement policies and procedures to mitigate known and anticipated risks to personnel, assets, and information, related to personnel protection, facility protection, information security, cybersecurity, workplace violence, loss prevention, travel, and security emergency response. Technology: Maintain and implement technology and state of the art equipment related to providing world class security risk management services. Advise and oversee facilities and offices to evaluate the adequacy of their security systems, programs and staffing; recommend improvements; and assist with the implementation of the improvements, as needed. Compliance: Oversee, or where appropriate support, the organization s compliance with foreign, national, state and local regulatory requirements with respect to areas such as security, data privacy, data protection, and Critical Infrastructure Protection (CIP) standards. Financial Planning, Budgeting and Performance Tracking: Manage, plan and forecast the operational and capital budgets for the global security program. 1420 Beverly Road 888 733 5007 5000 Birch Street 5

Track program performance using an organized and systematic methodology of metrics, measurement and security scorecards. Enterprise Security Risk Management: Coordinate whole of enterprise security risk management through a council or committee, likely including senior representatives from Information Technology, Legal, Operational, Human Resources/Facilities and Business/Marketing departments. Stakeholder Relations: On issues related to security risk management, serve as the company s chief liaison resource and maintain effective liaison with all internal and external stakeholders in the viability and success of the enterprise, including foreign, national, state and local law enforcement, intelligence, homeland security and industry regulatory agencies and their representatives as well as, where appropriate, media, investors, shareholders and strategic business partners to remain aware of the degree of any threat and the recommended mitigation measures. Qualifications (Education, Experience, and Skills): Expertise, Skills and Abilities The qualifications listed below are essential: Exceptional leadership skills including visioning, strategic planning and critical thinking. Expertise in achieving high performance results in a diverse global corporate environment including business and financial analytical capabilities and the ability to communicate, collaborate and earn trust with internal stakeholders across the company s functions, divisions, business units and regions. Strong network of security resources, security industry contacts, and established relationships around the world, both with government and in the corporate sector; an extensive first hand knowledge of various cultures and business practices worldwide; and an acute understanding of the commonalities and differences in addressing corporate security objectives and imperatives in both U.S. and non U.S. environments. Expertise in managing and directing security staff and support personnel in the operational administration of corporate security and executive protection duties. Ability to stay current with the laws, regulations and guidelines pertaining to the company s industry and an ability to understand precisely how 1420 Beverly Road 888 733 5007 5000 Birch Street 6

these evolving mandates impact the objectives, protocols and practices of the corporate security team. Ability to prepare clear and succinct written and oral communications for presentation to the company s board and senior management team. Ability to persuade and influence internal partners in matters associated with corporate security programs or initiatives. Proven track record in building, motivating and leading a professional team attuned to organizational culture, responsive to business needs and committed to integrity and best practices. Ability to work under pressure in stressful, high profile, sensitive and rapidly changing situations. Ability to maintain a positive relationship with principals, families and executive assistants regarding personal safety and security related matters and training, as well as administrative support personnel and others who play key roles in logistical planning of executive travel. Discretion as well as demonstrated experience in maintaining utmost confidentiality and privacy. Education and Experience The candidate must possess a minimum of 15 years experience in working and/or leading, at a senior level, a corporate or government security program, or both. Ten years experience in a corporate security environment, or commensurate senior security risk management experience, is strongly desired. Advanced education is a plus and enhances the candidate s credentials. BA, BS, and Degrees in law, business administration, accounting and finance, security management, homeland security, information systems management or law enforcement and public safety are preferred. Knowledge of U.S. federal and international government security agencies is desired. The combination of experience and education should be taken into consideration. Memberships, Licenses and Certifications Active membership in recognized security organizations such as American Society for Industrial Security (ASIS), International Security Management Association (ISMA) or other professional security associations is desired. Language and Computer Literacy Skills Fluency in English is a requirement. Fluency in additional languages is encouraged. The candidate must have proficiency in Microsoft Office applications such as Excel, Word, and PowerPoint. 1420 Beverly Road 888 733 5007 5000 Birch Street 7

Skills/Competencies: Excellent understanding of corporate security best practices Strong strategic, analytical and decision making skills Ability to communicate complex concepts clearly Ability to plan, coordinate and lead the work of others Strong knowledge of the security industry, including best practices in physical, technical, personnel, information, legal, and administrative security disciplines Experience in creating tools and processes and leading change in a high tech corporate environment Knowledge of current and emerging security technology and integrated security systems Knowledge of investigative techniques and best practices Proven leadership and organizational skills with a practical, operational sense International experience Significant knowledge of federal and international government security community and contacts Direct Reports The CSRO will have significant discretion to build the corporate security risk management team. Direct reports likely include a deputy Security Director or IT Security Director, Guard Force Security Director, Security Analysts, Security Compliance Director, and others as the corporate security function develops. Freedom to Act Ability to multi task and function in a highly dynamic atmosphere; must exercise discretion independently. Work Conditions Job is performed in a typical office environment but is subject to time pressures and constraints and is often dependent on input from others. Occasionally, work may be performed from home, after normal work hours or on weekends. Periodic travel as business requires. Must also be able to respond on short notice to manage international security and medical crisis 1420 Beverly Road 888 733 5007 5000 Birch Street 8

intervention, if required. Subject to drug and alcohol testing, per applicable federal regulations or as required by Cheniere. ADA Job Requirements Reasonable accommodations will be made to ensure that the essential functions of the job can be performed and not hinder the employee's performance due to physical, mental or emotional disability. Miscellaneous It is important for the individual to have multiple recommendations speaking to their character, ethics, professionalism, and discretion. Qualified candidates should apply by sending an email to susan.andress@red5security.com with the job title in the subject line. The email should include a cover letter and a resume (in MS Word format). Red Five Security is an equal opportunity employer and actively seeks candidates from a diverse background. Posted: May 2015 1420 Beverly Road 888 733 5007 5000 Birch Street 9