Skip to Main Content
Chief Information Security Officer (CISO)
Addison Group Austin, TX

Chief Information Security Officer (CISO)

Addison Group
Austin, TX
  • Full-Time
Job Description

Chief Information Security Officer (CISO)


Reporting to the CIO, the Chief Information Security Officer (CISO) is a key role on the

leadership team of the IT department. This position is responsible for the security

of data and information assets. This role has purview over the operational day-to-day measures used to secure data, applications and infrastructure. This role also owns the strategic

initiatives undertaken to continually enhance information security posture.

The CISO will be responsible and accountable for the successful implementation of

well-defined security related projects, and the operational practices related to

information security.

Description of Duties and Tasks


1. Leading and successfully completing projects aimed at improving

security posture with minimal supervision. Success means full scope of work

completed on time, within budget and aligned with established acceptance criteria.

2. Building out and maintaining an information security team that is able to satisfy the

cybersecurity needs

3. Mitigating risks associated with data breaches and data leaks.

4. Establishing, maintaining and continuously testing infrastructure aimed at

operational recovery from outages related to cybersecurity incidents.

5. Continual testing of the environment for security vulnerabilities.

6. Staying current on risks and trends in the world of cybersecurity and reporting on

such to the leadership team.

7. Providing overall day-to-day direction to a team of information security

professionals and 3rd party providers.

8. Contributing to the development of the technology roadmap.

9. Partnering with peers, both within and outside of the IT department to accomplish

shared goals.

10. Defining goals for the teams reporting to the CISO based on the goals of the

broader IT organization.

11. Ensuring team goals are met and work is successfully completed (teams are meeting

established operational targets)

12. Defining the operating model for the information security team using the ITIL

framework and ITSM tools.

13. Reporting data in various formats showing the performance of the information

security team and making recommendations for changes/improvements as needed

to enhance performance.

14. Providing leadership and coaching for InfoSec team members as needed.

15. Establishing and managing relationships with 3rd party product and service

providers as needed to accomplish defined goals.

16. Acting as technical sponsor for all projects within your areas of responsibility.

17. Ensuring information security project requirements, scope, budgets and timelines

are well-defined.

18. Ensuring security projects are well-managed and are being executed as per

established expectations.

19. Administrative aspects of people management for the InfoSec team including, but

not limited to absence approval, performance management, hiring and termination.

20. Managing the operating budget for the InfoSec team as well as budgets for

cybersecurity related projects.

21. Establishing and/or maturing formal standards and practices in the following areas:

a. Identity & Access Management (IAM)

b. Secure data capture

c. Secure data storage, transfer and retrieval

d. Data security policy development, training and risk management

22. Other related duties as assigned.

Knowledge


● Strong working knowledge of various data security frameworks, including NIST, ISO

and SOC.

● Working knowledge of a wide range of technologies and best practices in securing

them, including working knowledge of key concepts in:

a. Database encryption

b. Integration security

c. Server security and patch management

d. Firewalls and network security

e. Application security

f. Mitigating common infrastructure vulnerabilities

● Expert knowledge of the key concepts in user and identity access management.

● Working knowledge of security governance risk and compliance (GRC).

● Working knowledge of the concepts of data privacy regulations, including FERPA

requirements or similar regulated data classifications.

● Knowledge of best practices in security training and awareness.

● Strong knowledge of tools and techniques for data security and data recovery.

● Working knowledge of technology budget planning and budget management

concepts is critical.

● Knowledge of standard accounting practices.

● Knowledge of formal PMI-based project management practices.

● Knowledge of ITIL-based IT Service Management (ITSM) concepts.

Skills


● Extremely strong people management skills are required

● Demonstrated expertise in IT project planning, development and implementation.

Must be able to own multiple initiatives as a project sponsor and see them through

to completion.

● Highly skilled at vulnerability assessment, testing and reporting.

● Managing external partners in the completion of project work as well as outsourced

operational work.

● Strong business and financial acumen.

● Demonstrated expertise is various aspects of data security including access

management, data obfuscation and data breach avoidance.

● Excellent analytical, conceptual thinking and strategic planning skills.

● Influencing skill, including the ability to show the business value of technical

initiatives or extrapolate conceptual technical solutions for business problems such

that non-technical audiences can see that value.

● Must be a self-starter who can not only operate with minimal direction, but who

can also bring new ideas to the table and successfully lead and complete approved

initiatives with minimal supervision.

● Maintaining an established work schedule.

● Effectively using interpersonal and communications skills.

● Effectively using organizational and planning skills with attention to detail and

follow-through.

● Maintaining confidentiality of work-related information and materials.

● Establishing and maintaining effective working relationships, including the ability to

coordinate the work of others.

Required Work Experience

● 7+ years of experience in Information Security roles of progressively increasing

responsibility.

● 4+ years of related work experience leading a Cybersecurity organization.

● 3+ years experience in a technology leadership role where both project and

operational budgeting was a key component of the job.



Required Education

● Bachelor's degree

● Experience cannot be substituted for required, applicable educational level.


Address

Addison Group

Austin, TX
USA

Industry

Technology

Posted date

Over a month ago

How can the hiring manager reach you?

By clicking the button above, I agree to the ZipRecruiter Terms of Use and acknowledge I have read the Privacy Policy, and agree to receive email job alerts.

Addison Group job posting for a Chief Information Security Officer (CISO) in Austin, TX with a salary of $117,000 to $166,000 Yearly with a map of Austin location.