What are the responsibilities and job description for the Chief Information Security Officer position at Jobleads-US?
Job Description
We are seeking a seasoned cybersecurity professional to lead our corporate cybersecurity initiatives. As the Director of Cybersecurity, you will oversee all aspects of cybersecurity, including identity and access management, end-point security, network security, application security, data security, and cloud security.
Key Responsibilities:
- Oversight of identity and access management to ensure secure access to systems and data with a forward-looking view towards a Zero Trust based environment.
- Development and implementation of zero trust strategies to ensure robust security across all surfaces such as data, applications, assets, and services.
- Leadership of end-point security initiatives to protect devices and endpoints from cyber threats.
- Management of network security to safeguard the organization's network infrastructure.
- Ensuring application security by implementing DevSecOps best practices and conducting regular security assessments.
- Oversight of data security measures to protect sensitive information from unauthorized access and breaches.
- Development and maintenance of cloud security protocols to secure cloud-based assets, workloads, identities, and services.
- Management of relationships with Managed Security Service Providers (MSSPs) to ensure effective and efficient security operations.
- Collaboration with other IT teams to ensure seamless integration of cybersecurity measures across all technology initiatives.
Requirements:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Fifteen (15 ) or more years related experience, including ten (10 ) years previous management experience required.
- Strong demonstrable experience in and knowledge of identity and access management, end-point security, network security, application security, data security, and cloud security.
- Proven track record of developing and implementing successful cybersecurity strategies, programs, and/or technologies.