Information Security Director jobs in Ohio

Information Security Director establishes and administers the overall strategies and procedures for the information security function. Develops and implements information security and disaster recovery programs in accordance with organizational information security standards. Being an Information Security Director evaluates information risk on a regular time schedule and promotes information security awareness within the organization. Requires a bachelor's degree or its equivalent. Additionally, Information Security Director typically reports to top management. The Information Security Director manages a departmental sub-function within a broader departmental function. Creates functional strategies and specific objectives for the sub-function and develops budgets/policies/procedures to support the functional infrastructure. Deep knowledge of the managed sub-function and solid knowledge of the overall departmental function. To be an Information Security Director typically requires 5+ years of managerial experience. (Copyright 2024 Salary.com)

B
Director, Information Security and Compliance
  • Bibibop Asian Grill
  • Columbus, OH FULL_TIME
  • Overview

    General Summary: The Director of Information Security and Compliance is responsible for providing strategic and operational leadership for the company’s security management of data, technology, processes, and risks, coordinating alignment across the enterprise, including the Information Technology department and operational business units.  The role establishes and sustains a cyber risk strategy fit with business objectives, implementing a framework that integrates governance and risk compliance controls, requirements, oversight, and validation into Information Technology operations and underscores vigilance across business units. Accordingly, the position, led from depth of technical expertise in holistic enterprise architecture and technologies across security disciplines, is responsible for developing and championing the structure, methods, tools, and metrics for managing cyber risk, ensuring effective and evolving technological defenses, monitors, reporting, and operational processes, including anchoring incident management.  Applying wield of wide and deep technical, procedural leadership, and executive persuasion, the role ensures continuous activation and refinement of the implemented comprehensive framework and tactics against clearly defined thresholds that manage information security, privacy, and technology risks across the enterprise’s business units, network, data, intellectual property, and cloud and federated services from unauthorized breach, disclosure, or loss.  The role ensures the security program is appropriately funded/budgeted and is measured/reported for efficacy and for legal/regulatory compliance.

    Reports to: Chief Information Officer

     

    Essential Duties and Responsibilities:

    • Leads the development of the Information Security strategy, its operational model, and technical tooling from clearly demonstrated technological prowess spanning across all security domains and all layers of enterprise architecture. Validates the strategy and tactics’ adoption, through technical credibility and persuasion, with appropriate stakeholders across business units and reports efficacy in fashion relatable to audiences of all levels.  Monitors progress of the Information Security Strategy and activates evolution on regular basis.
    • Leads the architecting, development, and implementation of technical/engineered services and the shaping and implementation of operational processes. Provides guidance and oversight of defensive, monitoring, compliance, and reporting tools. 
    • Obtains input from functional partners and external experts into provided thought-leadership toward galvanizing the design, development, and adoption of the conceived and implemented strategy and tactics, including continuously evolved security tools and procedures in a best-practice mindset fit for the enterprise. Accountable for periodically updating the strategy, tactics, and tools.
    • Establishes and monitors budget for implementation of the security operations function.
    • Establishes key Information Security reporting metrics.
    • Recommends risk avoidance strategies, risk mitigation actions and controls to the enterprise and affiliated business units.
    • Establishes and manages a formal process to create, review, and update Information Security Policies and Standards with various stakeholders, including HR and Legal.
    • Monitors changes in laws and regulations in coordination with Legal that may affect the enterprise and affiliated business units’ Information Security.
    • Manages policy and standards exceptions processes.
    • Tracks and reports on policy and standard exceptions.
    • Consults, answers questions, and provides clarity to Information Security Policies and Standards.
    • Establish and sustain organization-wide security technology standards, governance procedures, and performance metrics/monitors to ensure continuous preparation and management of cyber security threats, protecting the company’s information assets.
    • Direct the assessment of business and technology risks to ensure they are appropriately identified, evaluated, and profiled for mitigation.
    • Identify, select, tailor, and implement underlying security processes, leveraging existing frameworks such as NIST, CIS, IS27001, and COBIT as appropriate, to mitigate persistent threats and meet Information Security objectives adopted by the organization.
    • Provide management oversight to all activities related to technology compliance with audit requirements such as PCI and SOX, ensuring that technology best practices are being followed for Information Security.
    • Establish monitoring and compliance tools to complement implemented safeguard processes.
    • Establish formal Preparedness/Incident/Data Breach Response plans and sub-teams, chairing constructs and leading activities as outlined.
    • Develop a best practice disaster recovery program to ensure technology availability and operations continuity following an interruption in service caused by a system outage or declared disaster.
    • While an individual contributor role to begin, shapes the business case for and constructs of a evolved security operations team over time. Over the course of time, attract, recruit, and retain members of an information security team, executing management functions, such as salary administration, succession planning, and performance management toward progressive development of skills, capabilities, and culture of teamwork. Develop out-year roadmap/plans for addressing future cyber threats and future strategic initiatives.
    • Develop communication strategies for informing employees of cyber security initiatives.
    • Continually seek and consider innovative solutions to business problems spurred by security risks and apply as relevant in support of the organization’s mission.
    • Build and maintain effective relationships across company business units toward maintaining awareness and alignment of business and information security objectives.

     

     

    Required Skills and Competencies:

    • Roots in a development, infrastructure, or architecture capacity, applied knowledge of the components across enterprise architecture, and wield of end-to-end IT operations, particularly in a “Plan”, “Build”, “Run” model driven by enterprise release management. Depth in technological and procedural aspects related to information security management, attained via experience in a progressively widened domain. 
    • Understanding of information security risk assessment and risk management procedures/methodologies, proven through leading implementation in previous role. Track record of developing and implementing comprehensive strategic response and recovery strategies, plans, and procedures.
    • Depth in:
      • IT Governance Risk and Compliance (GRC), Cyber Risk Reporting
      • Establishment of Key Risk and Key Performance Indicators, Incident Readiness and Incident Recovery
      • Information security technologies, markets, and vendors including firewall, intrusion detection, assessment tools, encryption, certificate authority, web, and application development
      • Audit and assessment methodologies, procedures and best practices that relate to information networks, systems, and applications
      • Applicable practices and laws relating to data privacy and protection.
      • Application security, database technologies used to store enterprise information, directory services, financial information, and information systems auditing
      • Applying current and emerging security technologies to solve business problems.
      • Cloud platforms, particularly Microsoft Azure
    • Experience shaping strategy and roadmaps and leading activation development. Shaping experience should include NPV-based business case framing/justification for investments.
    • Ability to correlate enterprise risk with appropriate administrative, physical and technical security controls
    • Strong knowledge of industry and regulatory requirements (i.e., PCI, SOX, Safe Harbor)
    • Require one of the following certifications: CISSP, CISM, CISA or industry equivalent
    • Familiarity with GDPR
    • Excellent problem solving and root cause analysis skills
    • Strong verbal and written communication skills, especially in the areas of presentation and interaction with people at all levels across an organization; contributor and executive -level persuasion skills via development relationship across strata, including executives, law enforcement, legal, and HR
    • Experience outling organizational structure against operational framework in manner that drives clear accountability and sustained efficacy through development and succession planning
    • Experience leading information security teams through proven technical and operational knowledge and inspiring/raising capability through mentorship and individual development; ability to lead through influence, cultivating strong, positive team relations throughout the organization to align interests, collaborate, and achieve results
    • Track record successfully managing programs involving cross-functional people, both internal and external, demonstrating complex project/vendor/change management skills; experience shaping and leading a cross-functional Information Security Steering Committee or similar construct
    • Agile, versatile, flexible and the ability to work with constantly changing priorities.

     

     

    Qualifications

     

    Experience and Education:  

    • 15 years of progressive experience in Information Technology across “Plan”, “Build”, “Run” components; minimum 10 years of IT management/leadership experience with 5 years in a role with information security responsibility.
    • Bachelor of Science Degree in Engineering Technology, Computer Science, or related/equivalent.
    • Advanced degree in technology (computer science/engineering or related field) preferred.
    • Some level of six sigma qualification desirable.
    • Formal Information Security Management certification: CompTIA Security , CISSP, CISM, CISA, and/or CEH.
    • CISO experience preferred

     

  • 5 Days Ago

C
Director, Information Security and Compliance
  • Charleys Philly Steaks
  • Columbus, OH FULL_TIME
  • Overview General Summary: The Director of Information Security and Compliance is responsible for providing strategic and operational leadership for the company’s security management of data, technolog...
  • 5 Days Ago

L
Director, Information Security and Compliance
  • Lennys Grill & Subs
  • Columbus, OH FULL_TIME
  • Overview General Summary: The Director of Information Security and Compliance is responsible for providing strategic and operational leadership for the company’s security management of data, technolog...
  • 5 Days Ago

G
Director, Information Security and Compliance
  • GOSH
  • Columbus, OH FULL_TIME
  • Overview General Summary: The Director of Information Security and Compliance is responsible for providing strategic and operational leadership for the company’s security management of data, technolog...
  • 5 Days Ago

U
Information Security Director - Cyber Threat Intelligence
  • U.S. Bank National Association
  • Cincinnati, OH FULL_TIME
  • At U.S. Bank, we’re on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow and succee...
  • 2 Days Ago

U
Information Security Director - Cyber Threat Intelligence
  • U.S. Bank
  • Cincinnati, OH FULL_TIME
  • Job DetailsAt U.S. Bank, we're on a journey to do our best. Helping the customers and businesses we serve to make better and smarter financial decisions and enabling the communities we support to grow...
  • 2 Days Ago

E
Sports Information Director
  • Evergreen State College
  • Olympia, WA
  • Position Purpose This position is responsible for managing sports information for Evergreen’s intercollegiate athletics ...
  • 6/11/2024 12:00:00 AM

I
Associate Client Information Director
  • IQVIA, Inc.
  • Parsippany, NJ
  • Internal Job Description Overview IQVIA™ (www.IQVIA™.com) is the world's leading company providing information, technolo...
  • 6/11/2024 12:00:00 AM

T
Security Analyst
  • The Phoenix Group
  • Boston, MA
  • Responsibilities: Contribute to the ongoing development and improvement of the firm’s governance, risk management, and c...
  • 6/10/2024 12:00:00 AM

T
Information Security Engineer
  • Trulieve
  • Job Title: Information Security Engineer Department: Information Security Location: Remote Reports to: Information Secur...
  • 6/10/2024 12:00:00 AM

S
Director of Cyber Security
  • Smith Arnold Partners
  • Very unique Cybersecurity leadership opportunity. Chance to evaluate and financial focused organizations cybersecurity p...
  • 6/9/2024 12:00:00 AM

A
Technical Security Project Manager - (B4)
  • Applied Materials, Inc.
  • Santa Clara, CA
  • Title: Technical Security Project Manager Location: Santa Clara, California Reports to Director - Global Security Techni...
  • 6/8/2024 12:00:00 AM

C
GRC Analyst
  • Cypress HCM
  • Boston, MA
  • Governance, Risk, and Compliance Analyst Location: Boston, MA Hybrid: 1 day onsite Employees: 500 Team Size: 10-15 Indus...
  • 6/7/2024 12:00:00 AM

N
Athletic Director
  • Nebraska Christian College of Hope International University
  • Fullerton, CA
  • Athletic Director Hope International University Position Information Position Summary: The Athletic Director (AD) is the...
  • 6/7/2024 12:00:00 AM

Ohio /oʊˈhaɪoʊ/ (listen) is a Midwestern state in the Great Lakes region of the United States. Of the fifty states, it is the 34th largest by area, the seventh most populous, and the tenth most densely populated. The state's capital and largest city is Columbus. The state takes its name from the Ohio River, whose name in turn originated from the Seneca word ohiːyo', meaning "good river", "great river" or "large creek". Partitioned from the Northwest Territory, Ohio was the 17th state admitted to the Union on March 1, 1803, and the first under the Northwest Ordinance. Ohio is historically know...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Information Security Director jobs
$188,534 to $243,748

Information Security Director in Dayton, OH
Information system security officers establish and enforce security policies to protect an organization’s computer infrastructure, networks and data.
February 04, 2020
Information Security Director in Norfolk, VA
You should be comfortable communicating security directives to all employees including but not limited to Team Members, Leadership and Executives when required.
December 16, 2019
Information Security Director in Riverside, CA
A security architect could help build a more resilient network.
December 24, 2019