Director - Information Security Operations
Posted on Jun 1, 2020 by Blue Cross & Blue Shield of Michigan
The Director - Information Security Operations serves as the process owner for all operational activities that serve to protect the confidentiality, integrity, and availability of member, employee, and business information and systems in compliance with organization policies and standards, along with regulatory obligations. He/she leads a highly technically proficient team, provides strategic and operational direction, ensuring that objectives/metrics are achieved, managing risks appropriately, using organizational resources responsibly, and monitoring the success or failure of security operations including risk assessment/acceptance; vulnerability management; security event and threat monitoring and reporting; intrusion, malware, and inappropriate use detection; effective implementation of policy, standards, and controls; and incident response.
Implement, manage and operationalize a security event management program (eg, Security Operations Center) to collect, store, and correlate, analyze and respond to security data derived from sensors (eg, Intrusion Detection Systems/Intrusion Prevention Systems), logs and incident reports. Create advanced content to detect emerging threats utilizing threat intelligence sources and discipline.
Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary, and legal matters associated with such breaches as necessary.
Serve as an internal information security consultant to the organization. Support enterprise architecture, system operations, and systems development, as required, to ensure information security policy, standards and controls are planned for and effectively implemented.
Recruit, retain, develop and maintain a qualified team of security engineers/technicians, analysts, and vendors who safeguard the company's assets, intellectual property, and information systems.
Direct and oversee the performance of risk assessments and network vulnerability assessment. The document, prioritize and manage all remediation recommendations and documents and manage exceptions. Direct and oversee the performance of application assessments to include both application risk and technical vulnerability assessments.
Actively participate in strategy and budget planning activities and monitor performance relative to established goals and objectives.
Conduct root causes analysis of real or suspected security incidents and identify the cause and recommended corrective actions.
Collaborate with Governance, Risk and Performance on the definition and execution of security training and awareness initiatives with a focus on identifying and correcting behaviors that contribute to poor security practices or increase the risk to information and systems.
Provide and or contribute to the development of annual and ad-hoc information security evaluations and performance reports to be shared with the Information Security Working Group and other executive leadership, as required.
Produce, collect and report on relevant existing and emerging information security threats in coordination with the threat intelligence and vulnerability management disciplines.
Bachelor's or Master's degree in Computer Science, Information Systems, Engineering or related major
CISSP, CCSP, CCNA, CCNP, CCIE Security, CCVP, MCSE certifications are preferred
A minimum of ten (10) years of experience in Information Technology, Information Security/Risk or related field is required with five (5) years of management experience
Solid experience with implementing information security and governance programs
Proven track record of being results-oriented with the demonstrated achievement of meeting aggressive goals and tight timelines
Demonstrated expertise of building a consensus across business partners and technology leaders and influencing successful outcomes
Advanced analytical, organizational, verbal, written, communication and presentation skills
Knowledge of applicable laws, guidelines or regulations as they relate to information technology.
Strong leadership, coaching and mentoring skills
Proven presentation and facilitation skills
Other related skills and/or abilities may be required to perform this job.