Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Director of Information Security Architecture

Job Title: Director of Information Security Architecture
Contract Type: Permanent
Location: Wisconsin, Wisconsin
Industry:
Salary: US$150000 - US$1800000 per annum + benefits
Start Date: ASAP
REF: DOSA
Contact Name: Bonnie Chuong
Contact Email: bonniec@montash.com
Job Published: about 1 year ago

Job Description

About the role

You will own and drive the global rollout of a more robust and formal approach to information security architecture across the global environment. The structure of the program will be based on the goals, principles and strategy of the overall Global Information Security Enterprise Security Strategy. You will also be optimizing team processes to ensure efficient and effective delivery of services in a 24x7 'follow the sun' operating model.

Ideal candidate

You must have a deep background in all aspects of security architecture including network, application, cloud, social and mobile; as well as a background in providing input on information security policies, procedures, and strategies.

Key Responsibilities

  • Lead the analysis, requirement development, design, and implementation of authentication and authorization policy governance for new and existing applications
  • Provide IT security technical and project leadership for fine grained solutions including developing robust security reference architectures.
  • Develop guidelines and processes to govern a centralized application security model
  • Lead the analysis, requirement development, design, documentation, implementation, and maintenance of complex IT solutions
  • Provide technical and/or project leadership function for assigned security projects including; the protection of information systems assets, corporate information, and intellectual property
  • Work within the framework of established operating procedures to implement security measures for the business information assets
  • Leverage existing solutions and global design to drive standardization and simplification to reduce implementation timelines and costs
  • Communicate security standards and policies
  • Identify critical path decisions, make recommendations, and influence program leaders / business process owners
  • Estimate costs and schedules and recommend resource required and solutions to problems
  • Proactively collaborate with management in developing strategic direction, setting objectives, and setting realistic and challenging goals
  • Interface with internal and external contributing organizations
  • Act as a technical advisor and subject matter expert to internal stakeholders and partners
  • Maintain a superior knowledge of the cyber security capabilities of operating systems, networking devices, control systems, and vendor offerings.
  • Maintain a working knowledge of applicable cyber security standards involving critical infrastructure, including those relating to process networks
  • Understand technical issues and the implications to the business, and be able to communicate them to management and other business leaders.

Key Requirements:

  • Roll up your sleeves attitude focused on balancing business speed and risk reduction
  • Ability to effectively work in a matrix management environment
  • Strong communication and presentation skills
  • The ability to lead large groups and be a primary facilitator
  • Strong written skills
  • Ability to lead and shape stakeholder expectations
  • Help drive pursuits and engage in complex deals, matching outcomes to expectations
  • Ability to work easily with diverse and dynamic teams
  • Readiness to travel up to 30% if needed
  • Familiarity with Identity Federation technologies including experience integrating large scale identity solutions
  • Fundamental understanding of PKI, virtualization, digital, and cloud
  • Proven analytical and problem resolution skills including;
  • Strong oral and written communication skills
  • Strong interpersonal and leadership skills
  • Ability to influence and build consensus with other IT teams and leadership
  • Demonstrated initiative to stay abreast of technology advancements
  • The Open Group Architecture Framework (TOGAF) & ITIL
  • Professional Certification - CISSP or equivalent

If you are interested in this role, please apply now.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...