[Close] 

Chief Information Security Officer

Job Description:
Responsibilities The targeted salary range for this position will be $200,000/yr (minimum)-$250,000/yr (maximum).
Under the general guidance of the ISS Chief Technology Officer and the DGIT Chief Information Officer, the Chief Information Security Officer (CISO) will lead an evolving and robust IT Security Program that serves UCLA Health, including the UCLA Schools of Dentistry, Nursing, the Fielding School of Public Health, and the David Geffen School of Medicine.
The program, consisting of people, process and technology, ensures all required controls, safeguards and processes are in place and operationally effective.
The program will meet and support all requirements set forth by regulatory agencies and by the UCLA Health Office of Compliance Services and other related governance, and by IT executive leadership.
The CISO will guide a team of engineers and specialists to develop, implement, and continually improve controls, standards, and processes in order to ensure the security of all services, systems and user access.
The CISO will define and implement an annualized set of strategic goals, aligned with a portfolio of prioritized projects.
The CISO will lead and/or participate in periodic security risk and gap assessments, along with defining and driving corresponding action plans for prioritized remediation of gaps and vulnerabilities.
The CISO will also collaborate with internal stakeholders and leadership, and with industry peers and solution providers to identify, roadmap, and implement efficient and effective solutions.
Additionally, this individual must possess strong analytical ability, sound managerial judgment, and the capacity to think strategically and multi-dimensionally in order to solve problems and make decisions and recommendations.
This role will ensure all stakeholders are provided with value-added, streamlined, and interoperable IT Security solutions which provide management with the necessary tools and reporting to clearly understand risks, issues and progress, obtain meaningful alerts and reporting, and enable informed decision-making on priorities, investments, remediation activities, and improvements.
Qualifications Bachelor's degree in related area and / or equivalent experience / training.
Advanced degree in related area preferred.
CISSP Certification preferredExcellent cybersecurity enterprise technology understanding including: Firewalls, SIEM, DLP, VPN, DMZ, MFA, WAF, Intrusion Detection/Prevention, Encryption, Anti-virus, Anti-Malware, SOC operations, forensics, etc.
Excellent understanding of security architecture and design principlesExcellent understanding of Identity Management governance, provisioning, and federationExcellent understanding of authentication and authorization policies, procedures and technologiesExcellent understanding of security best practices including: ISO 17799/27001/27002, NIST Cybersecurity FrameworkExcellent communication skills, both written and verbalGood collaboration skills with peers and superiorsGood IT Strategic Planning skillsGood Resource Capacity Planning skillsAwareness of IT Governance best practices including: COBIT, Val IT, COSOAwareness of Project, Program & Portfolio Management methodology and practicesAwareness of IT Service Management methodology and practicesAwareness of IT Engineering Lifecycle methodology and practicesProficient in Microsoft Office Professional (Word, Excel, PowerPoint, Outlook, Project & Visio) Ability to learn University structure and policies sufficient to serve as a resource for questions, referrals, and documentation.
Ability to handle sensitive and difficult situations in a professional and responsive manner; ability to exercise own judgment.
Ensures full cooperation in all risk management activities and investigationsAbility to develop and monitor a budget.
Ability to interact effectively with individuals and organizations at all levels, establish and maintain good working relationships.
Ability to develop priorities, meet deadlines despite interruptions, and perform multiple complex assignments.
Ability to work independently on assignments with minimal supervisionAbility to learn University systems for budgets, payroll, purchasingAbility to work overtime as required

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Chief Information Security Officer
Los Angeles, CA UCLA Health
Chief Information Security Officer - Office of...
Los Angeles, CA University of Southern California
Risk Manager / Information Security Officer
Goleta, CA Community West Bank
DoD Information Systems Security Officer (ISSO)
El Segundo, CA SAIC
Information Systems Security Officer - Demonst...
Ridgecrest, CA Brandes Associates
DoD Information Systems Security Officer (ISSO...
El Segundo, CA SAIC