$ 1.95
Included in these items:MORE SAVINGS
IT Policies and Procedures Manual | $ 397.00 |
How to Write Job Descriptions Guide | $ 14.95 |
The Information Technology Security Manager ensures that the risk to the organization’s information posed by a variety of cyber threats (cyber attacks; theft or corruption from within; etc.) is minimized. The IT Security Manager ensures that when cyber attacks occur or data are stolen or compromised, these incidents are dealt with promptly and effectively and the chance of that particular type of incident recurring is minimized.
Reports directly to the IT Manager (IT Director, CTO, etc.). Works in conjunction with organizational functions/departments to ensure employees are aware of cyber-security issues, are trained in good cyber-security practices, and are practicing safe/secure data collection, data transfers and storage, and use of social media, mobile devices, and apps, among others.
The IT Security Manager Job Description is mentioned in the following procedures:
Procedure ID and Name | Policies & Procedures Manual |
ITAD107 Computer and Internet Usage Policy | IT Policies and Procedures Templates |
ITAD108 Email Policy | Computer & Network (IT) |
ITSD101 IT Threat / Risk Assessment | Computer & Network (IT) |
ITSD102 IT Security Plan | Computer & Network (IT) |
ITSD104 IT Disaster Recovery | Computer & Network (IT) |
ITSD105 Computer Malware | Computer & Network (IT) |
ITSD106 IT Access Control | Computer & Network (IT) |
ITSD107 IT Security Audits | Computer & Network (IT) |
ITSD108 IT Incident Handling | Computer & Network (IT) |
ITTS105 IT User/Staff Training Plan | Computer & Network (IT) |
ITAD102 IT Records Management | Computer & Network (IT) |
ITSD103 IT Media Storage | Computer & Network (IT) |
ITSD104 IT Disaster Recovery | Computer & Network (IT) |
A bachelor’s degree in information technology or computer science is required. 10 years of related work experience, with 3 or more in an information security management position, is also required.
Excellent communication skills and the ability to work well with people at every level and in every department are essential. Candidates with certification in information security (CISSP, CSSLP, CCFP, CISM, etc.) or comparable work experience will be given preference. Risk analysis/assessment experience a plus.
Experience with Microsoft Windows Server/Unix server required. Microsoft Project experience preferred.
Ability to communicate orally with vendors, management, and coworkers is crucial. Regular use of phone (mobile device) and email for communication is essential. Hearing and vision correctable to within normal ranges is essential for normal conversations, receiving ordinary information, and preparing or inspecting documents.
The ability to remain in a stationary position roughly 50% of the time, as well as the ability to move about the office occasionally (accessing files/storage, office equipment, computers and other office productivity devices, attending meetings, etc.), is required.
Using a computer while sitting for extended periods is common. Must also be able to position self to relocate or maintain equipment, including under tables and desks.
No heavy lifting is expected, though occasional exertion of 20 lbs. or less of force (e.g., picking up and carrying laptops, peripheral / network devices) may be required. Good manual dexterity required to use common office equipment (e.g., computers, mobile devices, calculators, copiers, scanners).
The job is performed indoors in a traditional office setting. Extended periods of sitting while using a computer or other devices are common.
Reviews
There are no reviews yet.