Position Overview
Chief Information Security Officer
The Chief Information Security Officer, reporting directly to the Chief Technology Officer, serves as the process owner of all assurance activities related to the availability, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies. A key element of the Chief Information Security Officer's role is working with executive management to determine acceptable levels of risk for the organization. This position is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected.
The Chief Information Security Officer will manage 40-50 direct reports. This individual will oversee three main groups: Governance, Risk, and Compliance; Security Operations; and Security Engineering. The ideal candidate will not only be able to create and set a vision, but must be able to educate the entire organization in order to orchestrate that vision. This individual must be a hands-on person. The ideal candidate will have a modernized and holistic view of security.
Within the first 6-12 months at the organization, the Chief Information Security Officer will accomplish the following:
1. Modernization of network, endpoints, and access management
2. Create a vision for the modernization and transformation of the above, and enable the workforce to take action
3. Think about security as it pertains to mobile phones, tablets, and managing robots and distribution centers
4. Create an ongoing education campaign for the engineering team
5. Build and manage a strong, successful team
The Chief Information Security Officer interacts with team members at all levels in the organization and with senior executives outside of the business. They will work closely with business leaders to develop a shared vision and accountability for the information security management program.
This work impacts whole business operations. The systems designed and built by the team led by the Chief Information Security Officer will enable and enforce the operating model that runs the business. The operating model and its supporting systems determine the way in which value is created in the business and directly impacts the costs that the business assumes in its operations.