Deputy Chief Information Security Officer Job
Memphis, TN, US
Methodist Le Bonheur Healthcare
With six hospitals, multiple outpatient and diagnostic centers, and a growing network of physician practices, Methodist Le Bonheur Healthcare offers Memphis and the Mid-South world-class healthcare services.Summary
The Deputy Chief Information Security Officer (CISO) reports to the VP/CISO and is responsible for day-to-day operations to support and augment the VP/CISO’s overall responsibilities. The Deputy CISO is an advanced role supporting the entire cybersecurity program. This role provides leadership, executive support, strategic and tactical guidance, and complete execution for a world-class cybersecurity program supporting enterprise security initiatives. The Deputy CISO supports and reports on strategic planning and execution of enterprise security systems, applications and operations. The Deputy CISO will lead an adaptable and secure business-supporting cybersecurity team, in addition to influencing and executing with technical team members such as software developers, system engineers, cybersecurity engineers and systems administrators. Models appropriate behavior as exemplified in MLH Mission, Vision and Values.
Education/Experience/Licensure
Education/Formal Training Work Experience Credential/Licensure REQUIRED: Bachelor’s degree in Information Systems, Business, Computer Science, or related field Five to eight (5-8) years of experience in risk management and information security fields. N/A Preferred: Master’s degree in Information Systems, Business, Computer Science, or related field strongly preferred. Previous experience in a healthcare setting strongly preferred. Certified Information System Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Healthcare Privacy & Security (CHPS).
Knowledge/Skills/Abilities
- Strong written and verbal communication skills across all levels of the organization.
- Ability to effectively manage stress in a constantly changing environment.
- Driven to build a strong, cohesive team and positive enterprise-wide security culture.
- Proven high level of integrity, trustworthiness and confidence, as well as ability to represent the company and security leadership with the highest level of professionalism.
- Strategic vision and ability to influence others.
- Strong project management and organizational skills.
- Ability to work effectively with diverse teams and varying personalities, and adapt management style to effectively reach and develop the team.
- Ability to gain and preserve credibility with the team through sustained industry knowledge.
- Ability to motivate the team to achieve excellence, while giving credit and recognition where it is due.
Key Job Responsibilities
- Works closely with security leadership overseeing security operations, incident response, application security and infrastructure.
- Enforces a strong security culture, ensuring uniformity across security leadership, business units and Associates.
- In tandem with the VP/CISO, manages the security budget and additional fiduciary responsibilities.
- Advises on enterprise-wide people, process and technology security recommendations.
- Maintains an up-to-date level of knowledge relating to security threats, vulnerabilities and mitigations set forth to reduce the corporate attack surface.
- Implements a continuous vulnerability assessment and exposure analysis process and aligns technical teams to address a timeline for remediation and validation across applications and infrastructure.
- Requires and supports independent verification and validation testing of the company networks and data protection through internal team resources and independent consulting engagements.
- In conjunction with security leadership, defines key performance indicators (KPIs) and metrics aligning with business initiatives and delivers to non-technical teams in terms that are readily comprehensible.
- Builds relationships with technical and compliance teams to deliver security-by-design controls that are incorporated into projects, architecture, infrastructure and applications.
- Verifies security content training initiatives, as well as internal and external communication are conducted regularly.
- Openly supports the VP/CISO, management team and executive leadership, even during tumultuous times.
Physical Requirements
- The physical activities of this position may include climbing, pushing, standing, hearing, walking, reaching, grasping, kneeling, stooping, and repetitive motion.
- Must have good balance and coordination.
- The physical requirements of this position are: light work - exerting up to 25 lbs. of force occasionally and/or up to 10 lbs. of force frequently.
- The Associate is required to have close visual acuity to perform an activity, such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; or extensive reading.
- The conditions to which the Associate will be subject in this position: The Associate is not substantially exposed to adverse environmental conditions; job functions are typically performed under conditions such as those found in general office or administrative work.
- The Associate is subject to call back at all times.
- The Associate is required to travel occasionally.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security CISM CISO CISSP Compliance Computer Science Incident response KPIs Privacy Risk management Vulnerabilities
Perks/benefits: Career development Travel
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs