Deputy Chief Information Security Officer Job

Memphis, TN, US

Methodist Le Bonheur Healthcare

With six hospitals, multiple outpatient and diagnostic centers, and a growing network of physician practices, Methodist Le Bonheur Healthcare offers Memphis and the Mid-South world-class healthcare services.

View company page

Summary

The Deputy Chief Information Security Officer (CISO) reports to the VP/CISO and is responsible for day-to-day operations to support and augment the VP/CISO’s overall responsibilities. The Deputy CISO is an advanced role supporting the entire cybersecurity program. This role provides leadership, executive support, strategic and tactical guidance, and complete execution for a world-class cybersecurity program supporting enterprise security initiatives. The Deputy CISO supports and reports on strategic planning and execution of enterprise security systems, applications and operations. The Deputy CISO will lead an adaptable and secure business-supporting cybersecurity team, in addition to influencing and executing with technical team members such as software developers, system engineers, cybersecurity engineers and systems administrators. Models appropriate behavior as exemplified in MLH Mission, Vision and Values.

Education/Experience/Licensure

  Education/Formal Training Work Experience Credential/Licensure REQUIRED: Bachelor’s degree in Information Systems, Business, Computer Science, or related field Five to eight (5-8) years of experience in risk management and information security fields. N/A Preferred: Master’s degree in Information Systems, Business, Computer Science, or related field strongly preferred. Previous experience in a healthcare setting strongly preferred. Certified Information System Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Healthcare Privacy & Security (CHPS).

 

Knowledge/Skills/Abilities

  • Strong written and verbal communication skills across all levels of the organization.
  • Ability to effectively manage stress in a constantly changing environment.
  • Driven to build a strong, cohesive team and positive enterprise-wide security culture.
  • Proven high level of integrity, trustworthiness and confidence, as well as ability to represent the company and security leadership with the highest level of professionalism.
  • Strategic vision and ability to influence others.
  • Strong project management and organizational skills.
  • Ability to work effectively with diverse teams and varying personalities, and adapt management style to effectively reach and develop the team.
  • Ability to gain and preserve credibility with the team through sustained industry knowledge.
  • Ability to motivate the team to achieve excellence, while giving credit and recognition where it is due.

Key Job Responsibilities

  • Works closely with security leadership overseeing security operations, incident response, application security and infrastructure.
  • Enforces a strong security culture, ensuring uniformity across security leadership, business units and Associates.
  • In tandem with the VP/CISO, manages the security budget and additional fiduciary responsibilities.
  • Advises on enterprise-wide people, process and technology security recommendations.
  • Maintains an up-to-date level of knowledge relating to security threats, vulnerabilities and mitigations set forth to reduce the corporate attack surface.
  • Implements a continuous vulnerability assessment and exposure analysis process and aligns technical teams to address a timeline for remediation and validation across applications and infrastructure.
  • Requires and supports independent verification and validation testing of the company networks and data protection through internal team resources and independent consulting engagements.
  • In conjunction with security leadership, defines key performance indicators (KPIs) and metrics aligning with business initiatives and delivers to non-technical teams in terms that are readily comprehensible.
  • Builds relationships with technical and compliance teams to deliver security-by-design controls that are incorporated into projects, architecture, infrastructure and applications.
  • Verifies security content training initiatives, as well as internal and external communication are conducted regularly.
  • Openly supports the VP/CISO, management team and executive leadership, even during tumultuous times.

Physical Requirements

  • The physical activities of this position may include climbing, pushing, standing, hearing, walking, reaching, grasping, kneeling, stooping, and repetitive motion.
  • Must have good balance and coordination.
  • The physical requirements of this position are: light work - exerting up to 25 lbs. of force occasionally and/or up to 10 lbs. of force frequently.
  • The Associate is required to have close visual acuity to perform an activity, such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; or extensive reading.
  • The conditions to which the Associate will be subject in this position: The Associate is not substantially exposed to adverse environmental conditions; job functions are typically performed under conditions such as those found in general office or administrative work.
  • The Associate is subject to call back at all times.
  • The Associate is required to travel occasionally.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security CISM CISO CISSP Compliance Computer Science Incident response KPIs Privacy Risk management Vulnerabilities

Perks/benefits: Career development Travel

Region: North America
Country: United States
Job stats:  9  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.