Vice President, Deputy CISO

GA, United States

Applications have closed

Join a team with one shared mission - to make a difference, every person, every day.  

We are more than 100,000 team members strong, from all backgrounds and corners of the world, with the talent, experience and compassion that enables us to make an impact.   For thousands of clients across the U.S. and in more than 20 global locations, ABM takes care of the people, spaces and places that matter most.  We also take care of our team members —ensuring our company is a great place to work, and our communities are safer, healthier, and more sustainable places to be.  Every team member at ABM has the opportunity to make a difference.  Every day.  And we cultivate a culture where our team members feel seen, heard, and valued and can grow a career and a future with us.    

The Vice President, Deputy Chief Information Security Officer (CISO) reports to the CISO and is responsible for day-to-day operations to support and augment the CISO’s overall responsibilities. The Deputy CISO is an advanced role supporting the entire cybersecurity program. This individual provides leadership, executive support, strategic and tactical guidance, and complete execution for a world-class cybersecurity program supporting global enterprise security initiatives. As directed by the CISO, the Deputy CISO supports and reports on strategic planning and execution of enterprise security systems, applications and operations. As a business enabler, the Deputy CISO ensures business decisions are not obstructed by cybersecurity but instead are made using sound security principles and supporting corporate security policies and plans. The Deputy CISO will lead an adaptable and secure business-supporting cybersecurity team, in addition to influencing and executing with technical team members such as software developers, system engineers, cybersecurity engineers and systems administrators. Preferably, the Deputy CISO will have a technical background with the ability to comprehend technologies, their purpose, and their security requirements, wherever they and their data reside. The Deputy CISO’s technical background should encompass understanding threats, risk mitigation and technical controls. 

Essential Functions:

  • Serve as the CISO representative when the CISO is not available, including making decisions usually made by the CISO.
  • Work closely with security leadership overseeing security operations, incident response, application security and infrastructure.
  • Maintain an up-to-date level of knowledge relating to security threats, vulnerabilities and mitigations set forth to reduce the corporate attack surface.
  • Be actively informed and engaged in daily security operations.
  • Understand and be involved in disaster recovery and business continuity planning, testing and validation.
  • Offer mentoring to security leadership as needed to support people-first leadership principles. 
  • Enforce a strong security culture set forth by the CISO, ensuring uniformity across security leadership, business units and employees.
  • Foster strong relationships with internal business units and external entities to maintain a strong network.
  • Require security leadership and teams to consistently learn and share advanced knowledge and practices that promote excellence.
  • Advise on enterprise-wide people, process and technology security recommendations.
  • Ensure security projects are delivered on time and within budget.
  • Implement a continuous vulnerability assessment and exposure analysis process and align technical teams to address a timeline for remediation and validation across applications and infrastructure.
  • In conjunction with security leadership, define key performance indicators (KPIs) and metrics aligning with business initiatives and deliver to non-technical teams in terms that are readily comprehensible. 
  • Provide motivation to security teams and employees to maximize rigorous system security controls. 
  • Remove complexity and obstacles that hinder efficient security controls enterprise-wide.
  • Build relationships with technical and compliance teams to deliver security-by-design controls that are incorporated into projects, architecture, infrastructure and applications.
  • Work closely with risk, compliance, legal and audit teams.
  • Verify security content training initiatives, as well as internal and external communication are conducted regularly.
  • Oversee testing and validation of security controls across projects.
  • Openly support the CISO, management team and executive leadership, even during tumultuous times. 
  • Perform other duties as assigned.

Education:

  • Bachelor’s degree in Information Technology, Business, Management, Computer Science, Information Systems or a related field.

Experience:

  • 8+ years of related security systems administration (preferable)
  • 10+ years of cybersecurity management experience.

Licenses:

  • Preferable, but not required: CISSP, CISM, CRISC, CISA 

Benefit Information:

ABM offers a comprehensive benefits package. For information about ABM’s benefits, visit ABM 2024 Employee Benefits | Staff & Management 

 

ABM (NYSE: ABM) is one of the world’s largest providers of facility services and solutions. A driving force for a cleaner, healthier, and more sustainable world, ABM provides essential services and forward-looking performance solutions that improve the spaces and places that matter most. From curbside to rooftop, ABM’s comprehensive services include janitorial, engineering, parking, electrical and lighting, energy and electric vehicle charging infrastructure, HVAC and mechanical, landscape and turf, and mission critical solutions. ABM serves a wide range of industries – from commercial office buildings to universities, airports, hospitals, data centers, manufacturing plants and distribution centers, entertainment venues and more. Founded in 1909, ABM serves over 20,000 clients, with annualized revenue approaching $8 billion and more than 100,000 team members in 350+ offices throughout the United States, United Kingdom, Republic of Ireland, and other international locations. For more information,  visit www.abm.com.
ABM is proud to be an Equal Opportunity Employer qualified applicants without regard race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran or any other protected factor under federal, state, or local law.  ABM is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a disability and need assistance in completing the employment application, please call 888-328-8606.  We will provide you with assistance and make a determination on your request for reasonable accommodation on a case-by-case basis.
ABM participates in the U.S. Department of Homeland Security E-Verify program. E-Verify is an internet-based system used to electronically confirm employment eligibility.
ABM is a military-friendly company proudly employing thousands of men and women who have served in the U.S. military. With ABM, you’ll have access to a world-class training program and ample opportunities to use the skills you developed while serving our country.  Whether you’re looking for a frontline or professional position, you can find post-military career opportunities across ABM.
ABM directs all applicants to apply at www.abm.com ABM does not accept unsolicited resumes.



* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security CISA CISM CISO CISSP Compliance Computer Science CRISC Incident response KPIs Vulnerabilities

Perks/benefits: Career development

Region: North America
Country: United States
Job stats:  7  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.