Vice President, IT Cybersecurity
Hong Kong, HK, HK
Vice President, IT Security
The Vice President, IT Security will be responsible for overseeing and managing the IT security operations within the IT Department. This role requires a strong understanding of information security principles, risk management, and industry best practices. The Vice President will lead a team of security professionals and collaborate with other departments to ensure the confidentiality, integrity, and availability of information assets within the Group.
Your role:
- Develop and implement an enterprise-wide IT security strategy aligned with business objectives.
- Establish and maintain policies, procedures, and standards for information security across the organization.
- Lead the development and execution of a comprehensive risk management program to identify, assess, and mitigate potential threats.
- Manage the deployment and maintenance of security technologies such as firewalls, intrusion detection systems, antivirus software, encryption tools, etc.
- Conduct regular vulnerability assessments and penetration testing to identify weaknesses in systems or networks.
- Monitor security incidents and conduct investigations to determine root causes and implement corrective actions.
- Collaborate with internal stakeholders to ensure compliance with relevant laws, regulations, and industry standards.
- Stay up-to-date with emerging threats and trends in information security to proactively address potential risks.
- Provide leadership and guidance to the IT security team by setting clear goals, conducting performance evaluations, and fostering professional development opportunities.
- Collaborate with cross-functional teams to integrate security controls into system development lifecycle processes.
- Other duties may be assigned as required to meet business needs.
To succeed in your role:
- Bachelor's degree in Computer Science or a related field; Master's degree preferred.
- Minimum of 15 years of experience in IT security roles with progressively increasing responsibilities. Experience from sizable consultancy firm will be an advantage.
- Strong knowledge of information security principles including risk assessment methodologies, vulnerability management techniques, incident response protocols, etc.
- Professional certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or equivalent are highly desirable.
- Proven experience in developing and implementing enterprise-wide IT security strategies in complex organizations.
- In-depth understanding of network architecture principles including LAN/WAN technologies, VPNs (Virtual Private Networks), firewalls, etc.
- Familiarity with regulatory requirements such as GDPR (General Data Protection Regulation) or industry standards like ISO 27001 is preferred.
- Excellent leadership skills with the ability to inspire a team towards achieving common goals.
- Strong analytical thinking skills with the ability to assess complex situations quickly and make informed decisions.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus CISM CISSP Compliance Computer Science Encryption Firewalls GDPR Incident response Intrusion detection ISO 27001 Pentesting Risk assessment Risk management Security strategy Strategy VPN Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Cybersecurity Engineer jobs
- Open Security Operations Engineer jobs
- Open Cloud Security Architect jobs
- Open Information Security Officer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Product Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Information System Security Officer (ISSO) jobs
- Open Information Security Architect jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open DoD-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open TS/SCI-related jobs