Information Security Officer

Sacramento, CA, United States

Applications have closed

California State Lottery

The mission of the California Lottery is to raise supplemental funding for public education.

View all jobs at California State Lottery

Job Description and Duties

Under administrative direction of the California State Lottery Chief Enterprise Risk Office, the Information Technology Manager II (ITM II) serves as the Lottery Information Security Officer and manages teams responsible for Lottery information security; project management; and evaluation of enterprise business and technology policy, program, process, procedure, and documentation practices.

Duties include, but are not limited to:

• Provide information security expertise and managerial leadership to the Information Security and Privacy Office.

• Ensure departmental compliance with all information security laws, rules, and standards. Provide managerial leadership and strategic direction for the departments monitoring of internal controls.

• Through subordinate management, guide development of project schedule, objective setting, and project design; ensure project risks are identified and managed effectively; monitor project delivery; and facilitate clear communication across multiple teams and stakeholders.

• Work with department executives to communicate evaluation strategies and define tactical execution of evaluation plans at the division level.

• Define enterprise priority of process evaluation strategies based on risk, complexity, business, and technology dependencies.

• Design and implement process performance measure reporting.

• Present reports plan and progress to the California State Lottery Commission.

• Manage efforts in defining and implementing an on-going risk assessment program, which will define, identify, and classify critical enterprise risks, threats, and vulnerabilities.

• Manage the creation of improvement recommendations, testing of new processes and the release into production.

• Track departmental changes and ensure desk manuals and other pertinent documentation is being refreshed.

Additional Resources: 

Job stats:  233  29  0

Tags: Compliance Monitoring Privacy Risk assessment Vulnerabilities

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.