• Corporate - IT - Information Security Manager

    Job Locations US-OH-Columbus
    Posted Date 1 month ago(10/17/2018 2:41 PM)
    Requisition ID
    2018-1272
    # of Openings
    1
    Category
    Information Technology
  • Overview

    You know our products, you have probably purchased many!! Join the company leading the way in consumer packaged goods…T. Marzetti Company!!

     

    When you join the T. Marzetti Company, you’re joining a trustworthy and proud organization that recognizes people are our greatest asset.  In our plants, you’ll have an opportunity to work for an industry leader in consumer packaged goods.

     

    With our company, you get work life balance, inviting and fun culture, attractive and competitive compensation and benefits package, career opportunities, and more. NOW is the time to join The Better Food Company!!

     

    The Information Security Manager (ISM) will be responsible for the development of the Company's security related services, as well as the administration of compliance and assurance activities as deemed necessary by the Company. Reporting to the CIO, this individual will drive compliance, audit and security issues, as well as monitoring and reporting of the security program and projects. The ISM act as an empowered representative of the CIO to ensure security measures are into strategic plans and executed effectively. The ISM will also be responsible for working with business and IT stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility, and performance.

    Responsibilities

    • Work with the CIO and IT leaders to develop a security program and security projects that address identified risks and business security requirements
    • Manage the process of gathering, analyzing, and assessing the current and future threat landscape, as well as providing a realistic view of risks and threats in the enterprise environment
    • Monitor and report on compliance with security policies, as well as the enforcement of policies within the computing environment
    • Propose changes to existing policies and procedures to ensure a secure operating environment
    • Provide security communication, awareness and training for the enterprise
    • Work as a liaison with vendors and legal department to establish mutually acceptable contracts and service-level agreements
    • Work with various stakeholders to identify information asses owners and classify data and systems as part of a control framework
    • Work with CIO and IT leaders to define metrics and reporting strategies that effectively communicate success and progress of the security program
    • Consult with IT to ensure that security is factored into the evaluation, selection, installation, and configuration of hardware, applications, and software
    • Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools
    • Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements
    • Manage and coordinate operational components of incident management, including detection, response and reporting
    • Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, laws and regulations
    • Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk
    • Manage security projects and provide expert guidance on security matters for other IT projects
    • Ensure audit trails, system logs, and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements
    • Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks

    Qualifications

    • 7 years' experience in the information security field, specifically in a security management, security administration or security engineer role
    • Bachelor's degree in Information Security or equivalent work experience; an M.B.A or M.S. in information security is preferred
    • Proven experience with current IT security technologies

    Technical Knowledge

    • Professional information security certifications such as CISSP, CISM, or CISA
    • Familiarity of information security management frameworks
    • Significant knowledge of security processes and standards
    • Excellent understanding of security protocols and best practices
    • High level knowledge of security audit and accreditation processes

    Competencies

    • Strong leadership skills and the ability to work effectively business managers, IT managers and operations staff
    • A strong understanding of the business impact of security tools, technologies and policies
    • Experience in developing and maintaining policies, procedures, standards, and guidelines
    • Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation
    • Excellent verbal, written, and interpersonal communication skills, including the ability to communicate effectively to all areas and levels of the organization; in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies
    • Proficiency in performing risk, business impact, control and vulnerability assessments, and in defining treatment strategies; Experience in system technology security testing (vulnerability scanning and penetration testing)
    • Knowledge and experience in developing and documenting security architecture and plans, including strategic, tactical, and project plans

    Working Conditions/Environment

    Works in a normal office environment where the employee is regularly required to speak, see, hear, sit, stand, talk, type, walk and bend while moving about the facility.  The noise level in the office is quiet. Occasional travel to plants or meetings is required.

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed