Information Security Manager
赛莱默(中国)有限公司
- 公司规模:500-1000人
- 公司性质:外资(欧美)
- 公司行业:机械/设备/重工
职位信息
- 发布日期:2019-09-18
- 工作地点:上海-长宁区
- 招聘人数:1人
- 工作经验:无工作经验
- 学历要求:招1人
- 语言要求:不限
- 职位月薪:2.5-3万/月
- 职位类别:技术支持/维护经理
职位描述
The information security manager (ISM) is a critical member of the chief information security officer's (CISO's) team. The ISM's role — which is a midlevel managerial position — is to act as an interface between the CISO's strategic and process-based activities and the work of the technology-focused analysts, engineers and administrators in the IT organization. The ISM must be able to translate the IT-risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The ISM coordinates the IT organization's technical activities to implement and manage security infrastructure, and to provide regular status and service-level reports to management.
The ISM is a leadership role that requires an individual with a strong technical background, as well as an ability to work with the IT organization and business management to align priorities and plans with key business objectives. The ISM will act as an empowered representative of the CISO during IT planning initiatives to ensure that security measures are incorporated into strategic IT plans and that service expectations are clearly defined. The ISM will also be responsible for working with business and IT stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance.
Expertise in leading project teams and developing and managing projects is essential for success in this role. In addition to supporting the CISO's policies and strategies, the ISM must be able to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing across multiple IT and security teams, task prioritizing and project reporting. Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position.
ISMs are responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the ISM's position.
IT personnel responsible for managing technical security infrastructure may report directly to the ISM or may report to other areas of IT operations (for example, networking, servers or database management), with their security-related activities coordinated by the ISM.
Depending on the enterprise's organizational structure, the ISM may report to the head of IT operations, with a functional ("dotted line") responsibility to the CISO, or may report directly to the CISO.
In larger enterprises, the ISM may focus on one or more specific technology domains (for example, networking, systems, applications or data). When this is the case, the technology requirements should be altered to match the actual responsibilities.
Responsibilities
The ISM's job is composed of a variety of activities, including very tactical, operational and strategic activities in support of the CISO's program initiatives, such as:
- Strategic support
- Security liaison
- Architecture/engineering support
- Operational support
Strategic Support
- Work with the CISO to develop a security program and security projects that address identified risks and business security requirements.
- Manage the process of gathering, analyzing and assessing the current and future threat landscape, as well as providing the CISO with a realistic overview of risks and threats in the enterprise environment.
- Work with the CISO to develop budget projections based on short- and long-term goals and objectives.
- Monitor and report on compliance with security policies, as well as the enforcement of policies within the IT department.
- Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.
- Manage a staff of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members.
Security Liaison
- Assist resource owners and IT staff in understanding and responding to security audit failures reported by auditors.
- Provide security communication, awareness and training for audiences, which may range from senior leaders to field staff.
- Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements.
- Manage production issues and incidents, and participate in problem and change management forums.
- Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.
- Serve as an active and consistent participant in the information security governance process.
- Work with the CISO and IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program.
- Provide support and guidance for legal and regulatory compliance efforts, including audit support with focus on China Cyber Security Law.
Architecture/Engineering Support
- Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.
- Recommend and coordinate the implementation of technical controls to support and enforce defined security policies.
- Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
- Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirements.
- Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements.
Operational Support
- Coordinate, measure and report on the technical aspects of security management.
- Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.
- Manage and coordinate operational components of incident management, including detection, response and reporting.
- Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations.
- Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
- Manage security projects and provide expert guidance on security matters for other IT projects.
- Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.
- Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
- Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks.
Requirements and Qualifications
- A minimum of seven years of IT experience, with five years in an information security role and at least two years in a supervisory capacity.
- A bachelor's degree in information systems or equivalent work experience; an M.B.A. or M.S. in information security is preferred.
- Certification from Information Security and risk management certification (e.g. ISC2 CISSP, ISACA CISM) is desirable
The ISM must have the following:
Strong leadership skills and the ability to work effectively with business managers, IT engineering and IT operations staff.
The ability to interact with Xylem personnel, build strong relationships at all levels and across all business units and organizations, and understand business imperatives.
A strong understanding of the business impact of security tools, technologies and policies.
Strong leadership abilities, with the capability to develop and guide information security team members and IT operations personnel, and work with minimal supervision.
Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management and business personnel; in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies.
Experience working with legal, audit and compliance staff.
Experience developing and maintaining policies, procedures, standards and guidelines.
Experience with common information security management frameworks, such as International Standards Organization (ISO) 2700x, the IT Infrastructure Library (ITIL) and Control Objectives for Information and Related Technology (COBIT) frameworks.
Familiarity with applicable legal and regulatory requirements, including, but not limited to, China Cyber Security Law and its applicable mandates, the U.S. Sarbanes-Oxley Act), the European Union General Data Privacy Regulation (EU GDPR).
Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation.
Proficiency in performing risk, business impact, control and vulnerability assessments, and in defining treatment strategies.
Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
Strong analytical skills to analyze security requirements and relate them to appropriate security controls.
An understanding of operating system internals and network protocols.
Familiarity with the principles of cryptography and cryptanalysis.
Experience in application technology security testing (white box, black box and code review).
Experience in system technology security testing (vulnerability scanning and penetration testing).
职能类别:技术支持/维护经理
公司介绍
About Xylem
Xylem (XYL) is a leading global water technology provider, enabling customers to transport, treat, test and efficiently use water in public utility, residential and commercial building services, industrial and agricultural settings. The company does business in more than 150 countries through a number of market-leading product brands, and its people bring broad applications expertise with a strong focus on finding local solutions to the world’s most challenging water and wastewater problems. Xylem is headquartered in Rye Brook, N.Y., with 2013 revenues of $3.8 billion and more than 12,500 employees worldwide. Xylem was named to the Dow Jones Sustainability World Index for the last two years for advancing sustainable business practices and solutions worldwide.
The name Xylem is derived from classical Greek and is the tissue that transports water in plants, highlighting the engineering efficiency of our water-centric business by linking it with the best water transportation of all -- that which occurs in nature. For more information, please visit us at ****************.
关于赛莱默公司
Xylem(XYL)是全球领先的水技术供应商,专注于水输送、水处理和水测试领域,帮助市政、民宅和商业建筑业、工业及农业等行业客户实现科学用水。该公司目前在全球 150 多个国家开展业务,运用其多项名牌产品和员工的专业应用知识和经验,提供各种本地化解决方案,致力解决世界***的用水及污水处理问题。该公司总部设在美国纽约州白滩市,2013年业务收益为 38 亿美元,在全球拥有约 12,500 名员工。Xylem凭借在全球范围内开展和推动可持续业务活动及解决方案,连续两年荣登道琼斯可持续发展指数榜。
公司名称 Xylem 取自古希腊语,原义是植物中输送水份的组织,寓意此公司对水事业的追求,表现我们运用堪与大自然造化能力媲美的世界***的工程技术实现水的输送。****************
联系方式
- 公司地址:上海市长宁区遵义路100号虹桥上海城A座30楼 (邮编:200051)