This job board retrieves part of its jobs from: Pittsburgh Job Bank | New York Jobs | Arizona Jobs

Find jobs in New Jersey today!

To post a job, login or create an account |  Post a Job

  New Jersey Gigs  

Bringing you the best, highest paying job offers in the state of New Jersey

previous arrow
next arrow

Business information security officer (biso) – isaca certified

Synergistic Systems Inc

This is a Full-time position in Newark, NJ posted December 12, 2019.

The Business Information Security Officer (BISO) will face off to various levels of stakeholders across the enterprise to ensure that the enterprise-wide vision, strategy, architecture, policies and programs set forth by the Chief Information Security Officer are correctly implemented in the supported business unit.

The BISO will also maintain an understanding of the challenges facing healthcare; information technology (IT) systems are secure, and security and business continuity risk/reward decisions are balanced, as well as comply with external regulatory and legislative requirements.

Be an advocate for security and privacy at all relevant business unit meetings and functions.

Embed as part of the business to ensure information risks are identified, assessed, mitigated and controlled through the deployment of a sustainable information security risk management program.

Work with the business and enterprise security to recommend changes, enhancements or additions to the security controls of business applications that will enhance the Information Security profile of the organization’s processes.

Advocate for business unit requirements in all matters related to cybersecurity risk.

Counsels appropriate business unit senior leadership of changes affecting the organization’s cybersecurity posture, and communicate the value of information and cyber security throughout all levels of the organization stakeholders.

Proactively monitors the regulatory environment for emerging requirements that will affect the information security program and initiatives.

Facilitates the business units vendor relationships and ensures that appropriate contract provisions are in place for timely updates to address emerging vulnerabilities.

Facilitates the implementation of controls to protect the infrastructure from intrusion and from damage caused by malware and other threats.

Coordinates the execution of an incident management process with business unit stakeholders that ensures timely detection, containment, and eradication of threats; recovery from resulting damage; and corrective action to minimize the risk of future incidents.

Facilitates the business unit participation in audit and regulatory examinations and directs initiatives to address findings and meet commitments.

Consult with IT to ensure that security is factored into the evaluation, selection, installation and configuration of relevant business unit hardware, applications and software.

Skills/Abilities: Skill in communicating with all levels of management including Board members Skill to use critical thinking to analyze organizational patterns and relationships.

Deep information security management and broad technical security knowledge.

Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives; particularly HIPAA, NIST, and HITRUST.

Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge of cybersecurity principles, cyber threats and vulnerabilities.

At least 5 years of leadership in heavily regulated organizations (e.g.

Healthcare, Financial Services, or Federal Government).

Education: Bachelor’s degree in a technical discipline or business management discipline required; a degree in Computer Science, Computer Engineering or Information Technology is preferred Master’s Degree in Computer Science, Computer Engineering, Information Security / Assurance, or related field preferred.

ISACA Certified Information Security Manager or Certified Information System Security Professional required