Chief Information Security Officer
Chief Information Security OfficerPosition Type:
E2 - SAAO II 12 Month Leave EarningUniversity Information:
UNC Greensboro, located in the Piedmont Triad region of North Carolina, is 1 of only 57 doctoral institutions recognized by the Carnegie Foundation for both higher research activity and community engagement. Founded in 1891 and one of the original three UNC System institutions, UNC Greensboro is one of the most diverse universities in the state with 20,000+ students, and 3,000+ faculty and staff members representing 90+ nationalities. With 17 Division I athletic teams, 85 undergraduate degrees in over 125 areas of study, as well as 74 master’s and 32 doctoral programs, UNC Greensboro is consistently recognized nationally among the top universities for academic excellence and value, with noted strengths in health and wellness, visual and performing arts, nursing, education, and more. For additional information, please visit uncg.edu and follow UNCG on Facebook, Twitter, and Instagram.Primary Purpose of the Organizational Unit:
The Information Technology Services Division is a strategic partner to the executive team in achieving the goals of the university. The Vice Chancellor for Information Technology Services and Chief Information Officer reports directly to the Chancellor and is a member of the Chancellor’s Council. IT services are highly centralized at UNCG, with ITS providing and managing all of technology services consumed by students, faculty, staff and visitors. This structure affords amazing opportunities for technology leaders to research, launch and implement ideas that have a lasting positive impact on the university.Position Summary:
The CISO has enterprise-wide leadership responsibility for establishing and maintaining information security policies and standards, executing IT risk management processes, guiding efforts to identify, detect, and respond to security threats, and maintaining the confidentiality, integrity, and availability of University information resources.
The CISO will:
• Develop and implement a strategic, long-term information security strategy to ensure that UNC Greensboro’s information resources are adequately protected.
• Lead the development of comprehensive information security policies, procedures, standards, and guidelines, and oversee their approval, dissemination, and maintenance.
• Ensure that the information security management program enforces compliance with applicable policies, laws, regulations, and contractual requirements.
• Lead efforts to monitor and maintain compliance with FERPA, HIPAA, GLBA, PCI, DMCA, GDPR, and other applicable laws and regulations, as well as University and UNC System policies.
• Work to strike an optimal balance between the necessity for business and pedagogical functionality with the need for security, safety and data privacy in all aspects of University operations.
• Identify, evaluate, and report on information security risks, program developments, and improvement projects to the executive committees and the Board of Trustees, and provide subject matter expertise on security standards and best practices.
• Work with senior leaders across the university to identify and assess IT risks, establish risk tolerance, navigate risk acceptance processes, monitor remediation efforts, and implement mitigating and compensating controls necessary to reduce IT risks to acceptable levels.
• Act as the champion for the enterprise information security program and foster a security-aware culture through creative and effective efforts towards ongoing Security Awareness Training & Education (SATE).
• Develop, mentor, lead, and manage a high-performing cross-functional team of information security, risk, and compliance professionals.
• Be an active participant and take a leadership role in relevant councils, committees, and working groups in areas related to IT Governance, Information Security, Data Governance, Identity & Access, and Privacy.
• Supervise all aspects of security operations for the daily defense of the University, including monitoring, detection, investigation, and response into attacks, vulnerabilities, and emergent threats.
• Oversee the evaluation, selection and implementation of information security solutions that are innovative, cost-effective, and minimally disruptive.
• Partner with enterprise architects, infrastructure engineers, and application development teams to ensure that UNCG technologies are developed and maintained according to security policies, frameworks, and guidelines.
• Supervise efforts to satisfy regulatory requirements, including execution of internal and external IT audit activities and implementation of remediation actions.
• Develop business-focused metrics to measure the effectiveness of the information security program, and work to increase the maturity of the program over time.
• Monitor the industry and external environment for emerging threats and advise relevant stakeholders on appropriate postures in response to the changing threat landscape.
• Liaise with law enforcement and other advisory bodies as necessary to ensure that the organization maintains a strong security posture.
• Oversee incident response planning and the investigation of security breaches, and assist with any associated disciplinary, public relations and legal matters.
• Oversee and lead the creation, communication and implementation of a process for managing vendor risk and other third party risk.
1. Bachelor’s degree or higher with a major in computer science, information technology, business or public administration, or related disciplines
2. Deep expertise and technical knowledge in the information security and risk management domains
3. 10+ years of experience managing an information security area, program or office with a proven track record of creating and maintaining information security practices and/or services
4. Demonstrated recent experience and achievements with managing and prospering a comprehensive information security program, including well-known IT and information security standards (i.e. ISO 27001/2, COBIT), auditable compliance, policy governance, data management, and risk management
5. Ability to effectively communicate security concepts and strategies and influence best-practice adoption to a wide variety of audiences
6. Knowledge of Higher Education policies and best practices in regard to FERPA, HIPAA, FISMA, GLBA, and other regulations
7. Strong customer service ethic
8. Demonstrated recent experience in a senior leadership role with accountability to executive management
9. Outstanding communications abilities, both written and verbal
Salary commensurate with experienceOrg #-Department:
Info Technology Services - 23101Job Open Date:
08/07/2020For Best Consideration Date:
08/14/2020Open Until Filled:
1.000Type of Appointment:
PermanentNumber of Months per Year:
ExemptPercentage Of Time:
Enterprise Information Security StrategyEssential Tasks:
Lead development of a comprehensive Information Security strategy that effectively balances risk against ongoing and strategic business needs for innovation and operational efficiency. Effectively communicate information security strategy at multiple levels within the organization. Coordinate development and delivery of a security awareness training program for employees, contractors, and other parties. Coordinate use of external third-party resources for development, implementation and monitoring of the information security program, including penetration testing. Establish a metrics-driven dashboard to evaluate effectiveness of the Information Security program. Serve as a key thought leader in Information Security, which includes working with key partners both internal and external to the University, vendors, and peers in the UNC System to develop thought leadership around policies, process, and capabilities that can help change or enhance the security posture at UNC Greensboro.Percentage Of Time:
Enterprise Information Technology Risk and Compliance ManagementEssential Tasks:
Enterprise Information Technology Risk and Compliance Management: Develop and implement an IT risk management program that includes threat modeling, monitoring for exposures, risk identification, risk analysis, creation and implementation of risk treatment and mitigation plans, and reporting to executive management on both a regular and event-driven basis. Develop and implement procedures and tools for monitoring, maintaining, and reporting on compliance with applicable policies, laws, regulations, frameworks, and other requirements.Percentage Of Time:
Information Security Plans, Programs, Policies and ControlsEssential Tasks:
Information Security Plans, Programs, Policies and Controls: Work proactively with the ITS leadership team and their direct reports to assure strategic plans, security programs, and technical controls are aligned with their respective business strategies and in compliance with policies, applicable laws and regulations. Mature the ITS organization to a constant state of audit readiness, ensuring that proper controls and documentation are consistent across the organization, managed in a central divisional repository and reviewed and updated at established intervals with organizational accountability to the Chief Information Security Officer. Work closely with senior ITS leadership to mature University technology policies, expiring, updating and writing as needed to remain relevant against service portfolio changes and shifts in service delivery models.Percentage Of Time:
Transformational LeadershipEssential Tasks:
Transformational Leadership: Engage as a thought leader with the ITS leadership team to collect and leverage customer demand and actual cost of service delivery data to right-size the enterprise technology services portfolio, build agile, cost-effective technology services, effectively tell the ITS story, and re-invent organizational talent to a new paradigm for service delivery. Work with other ITS leaders to mature foundational IT processes and systems to increase capabilities and improve operational efficiency. Work with ITS senior leadership to develop a multi-year information security plan that prioritizes security initiatives and spending based on an appropriate risk management and/or financial methodology. Build information security services that are customer driven and fully aligned to both the University and ITS strategic plans. Build and lead a cross-functional security organization that may draw upon the resources and technical expertise from ITS and other technology organizations.Percentage Of Time:
Provide strategic and tactical security guidance for programs and projects as it pertains to the design, implementation, and operation of security controls.Essential Tasks:
This includes the evaluation of the enterprise architecture, hardware, software and technical controls. Lead the enterprise information security incident response function. Provide oversight for security investigations, and assist with disciplinary and legal matters associated with security breaches and policy violations as necessary.Physical Effort:
Hand Movement-Repetitive Motions - F, Reading - F, Writing - F, Hearing - f, Talking - fWork Environment:
Inside - c