Virtual CISO

<strong>The next evolution of cybersecurity starts now!<br /><br />Spun off Impact Networking, DOT Security has officially launched and is ready to be the answer to all your cybersecurity needs. Learn more at&nbsp;<a href="https://dotsecurity.com/" target="_blank" rel="noopener noreferrer">www.dotsecurity.com</a></strong>

Lake Forest, IL

Impact

<div class="about-us-description ng-binding"> <div class="fusion-text"> <h4 class="fusion-responsive-typography-calculated" style="padding-left: 30px;" data-fontsize="24" data-lineheight="31.92px">Building the people who build the business.<br /><br />We&rsquo;ve spent the past 20 years pushing the boundaries of traditional business. Though we&rsquo;ve evolved from an equipment dealership into an IT and managed services provider, our goal remains the same: to provide world-class customer experiences for the companies who are often ignored by big enterprises. To do this, we need top talent, skilled specialists and the hardest of workers looking to build successful careers at Impact.&nbsp;</h4> </div> <div class="fusion-text"> <h4 style="padding-left: 30px;">Whether you&rsquo;re looking for a fresh start, a career change or the chance to use your experience to make a difference, you&rsquo;re welcome at Impact. With 700 employees and 18 locations spread across the Midwest and West Coast, we are committed to empowering each individual with education, training and the support needed to compete and succeed, and change the way our customers do business.</h4> <h4 style="padding-left: 30px;">The world of technology shows no signs of slowing down, and neither do we. Think you can keep up? Apply today!</h4> </div> </div> https://vizi.vizirecruiter.com/Impact-2824/index.html

keywords: managed security,client executive,mentorship,workplace,benefits,executive advisement,executive analysis,penetration testing,cybersecurity leadership,cybersecurity solutions,expertise,legal,skills,abilities,certifications

Senior Level

Overview: <p>DOT Security&rsquo;s mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. DOT Security will implement processes, technology, and provide subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, DOT Security will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.</p> <p>DOT Security is seeking team members to fill the role of Virtual CISO. Individuals will have the opportunity to join based on their knowledge and skills demonstrated during the interview process including testing. DOT Security has developed a career progression path, that challenges our team to grow as cybersecurity professional consultant knowledge and providing excellent customer service as a member of the DOT Security &ndash; Services team.</p> <p>As a&nbsp;Virtual CISO, you will act as a Cybersecurity Executive for DOT clients.&nbsp;</p> <p>The role of the Virtual CISO is challenging and rewarding. It requires a business acumen and effective communication skill set. The ability to communicate highly technical concepts to non-technical users is critical to client success. There&nbsp;is an opportunity to mentor&nbsp;Technical Account Managers,&nbsp;as needed.<br /><br />The vCISO is not a remote position. The vCISO is required to be on-site at the DOT Security Operations Center.</p>
Responsibilities: <ul> <li>Advise senior management (e.g., Chief Information Officer [CIO]) on risk levels and security posture.</li> <li>Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.</li> <li>Advise cybersecurity requirements to be integrated into the continuity planning for that system and/or organization(s).</li> <li>Facilitate overall enterprise information security architecture (EISA) with the organization&rsquo;s overall security strategy.</li> <li>Evaluate cost/benefit, economic, and risk analysis in decision-making process.</li> <li>Identify alternative information security strategies to address organizational security objective.</li> <li>Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.</li> <li>Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.</li> <li>Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.</li> <li>Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.</li> <li>Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.</li> <li>Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.</li> <li>Perform penetration testing as required for new or updated applications.</li> <li>Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.</li> <li>Monitor target networks to provide indications and warning of target communications changes or processing failures.</li> </ul>
Requirements: <h4>Knowledge</h4> <ul> <li>Expert understanding of all Technical Account Manager requirements</li> <li>Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.</li> <li>Applicable business processes and operations of customer organizations.</li> <li>Resource management principles and techniques.</li> <li>Supply chain risk management practices (NIST SP 800-161)</li> <li>Critical information technology (it) procurement requirements.</li> <li>Information Technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.</li> <li>Laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.</li> <li>Encryption algorithms</li> <li>Risk Management Framework (RMF) requirements.</li> <li>Applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, Executive Branch Guidelines, and/or Administrative/Criminal Legal Guidelines and Procedures.</li> <li>Critical infrastructure systems with information communication technology that were designed without system security considerations.</li> </ul> <h4>Skills</h4> <ul> <li>Creating policies that reflect system security objectives.</li> <li>Determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.</li> <li>Evaluating the trustworthiness of the supplier and/or product.</li> </ul> <h4>Abilities</h4> <ul> <li>Apply techniques for detecting host and network-based intrusions using intrusion detection technologies.</li> <li>Integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).</li> <li>Identify critical infrastructure systems with information communication technology that were designed without system security considerations.</li> </ul> <h4>Other Desired Attributes</h4> <ul> <li>Certifications include, but not limited to specialized Sec+, CGIH, CISSP, CISM, or other comparable certifications.</li> <li>Public Trust background check (Limited Requirement).</li> <li>Must be able to do some light lifting.</li> <li>College degrees may be a substitute for up to two years&rsquo; experience for Bachelor&rsquo;s degrees. 4 Years for master&rsquo;s degrees.</li> </ul>