Role Overview:
We are looking for an enthusiastic and seasoned Cyber Security Strategist / CISO to join our team in Deerfield, IL. As a thought leader and trusted advisor, you will be crucial in developing and enhancing our cybersecurity practice, broadening our service offerings, and driving business growth. This role involves close collaboration with sales teams, executive leadership, and clients to deliver impactful solutions.
Key Responsibilities:
- Strategic Advisory: Provide expert guidance on cybersecurity strategies, technologies, and best practices as a trusted advisor.
- Sales Enablement: Collaborate with sales teams to facilitate customer conversations, aiding in deal closure by addressing customer needs.
- Partnership Building: Develop and maintain trusted partnerships with decision-makers, staff, and industry experts to drive collaborative success.
- Community Engagement: Actively engage in cybersecurity communities to promote best practices and stay informed on industry trends.
- Practice Development: Build and expand the cybersecurity practice, enhance service offerings, and drive business growth.
- Project Leadership: Lead projects to successful completion on time and within budget.
- Team Building: Establish and maintain an information security team.
- Risk Mitigation: Mitigate risks associated with data breaches and data leaks.
- Operational Recovery: Establish, maintain, and continuously test infrastructure for operational recovery from cybersecurity-related outages.
- Vulnerability Testing: Continuously test the organization's environment for security vulnerabilities.
- Technology Roadmap: Stay current on cybersecurity risks and trends and help develop the technology roadmap.
- Operating Models: Define operating models for the information security team using the ITIL framework and ITSM tools.
- Vendor Management: Manage relationships with third-party product and service providers to meet goals.
- Standards and Practices: Establish and/or mature formal standards and practices in areas like Identity & Access Management (IAM), secure data capture, storage, transfer, retrieval, and data security policy development, training, and risk management.
Qualifications:
Knowledge:
- Strong working knowledge of various data security frameworks, including NIST, ISO, and SOC.
- Expert knowledge of key concepts in user and identity access management (IAM).
- Working knowledge of security governance risk and compliance (GRC).
- Knowledge of data privacy regulations, including FERPA or similar regulated data classifications.
- Familiarity with best practices in security training and awareness.
- Strong knowledge of tools and techniques for data security and data recovery.
- Understanding of ITIL-based IT Service Management (ITSM) concepts.