Security Management Job Description
Security Management Duties & Responsibilities
To write an effective security management job description, begin by listing detailed duties, responsibilities and expectations. We have included security management job description templates that you can modify and use.
Sample responsibilities for this position include:
Security Management Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Security Management
List any licenses or certifications required by the position: CISSP, ITIL, GIAC, SANS, ISO, CISA, CRISC, GCIA, PMP, ITIM
Education for Security Management
Typically a job would require a certain level of education.
Employers hiring for the security management job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Education, Information Technology, Information Security, Technical, Information Systems, Engineering, Business, Management, Technology
Skills for Security Management
Desired skills for security management include:
Desired experience for security management includes:
Security Management Examples
Security Management Job Description
- Serves as a subject matter/technical expert to the sales and service organizations on all matters related to the functionality of all products within the specific domain
- Assist VP, Global Security, in creating and coordinating exercises related to Business Continuity, Risk Analysis and Emergency Response plans
- Participates in the strategic planning of program operations and major projects designed to support security infrastructure
- Establishes and maintains continuing liaison with both internal and external counterparts, worldwide
- Establishes and maintains effective working relationships with department heads of AP headquarters and other bureaus to ensure the effective coordination and implementation of complex financial management strategies and procurement issues
- Acts as the department’s lead coordinator of its Hostile Environment and Emergency First Aid Training Course (HEFAT)
- Maintains database of assigned Personal Protective Equipment (PPE)
- Maintains and conducts testing of the AP’s crisis alert notification system
- Maintains regular updates to the Global Security internal web page
- Working in a corporate security consultancy role
- Master's in Business or other advanced Technical Degree preferred
- 5+ years of experience in a client facing role or in a software and enterprise solutions in a market-facing product role
- Experience working in a Human Capital Management (HCM) domain or with Identity Management/ Security domain is required
- Knowledge of and experience with security and compliance standards
- Previous professional experience with Qualys Vulnerability Management and Web Application Scanning is required
- Previous professional experience with assessing vulnerability risk in a large organization is required
Security Management Job Description
- Develop and maintain a keen understanding of intellectual property, particularly software related, and critical assets within the business, and any vulnerability to loss, and working with the business CISO, ensure effective controls are implemented
- Develop business and corporate policies and procedures regarding SCM in a new business, and ensure policies are compliant with federal, state, corporate and international regulations
- Analyze and identify adverse activity based on actionable intelligence, and preparation of threat and risk assessments, to mitigate reputational and financial risk
- Serve on or lead collaborative, cross-functional internal committees external work groups to address physical security, crisis management and business continuity, workplace violence prevention, intellectual property protection, investigations, fraud, and product security
- Prepare well-written comprehensive reports and executive summaries for senior management and legal counsel for disciplinary and prosecutorial actions
- Prepare compliance reports, perform risk assessment and improve the compliance of internal procedures, controls and documentation
- Promote compliance awareness internally
- Keep company updated on relevant new or revised regulations and policies
- Take charge of investigation or handling actual and potential compliance breaches
- Identify all associated risks and exposures and provide constructive recommendations to management for improvement and risk mitigation
- Relevant work experience in leading an Access Management Operations team
- Relevant work experience in Access Management with a deep understanding of RBAC/ABAC operations
- Knowledge and experience in Access Management Controls for Unix/Windows/Databases and applications
- Very Strong communication skills in both written and verbal areas
- Knowledge of Security and technology standards (e.g., infrastructure, architecture, processes, applications)
- CISSP designation or other security designations would be an asset
Security Management Job Description
- Follow up corrective action plan against non-conformities found
- Perform ad hoc security and compliance related tasks
- Schedule and draft agendas for SMU team meetings and stakeholder meetings
- Support and communicate with field security teams
- Establish and maintain home-office SMU project files and keeps filing system list updated
- Provide support for new business efforts through identifying, supporting, and reviewing security services for travelers
- Plans, implements, and manages on-boarding, initial risk assessment and integration of acquisitions in conjunction with security mergers and acquisitions team
- Creates and maintains security risk management standards in cooperation with the GRC Governance team
- Leads the performance of Tier 1 (enterprise) and Tier 2 security risk assessments
- Provides risk management subject matter expertise and training for members of the Security organization
- Understanding of LDAP (Oracle/Sun DSEE) and Active Directory organizational unit structures
- Understanding of technical terminology with respect to Unix Kerberos, Windows Active Directory, and Mainframe authentication account provisioning Exchange Mail and Home Directory provisioning
- Ability to understand a data model in order to write and execute SQL queries
- Previous experience as a technologist
- Understanding of the technical integration process for mergers and acquisitions
- Two (2) years’ experience in information security
Security Management Job Description
- Monitors changes in threats, impacts and control effectiveness to ensure risks stay within tolerance and takes action when they aren't
- Organizes and leads risk experts within organizations outside of Security to ensure required actions are communicated to the correct owners and are being worked as agreed creating and maintaining an information channel from the business to Security
- Regularly track and report trending of vulnerability and risk to upper management and business organizations
- In cooperation with VP Product & Engineering, you will set product priorities to ensure world class security products are delivered to the markets
- Prioritize product roadmaps based on business goals and constraints
- Focus on Avast Business segment/markets, be aware of expected trends in demand of security technology, and contribute to new ideas to drive future and potentially new demand
- Work closely with product marketing, sales, and engineering, to ensure the right features, positioning, pricing and promotions for all routes to market
- Codify feedback from the market to outline emerging customer needs, features, and functional requirements from which the marketing and development teams can design, build, test and implement new products and offerings
- Lead/support the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27001 standards
- Offer strategic direction, leadership and initiatives with the target to further strengthen and improve the Information Security Management function Develop strategies together with other governance functions and business divisions in order to mitigate information security risks, bringing them under explicit management control through the ISMS
- Working knowledge in cryptography technologies, PKI, CA, Symmetric/Asymmetric keys, key and certificate management
- Working knowledge in cryptography primitives (cyphers, modes of encryption, key establishing, hash functions, authentication digests, KDF/PKDF, randomization)
- General knowledge of Infrastructure Architecture and Design
- 2-5 years of analytic experience with an intelligence agency, law enforcement organization, the military, or the private sector
- Natural curiosity about world events
- Self-motivated, strong organizational and detail-oriented
Security Management Job Description
- Establish long-range security goals, define security strategies, metrics, reporting mechanisms and program services
- In conjunction with other stakeholders, develop, implement and maintain department policies and standards designed to maximize effectiveness and minimize costs related to the acquisition, implementation and operation of enterprise applications and infrastructure systems in a secure manner
- Educate EIS employees on security policies, changes to regulations and their responsibilities
- Manage the Information Security Identity Management team and associated systems and applications
- Assess the current federation and authentication environment and make continuous improvements for alignment with future state architecture
- Ensure regulatory requirements and industry best practices are followed
- Integrate IAM systems with in-house applications, third party applications and SaaS applications for provisioning, identity authentication, and developing connectors between IAM tools and system resources
- Work closely with Identity Access Management (IAM), Security Operations, Risk Management, Application owners, and Product managers to drive the identity strategy
- Drive the Privilege Access Management strategy and manage the PAM technology deployment and support
- Work with vendors and third parties to evaluate new products, features and solutions
- Degree in Information Security with a minimum of 5 years in the relevant field
- Strong interest in cyber security, and constantly updated with the latest cyber security events, trends and conferences
- Exceptional written and verbal communication and presentation skills necessary to work with cross-enterprise and cross-functional teams
- Key contributor in initiating new processes for managing security compliance in the account
- Minimum of Bachelor’s degree or international equivalent
- Extensive years of related experience required including either law enforcement, preferably federal, and/or corporate security, with demonstrated understanding of cyber security issues, preferably within a large digital company