VP, Cyber & CISO
Job in
Atlanta, Fulton County, Georgia, 30383, USA
Listing for:
The Security Executive Council
Full Time
position
Listed on 2026-02-07
Job specializations:
-
IT/Tech
Information Security, Cybersecurity
Job Description & How to Apply Below
About the job
Job Summary
The VP, Cyber and CISO (Chief Information Security Officer) is responsible for establishing, implementing, monitoring and enforcing a corporate-wide information security management program to help ensure that information assets are protected. This position is responsible for proactively identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the company.
The CISO has responsibility for building an accountable, information security-conscious culture and a system security infrastructure built on high quality standards backed-up by effective operational procedures and overseen by a security governance program.
Essential Functions
Program LeadershipResponsible for the strategic leadership of the information security program.Develops, implements and monitors a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality and availability of information that is owned, controlled or processed by the organization.Leads the Cybersecurity compliance activities that enable the business to become and remain compliant with various regulatory programs to include PCI, GDPR, and CCPA.Facilitates information security governance through the implementation of a governance program.Establishes annual and long-range security and compliance goals, defines security strategies, metrics, reporting mechanisms and program services; and creates a roadmap for continual program improvements.Provides regular and consistent reporting on the current status of the information security program to senior business leaders.Develops and oversees effective business continuity and disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event.Develops and enhances an information security management and control framework based on appropriate information security industry standards to measure the efficiency and effectiveness of the program, facilitates appropriate resource allocation, and increases the maturity of the security.Risk Management and Incident ResponseKeeps abreast of security incidents and acts as primary control point during significant information security incidents. Convene a Security Incident Response Team (SIRT) as needed, or requested, in addressing and investigating security incidences that arise.Manages security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company’s reputation.Defines and facilitates the information security risk assessment process, including the reporting and oversight of treatment efforts to address findings.Develops, implements and administers technical security standards, as well as a suite of security services and tools to address and mitigate security risk.Provides leadership, direction and guidance in assessing and evaluating information security risks and monitors compliance with security standards and appropriate policies.Creates a framework for roles and responsibilities regarding information ownership, classification, accountability and protection.Examines impacts of new technologies on the company’s overall information security.Establishes processes to review implementation of new technologies to ensure security compliance.Policy, Compliance and AuditDevelops, maintains and publishes up-to-date information security policies, standards and guidelines.Oversees the approval, training, and dissemination of security policies and practices.Leads efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the information technology systems.Works with Internal Audit and outside consultants as appropriate on required security assessments and audits.Ensures that security programs follow relevant laws, regulations and policies to minimize risk and audit findings.Provides…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here: