×
Register Here to Apply for Jobs or Post Jobs. X

Manager Information Security

Job in Oklahoma City, Oklahoma County, Oklahoma, 73116, USA
Listing for: WEOKIE Federal Credit Union
Full Time position
Listed on 2025-12-27
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, IT Project Manager
Job Description & How to Apply Below

The Manager Information Security is responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan.

Responsibilities
  • Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program.
  • Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats.
  • Organizes and conducts cybersecurity simulation exercises.
  • Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit.
  • Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated.
  • Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied.
  • Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned.
  • Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials.
  • Support technology/systems that enable all vendor management activities by administering the Tandem platform.
  • Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities.
  • Maintain, develop, update, and test WEOKIE’s Business Continuity Plan.
  • Write reports to summarize testing activities, including results and recommendations.
  • Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE’s Business Continuity Plan is implemented.
  • Governance and Reporting
  • WEOKIE’s information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs.
  • Information Security risks and threats are clearly identified, measured and remediated timely.
  • The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts.
  • Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities.
  • WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources.
  • WEOKIE’s information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders.
  • Risk assessments are completed annually and deficiencies are quickly addressed and/or remediated.
  • Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented.
  • New quality control activities are developed and presented to leadership that correspond to the information security program.
  • Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately.
  • Vendor Management is collaboratively managed with fellow team members.
  • Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures.
  • WEOKIE’s Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident.
  • Specialized or Technical Knowledge and Skills
  • The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working…
  • To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary