×
Register Here to Apply for Jobs or Post Jobs. X

Manager Information Security

Job in Oklahoma City, Oklahoma County, Oklahoma, 73116, USA
Listing for: BOSTON TRUST WALDEN COMPANY
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 90000 - 120000 USD Yearly USD 90000.00 120000.00 YEAR
Job Description & How to Apply Below

We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector.

The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan.

Major

Activities:

  • Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program.
  • Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats.
  • Organizes and conducts cybersecurity simulation exercises.
  • Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit.
  • Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated.
  • Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied.
  • Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned.
  • Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials.
  • Support technology/systems that enable all vendor management activities by administering the Tandem platform.
  • Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities.
  • Maintain, develop, update, and test WEOKIE's Business Continuity Plan.
  • Write reports to summarize testing activities, including results and recommendations.
  • Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented.
  • Critical Results:

  • WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs.
  • Information Security risks and threats are clearly identified, measured and remediated timely.
  • The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts.
  • Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities.
  • WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources.
  • WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders.
  • Risk assessments are completed annually and deficiency are quickly addressed and/or remediated.
  • Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented.
  • New quality control activities are developed and presented to leadership that correspond to the information security program.
  • Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately.
  • Vendor Management is collaboratively managed with fellow team…
  • To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary