The Senior Software Information Security Officer/Advisor (ISO) is accountable to ensure that information security risks within technology development are identified, assessed and reported, appropriate controls are in place, and local procedures and activities comply with Information Security (IS) Corporate Policy and Standard, the Information Security Manual (ISM), local standards and regulatory requirements. In addition, the ISO is the center of competence for Information Security, providing advisory services, and is aligned to the LOB.
Consulting and Advisory
- Work closely with portfolio personnel, stakeholders, and senior management to identify Information Security related risks and controls.
- Provide Information security requirements advice and counsel to portfolio personnel, project teams, and the Business ensuring alignment to IS processes and solutions.
- Lead security design of “projects” (application/infrastructure/etc) as required.
- Manage/facilitate Information Security Assessments (ISA) throughout the project lifecycle ensuring key risks highlighted and controls identified and implemented to mitigate risk. Assessment function must be segregated and independent from design input.
- Lead the Information Security portion of the TDEI Application and Infrastructure Health Checks as required.
- Evaluate and assess emerging security threats and vulnerabilities in portfolio and work with portfolio personnel to identify appropriate controls.
- Provide portfolio personnel guidance in understanding and responding to security incidents with appropriate stakeholders.
- Complete Information Security assessments for new and existing suppliers, including site visits and evaluation of RFP responses, where appropriate.
- In cooperation with Strategic Sourcing and Outsourcing Centre of Competency, participate as required in contract due diligence reviews for any supplier agreements involved in the portfolio.
- Provide consultation to portfolio and legal personnel in the negotiation of Information Security related contractual clauses with suppliers.
- Governance and Control:
- Implement information security risk governance and control framework for the local organization that incorporates a consistent, sustainable methodology for identifying, assessing, and documenting information security risk that provides early warning of potential failure to meet information security requirements.
- Directs and monitors due diligence of information security risk processes (including ISA and Supplier assessments) and results on an ongoing basis
- Oversee and manage portfolio of Information Security Manual exceptions (ISMEs) to ensure these are current, accurate and are supported by sound resolution plans
- Complete portfolio level risk assessments
- Interprets and acts on IS reports.
- Ensure compliance to standards specific to the local organization, consistent with IS policies and guidelines, and with T&O control frameworks (eg. CMMI, ITIL) via share services (i.e. CMRP).
- Review and provide recommendations to IS policies, standards, guidelines/ processes.
- Escalate IS potential or unresolved issues to management for resolution as appropriate
Consolidate, interpret and report key information security risk, trends for the portfolio and understand effectiveness of controls in managing the key risks. This includes standard and ad hoc analyses and reporting for a variety of stakeholders including: local organization, Operating Group, IS Corporate Support Area (CSA) and others as appropriate. Integrates, interprets and analyzes data to produce portfolio information security risk profile for the local organization and IS CSA, identifying potential exposures and trends.
Identify and report IS trends by reviewing portfolio risk assessments and compliance risk reports.
Report on portfolio of ISME’s, complete trending analysis and collaborate with other ISO’s to determine and report on aggregate risk exposure and develop and propose joint solutions.
Training and Awareness
Participate and facilitate communication, and training, to promote effective Information Security risk management and embed IS Risk Management controls and practices within the local organization, leveraging existing programs where available.
Promoting awareness and knowledge of good Information Security practices in the general and specific (eg. developer) local populations, with guidance from IS CSA e.g. via training and awareness sessions, communication programs
Assist local organizations in developing and implementing their own unit or role specific Information Security training and awareness programs as appropriate.
- Bachelor or Master Degree in Information Security or equivalent
- Information Security certification is encouraged e.g. CISSP, CISSLP, GIAC etc., but not mandatory.
- 7-10 years’ experience gathering and reviewing technical requirements and working with development teams to provide Information security requirements advice and counsel, ensuring alignment to IS processes and solutions
- Experience reviewing security design / architecture for security controls
- Experience with Threat modelling
- In depth knowledge of Information Security risk and industry best practices
- In depth knowledge of software application security practices and tools and software assurance (white box testing)
- Working knowledge of web application vulnerability assessment tools such as AppScan and WebInspect
- Working knowledge of development languages (e.g. J2EE, C#, .NET, Ajax), secure coding practices, and static code analysis tools such as Fortify
Please forward resumes in Word format to Dolly Azad firstname.lastname@example.org