FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Director Of Information Technology Security

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Director Of Information Technology Security Skills

Below we've compiled a list of the most important skills for a Director Of Information Technology Security. We ranked the top skills based on the percentage of Director Of Information Technology Security resumes they appeared on. For example, 10.6% of Director Of Information Technology Security resumes contained Ensure Compliance as a skill. Let's find out what skills a Director Of Information Technology Security actually needs in order to be successful in the workplace.

These are the most important skills for a Director Of Information Technology Security:

1. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Director Of Information Technology Security jobs:
  • Lead integration of acquired businesses identifying and directing infrastructure modifications of new partners to ensure compliance with corporate technology standards.
  • Produced certification and accreditation materials and provide recommendations to federal customers to ensure compliance with FISMA.
  • Conduct internal security scans with industry penetration tools to ensure compliance.
  • Managed, developed, and deployed third party security standards for risk assessment methodologies to ensure compliance with standards.

Show More

2. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Director Of Information Technology Security jobs:
  • Introduced a new data platform into existing web infrastructure to integrate enhanced functionality for user self-servicing and streamlining user interaction.
  • Managed project to provide a Cisco wireless infrastructure for campus-wide network access.
  • Developed a robust and actionable infrastructure monitoring solution.
  • Participated in the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Version 5 Transition Program.
  • Created a Global Service model for a Shared Services organization managing Infrastructure as well as Oracle HR and Finance systems.
  • Directed all Information Technology activities: Service Desk, Web Development, Mainframe Software Development, Database, and Infrastructure.
  • Developed security road map and recruitment of IT security professionals to build an infrastructure, application, forensics and audit.
  • Manage Summit Hospital's information and telephone system infrastructure supporting multiple platform, hardware and software reporting to CEO.
  • Managed service delivery and support team, enterprise applications team, network, storage and system infrastructure team.
  • Perform security, vulnerability, and risk assessments of critical systems, infrastructure, and third parties.
  • Streamlined collections process, deploying new VoIP phone system for call center and implementing new network infrastructure.
  • Implemented IT Infrastructure controls: User Access Management, Encryption, and System Activity log reviews.
  • Upgraded infrastructure with new HP domain controllers, expanded current SAN to total 40 TB data.
  • Designed and implemented the upgrade of MGRMC network infrastructure to Cisco hardware and software.
  • Lead the creation of high-performance, medical grade technology infrastructure.
  • Implemented Cisco ISE (NAC) and Cisco Prime Infrastructure.
  • Deploy operational standards for Infrastructure (HW and SW) deployments * Exceptional communication skills-both verbal and written-are required.
  • Developed and implementing multilayer, multi-lateral offensive and defensive security infrastructure.
  • Planned, coordinated and moved IT infrastructure from co-located data center in Los Angeles, to CenturyLink data center in Burbank.
  • Modernized the infrastructure, including installing fully redundant SAN and virtualization technologies to provide failover in the event of an outage.

Show More

9 Infrastructure Jobs

No jobs at selected location

3. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Director Of Information Technology Security jobs:
  • Develop, implement, monitor, and maintain relevant policies and procedures and responsible for global Information Technology and Security operations.
  • Represented the organization in formal meetings with clients and business partners on matters regarding information technology/physical security problems and compliance.
  • Create and publish Information Technology System of Internal Controls, including all policies and procedures for Information Technology operations.
  • Developed Information Technology, Network Operations budget and ensured that operations stayed within or below approved budget levels.
  • Provided leadership in planning, designing, and implementing business plans with information technology strategies.
  • Provide vision and executive leadership for developing and implementing clinical and financial information technology initiatives.
  • Provided Information Technology Security design, implementation and management.
  • Budget all Information Technology and Graphic Design expenditures.
  • Serve as agency Information Technology Security Officer.
  • Manage Information Technology operations and employees.
  • Established and directed the strategic long-term goals, policies and procedures for all Medical Center information technology hardware and software systems.
  • Oversee the training, development, and the fostering of a team atmosphere in the Information Technology area.
  • Develop, implement, and review of the School of Management's Information Technology (IT) strategy.
  • Set strategic and tactical direction, and oversee global Information Technology & Enterprise Security teams.
  • Continue to lead all aspects of the Information Technology department including security officer duties.
  • Make necessary purchases for the School of Management related to Information Technology needs.
  • Managed all Information Technology's consultants and vendors.
  • Manage multi-million dollar Information Technology & Security budgets across global locations.
  • Defined high-level company-wide architectures focusing on the development of Information Technology to meet the bank's needs and budget.
  • Document all of the School of Management's Information Technology systems and functions.

Show More

7 Information Technology Jobs

No jobs at selected location

4. Recovery Procedures

demand arrow
high Demand
Here's how Recovery Procedures is used in Director Of Information Technology Security jobs:
  • Oversee disaster recovery procedures and implement new technologies to simplify and improve recovery time.
  • Develop, review, and certify all back-up and disaster recovery procedures and plans.

Show More

5. Windows XP

demand arrow
high Demand
Here's how Windows XP is used in Director Of Information Technology Security jobs:
  • Upgraded and standardized all workstations and phased out Windows XP companywide.
  • Replaced Windows XP (end of life) workstations with Windows 7 workstations (using "golden images").

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. Hipaa

demand arrow
high Demand
Here's how Hipaa is used in Director Of Information Technology Security jobs:
  • Developed HIPAA Security Policies and implemented systems to ensure compliance.
  • Maintained information security compliance with HIPAA regulations.
  • Applied knowledge of HIPAA regulations, security and information technology to ensure current vendor contracts are current and correctly interpreted.
  • Worked at the national level to modify and edit the HIPAA regulations before they were finalized.
  • Ensured the security of patient health information in compliance with the federal HIPAA regulations.
  • Lead the national facility HIPAA audit of technical, physical & administrative controls.
  • Develop GDIT HIPAA Privacy Program in support of Federal and Commercial business.
  • Formed HIPAA Steering Committee and sat as chair on the committee.
  • Developed Business Continuity Plan to ensure compliance with HIPAA Security Rule.
  • Documented all policies and procedures based on HIPAA Regulations.
  • Perform privacy and HIPAA audits & mock surveys.
  • Completed HIPAA/HITECH Risk Assessment and Corrective Action Plan.
  • Implemented HIPAA Security rule for the organization.
  • Worked day-to-day with NIST, FISMA, HIPAA, PCI, ISO 27002, NERC, FERC (CIP).
  • Defined and implemented policies and procedures in regards to ITIL, Security, IT, and HIPAA.
  • Key Achievements: Requested to lead the HIPAA Compliance Program after two weeks of employment.
  • Created and implemented auditable internal controls compliant with HIPAA, Sarbanes-Oxley, and Privacy Acts.
  • Enforced companywide HIPAA compliance's for New York state regulations.
  • Assessed and remediated deficiencies relating to the HIPAA Security rule.
  • Re-designed education materials for IT and HIPAA orientation .

Show More

7. External Auditors

demand arrow
high Demand
Here's how External Auditors is used in Director Of Information Technology Security jobs:
  • Performed internal security audits and worked with external auditors annually o Developed and implemented the company's first Security Training program.
  • Worked closely with Internal and External Auditors, (PWC) Vendors, Networking, Telecommunications and Security.
  • Worked with external auditors for SOX and PCI-DSS compliance.

Show More

8. Information Security Policies

demand arrow
high Demand
Here's how Information Security Policies is used in Director Of Information Technology Security jobs:
  • Develop and implement the organization's information security policies and procedures.
  • Created information security policies and standards program to meet the global and local business requirements.
  • Manage, Develop and Enforce Global Information Security policies and standards.

Show More

3 Information Security Policies Jobs

No jobs at selected location

9. Architecture

demand arrow
high Demand
Here's how Architecture is used in Director Of Information Technology Security jobs:
  • Provided leadership for Planning and coordinating technical security architecture, design and development teams.
  • Develop security architecture and policy in adherence to regulations and best practice.
  • Establish technical architecture plan consistent with application and business goals and objectives.
  • Continue to stay abreast of IT and best practices relating to IT infrastructure, architecture and methodologies.
  • Challenged to facilitate corporate move from Main Frame to Mini architecture with Big Data/WEB 2.0 aspects.
  • Hired staff and brought in managers, elevating competencies from IT1 through architecture.
  • Reduced costs by 25% by re-negotiating vendor contracts and re-engineered network architecture.
  • Lead Web Infrastructure Design and Architecture group.
  • Facilitate systems lifecycle management, architecture, testing and implementation and integration along with technical standard enforcement.
  • Worked with financial systems consultant to redesign system architecture for Microsoft Dynamics.
  • Developed IT strategy, enterprise security architecture and technology roadmap.
  • Facilitated architecture overhaul of Network, Messaging, and content management infrastructure with an emphasis on a roadmap for growth.
  • Managed enterprise Sharepoint architecture platform and services supporting over 300 company portals and websites for 20 lines of business.
  • Created the network architecture and led the IT development of a sixty turbine wind farm.
  • Created architecture designs and implemented core virtualizations models for the entire AGO server systems.

Show More

3 Architecture Jobs

No jobs at selected location

10. PCI

demand arrow
high Demand
Here's how PCI is used in Director Of Information Technology Security jobs:
  • Facilitate PCI compliance efforts for Document Management Division to achieve approved vendor status with Visa.
  • Designed organizational information security infrastructure to meet PCI-DSS requirements.
  • Worked with the auditors preparing the annual compliance report and revised security practices when required to maintain PCI-DSS compliance.
  • Evaluate MSB compliance and Tool requirements for 933 PCI in scope systems prior to the FY13 PCI audit.
  • Manage all aspects of PCI Level 1 Service Provider audits, penetration tests, and polices.
  • Performed required annual PCI DSS audits in conjunction with Internal Audit and 5th 3rd Bank.
  • Reviewed third-party IT vendors and Service Providers to ensure SAS-70 and PCI DSS compliance.
  • Overhauled PCI and SOX compliance procedures and technology, shortened audit delivery time.
  • Led communication with stakeholders regarding all SOX, GCB and PCI audits.
  • Developed and maintained the Security Compliance department to meet PCI compliance.
  • Developed policies and Procedures for PCI Assessments of customers.
  • Received PCI (payment Card Industry) compliance certification.
  • Led annual compliance effort to address PCI gaps.
  • Advise business units on PCI concerns.
  • Lead SOC 2/3, PCI (3.0) compliance efforts.
  • Coordinated and led efforts to become PCI compliant --Implemented infrastructure monitoring, backups, upgrade policies and procedures.
  • Steered Rodale from a non-PCI compliant status to a valid PCI complaint level-3 and 2 merchant.
  • Architected defense in depth security programs that meet PCI, SOX, HIPAA requirements.
  • Achieved Level 2 PCI 2.0 certification for multi-tenant cloud environment for multiple years.
  • Evaluated industry regulations such as PCI, GLBA, SOX, FFIEC/OCC issuances to determine IT control and security requirements.

Show More

11. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Director Of Information Technology Security jobs:
  • Perform risk assessments and assess security capabilities of new businesses and acquisitions.
  • Conducted risk assessments and provided recommendations for system and application design.
  • Risk Management: Protected vulnerable networks following detailed risk assessments.
  • Perform ongoing information risk assessments and audits to ensure that information systems are adequately protected and meet HIPAA and HITECH requirements.
  • Led customer discussions for discovery, customer audits, and risk assessments.
  • Perform risk assessments to develop response strategies.
  • Led multi-department teams performing ITGC, GLBA, and Vendor risk assessments including action plans, saving over $260,000 annually.
  • Performed security and compliance audits, Internal Control reviews, special Investigations, and risk assessments.
  • Manage the execution of periodic IT Risk assessments, vulnerability & penetration testing.

Show More

12. Governance

demand arrow
high Demand
Here's how Governance is used in Director Of Information Technology Security jobs:
  • Developed and implemented policy, and associated governance, risk and control framework to enable effectively management of risk.
  • Developed and implemented leading-edge security policies, security awareness and training activities, governance, and risk strategies.
  • Developed governance models for core technologies to ensure open communication and proactive management of systems and data.
  • Established technical security governance for an 18,000 user organization establishing formal security status and incident reporting.
  • Developed a governance model for Global IT Security operations.
  • Restored security and risk management platform, policies, and core procedures to best practices and re-established governance processes within IT.
  • Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures and processes.
  • Developed Risk Management Framework and Governance * Plans and policies to comply with internal, external and regulatory auditors.
  • Galvanized the development and implementation of all IT governance as the foundation for a strong internal control.
  • Managed budgets serving the technology needs of the enterprise and developed IT Governance process and reporting.
  • Defined and managed a global governance model for $280mm outsourcing contract.
  • Provided governance, program portfolio management guidance, and best practices.
  • Automated governance framework in Archer GRC solution.
  • Designed and established technology risk governance framework and practices to enable successful transition to publicly traded independent company.
  • re-engineered the governance framework to more effectively focus on the identification and mitigation of business disruption risk.
  • Directed and implemented Security Operations and Compliance, IT Risk Management, Access Management, and Audit Governance and Compliance.
  • Performed Business Analytics that developed Governance Risk & Compliance (GRC) strategy formulation, business counseling, and policies/procedures.
  • Developed an IT Security governance program in order to implement Federal, Department of Commerce and OMB directives.
  • Implemented IT Governance Structure: o Reinitiated and chair the Information Technology Steering Committee (ITSC).
  • Developed the IT Baseline Security framework and performed oversight of IT Governance.

Show More

4 Governance Jobs

No jobs at selected location

13. Risk Management

demand arrow
high Demand
Here's how Risk Management is used in Director Of Information Technology Security jobs:
  • Designed and executed risk management and security patch management solutions to allow for rapid response to security incidents occurring anywhere worldwide.
  • Lead the evolution of Supplier Risk Management by introducing supplier inherent risk aligned to contract material terms and focused assessment criteria.
  • Managed project/controlled Risk Management, Business Resiliency, & Disaster Recovery and covered Regulatory and Net Capital Reporting.
  • Result: achieved integration implementation and risk management to ensure capacity, etc.
  • Focus: Global infrastructure management and IT Security/Risk Management.
  • Chaired international security, compliance and risk management committee.
  • Performed Risk Management function for applications and practices.
  • Established comprehensive enterprise security and risk management program.
  • Established supporting methodology for Risk Management.
  • Aligned the $34M technology infrastructure budget to deliver more services, increase customer satisfaction, and improved risk management posture.
  • Guide project planning, prioritization, budgeting, asset and resource allocation, risk analysis, and risk management activities.
  • Implemented a risk management plan assessing needs and adjusting SLA's as necessary to support the risk management plan.
  • Designed, developed, and directed the Information Security Risk Management, and Compliance Programs.
  • Created risk management policies for the bank.
  • Supported Operational Risk Management, Basel II aspects of technology, and BPO needs across all LOBs.
  • Provided leadership, vision, and direction for the IT Security and Risk Management function.

Show More

6 Risk Management Jobs

No jobs at selected location

14. Information Security Program

demand arrow
high Demand
Here's how Information Security Program is used in Director Of Information Technology Security jobs:
  • Transformed the existing security group from tactical account transactions to a strategic information security program chartered by executive leadership.
  • Led and implemented enterprise information security program including high-level strategies, policies, standards and procedures.
  • Implemented a layered, defense-in-depth information security program that reduced security risks.
  • Developed and documented and Information Security Program.
  • Build and lead a new information security program.
  • Directed compliance for VISA Cardholder Information Security Program and Mastercard SDP compliance for enterprise infrastructure.
  • Established information security program- created the mission, vision, and roadmap, and identified security gaps for improvement.

Show More

4 Information Security Program Jobs

No jobs at selected location

15. SOX

demand arrow
average Demand
Here's how SOX is used in Director Of Information Technology Security jobs:
  • Provide SOX audit testing of general security controls to ensure regulatory compliance for critical applications.
  • Worked with Finance & Audit, developed a program for SOX404, GLB and California Privacy Law compliance and readiness.
  • Avoided fines and penalties by achieving and maintaining PCI, HIPAA, and SOX compliance.
  • Worked with process owners to create new IT Internal Control Risk Control Matrix for SOX.
  • Tested and documented controls for SOX-404 and SSAE-16 audit opinions for 2010 - 2015.
  • Reviewed the SOX control wording and design ?appropriate test plans.
  • Support internal and external audits including SOX.
  • Managed all infrastructure SOX compliance and reporting.
  • Develop Security, Change Control, Sox IT Compliance and Monitoring Strategies.
  • Managed client IT program to attain SOX compliance.

Show More

2 SOX Jobs

No jobs at selected location

16. Project Management

demand arrow
average Demand
Here's how Project Management is used in Director Of Information Technology Security jobs:
  • Provided electronic project management and quality improvement tools yielding productivity improvements for IT, maintenance, lab, and nursing departments.
  • Provide project management and be responsible for the development and implementation of goals and objectives of assigned technology related projects.
  • Incorporated continuous process improvement techniques into the SDLC, including the establishment of standard project management procedures and guidelines.
  • Provide project management, cost justification and ensure business participation for the implementation of Security projects.
  • Input included value propositions, project management office structure, and project initiation and prioritization.
  • Introduced Security, Compliance and Business Continuity standards into project management and application development processes.
  • Formalized implementation of the project management office guiding staff through critical path development goals.
  • Implemented Strategic and Tactical Planning, and Project Management Methodologies.
  • Integrated information security into the project management methodology.
  • Practice includes dealing with C level executives specific to IT Project Management, Business Analysis, Project Coordination and IT Security.
  • Assisted in the project management of ensuring updates to the ?SOX test plans from over 15 control owners.
  • Provide leadership, daily operations, direction, communication, and support to individuals in the project management team.
  • Design and provide project management over information technology components for the new hospital currently underway in the design phases.
  • Program and Project Management: Organized and Managed the planning, approval and execution of information security projects.
  • Project Management for various projects including: Point Click Care (EHR System).
  • Project Management skills utilized to deliver simultaneous projects on time, within budget.
  • Designed and built IT Helpdesk, Project Management and Security departments during rapid company growth period.
  • Performed Product & Project Management for McAfee's entire anti-virus sw security suite.
  • Offered input to the Enterprise IT Project Management Office (PMO) Managers on possible improvements and roadmaps.

Show More

1 Project Management Jobs

No jobs at selected location

17. Cloud

demand arrow
average Demand
Here's how Cloud is used in Director Of Information Technology Security jobs:
  • Managed cloud transition and operations of several key technologies responsible for portal and administrative computing.
  • Define requirements and deployment specifications for expansion of tools into public cloud environment.
  • Set product requirements for cloud based security offerings.
  • Experience with cloud operations and cloud security architecture.
  • Project manager for moving 500 users from in-house Microsoft Exchange server to Microsoft Office 365 cloud based environment within 2 months.
  • Transitioned from stand-alone hardware to cloud solutions for back office systems and other non-confidential privacy type systems.
  • Experience implementing Office 365, Azure Cloud Service to include SharePoint Online, in various State Agencies.
  • Support large scale network design and service deployments in private and public cloud environments.
  • Worked on strategic business strategies to migrate services to the cloud for enhanced continuity.
  • Designed a cloud based video conference solution for communications internal to the firm.
  • Analyzed, negotiated, and deployed cloud security and backup solution globally.
  • Established cloud-based services for campus websites, data storage, and databases.
  • Adopted and promoted cloud data storage in the dot com era.
  • Championed new private cloud technology and led training on new systems.
  • Implemented RDS clusters within the new GTA private cloud.
  • Design data center deployments, Amazon Cloud environments.
  • Integrate SAP and SalesForce sales cloud.
  • Designed a technology roadmap to migrate the company from existing technology and applications to a cloud-based architecture.
  • Reduced costs significantly, implementing virtualization and cloud computing.
  • Retire Rightnow and migrate to Service Cloud, Integrate Sales Cloud and Service cloud to create value for the customers.

Show More

3 Cloud Jobs

No jobs at selected location

18. Data Privacy

demand arrow
average Demand
Here's how Data Privacy is used in Director Of Information Technology Security jobs:
  • Engaged the leadership team and cross-functional stakeholders to construct the initial EU Data Privacy strategy for the enterprise.
  • Act in a consultative capacity regarding audit issues, technical controls, and data privacy considerations.
  • Manage a public cloud onboarding process, which includes a security risk assessment, technology evaluation and data privacy analysis.

Show More

19. Voip

demand arrow
average Demand
Here's how Voip is used in Director Of Information Technology Security jobs:
  • Develop enterprise-wide VoIP readiness assessment and detailed implementation plan.
  • Voice and data communications problems were resolved by implementing an MPLS network to support VoIP and other IP requirements.
  • Implement WAN solutions to network, VoIP and Active Directory between Boston, New York and Philippines office.
  • Implemented Cisco VOIP system across enterprise encompassing 500+ phones in 3-state region replacing 6 diverse telephone systems.
  • Plan, design, configuration and maintenance of company- wide PBX system based on VOIP technology.
  • Developed and deployed audio conference, video conference, VoIP, and e-mail solutions.
  • Worked closely with telecommunication vendors to upgrade our phone system to VoIP.
  • Manage and setup as needed VOIP/PBX phone system in a LAN environment.
  • Connected satellite office with company via cost-effective MPLS network and VoIP.
  • Introduced VOIP at $615K savings over current PBX phone system.
  • Leveraged multiple vendors to negotiate a $2M VOIP project.
  • Defined and implemented corporate wide VoIP and eFax communications platform.
  • Implemented a VoIP solution to unify the major administrative offices and reduced aggregate telecom costs by over 40%.
  • Designed and instituted Avaya IP Office VOIP phone system with a central server.
  • Implemented QoS for the VoIP traffic Planned and Implemented SOPHOS endpoint security and Sophos Secure Web Gateway.
  • Engineered multi-site, redundant, Mitel 3300 based VoIP system.
  • Selected, managed, supported, trained and implemented Meditech client version 5.63 Implemented VOIP Phone system and supported Nortel PBX

Show More

20. ISO

demand arrow
average Demand
Here's how ISO is used in Director Of Information Technology Security jobs:
  • Authored ISO 27014 procedures and security policies in support of engineering operations, participating in regular audits to confirm regulatory compliance.
  • Directed departmental operations and supervised employees directly and through lower level managers and supervisors.
  • Established the first enterprise-wide data security policy following ISO 17799 guidelines.
  • Served as the liaison between the Automotive Group and user representatives to assemble business requirements for the development of operational reports.
  • Help set objectives and goals for the supervisors and administrators and meet with them regularly to assess performance.
  • Developed Information Security Management System (ISMS) for ABM's ISO 27001 certification process.
  • Implemented monthly Security Advisory Board to set planning and strategy road mapping with all business heads
  • Act as a management liaison between stakeholders and the Enterprise Systems Management team.
  • Work closely with the Chief Information Security Officer (CISO) and Sr.
  • Implemented ISO/IEC 27000, 27004, 27015 certification standards.
  • Created a Risk Assessment Template based on ISO 17799.
  • Reported security compliance to the CISO
  • Conduct office automation feasibility studies, including workflow analysis, space design, or cost comparison analysis.
  • Install virtual hypervisor infrastructure network supporting classroom teaching, research and school administration functions.
  • Acted as trusted advisor to senior business executives to assist them to make informed, pragmatic, risk-based decisions.
  • Virtualized all clients local and remote to provide data and infrastructure isolation.
  • Manage $500,000 security budget for Informa Member of and collaborator in the Information Security Advisory Board for Informa.

Show More

3 ISO Jobs

No jobs at selected location

21. Data Loss

demand arrow
average Demand
Here's how Data Loss is used in Director Of Information Technology Security jobs:
  • Develop and implement enterprise IT Security polices related to data security, data loss prevention, incident disposition & data classification.
  • Expanded the Data Loss Prevention program to automate blocking of sensitive data leaving the organization.
  • Incorporated internal Data Loss Prevention (DLP) measures to protect proprietary data and code.
  • Managed critical data loss investigation that was ultimately turned over to the FBI.
  • Implemented Code Green for data loss prevention.
  • Administer Cisco Ironport for email encryption, anti-spam/anti-virus & data loss prevention.

Show More

4 Data Loss Jobs

No jobs at selected location

22. Active Directory

demand arrow
average Demand
Here's how Active Directory is used in Director Of Information Technology Security jobs:
  • Design and manage the redundant Microsoft Active Directory infrastructure serving administrative, research and teaching requirements.
  • Managed user access using Microsoft Active Directory for multiple domains.
  • Managed and audited Active directory and security group policy structure.
  • Assumed ownership of Active Directory Security.
  • Redesigned Active Directory structure and implemented GPO's to manage and protect the network globally, according to policies and procedures.
  • Migrated Windows NT 4.0 domain/Exchange 5.5 to Windows 2003 Active Directory and Exchange 2003 with voice integration.
  • Upgraded messaging hub and directory services serving over 30,000 users to Exchange 2000 and Active Directory.
  • Manage Windows 2003 domain environment utilizing Active Directory and Exchange server supporting over 100 users.
  • Designed and migrated MGRMC network from Windows NT 4.0 domain model to Windows Active Directory.
  • Supported 200+ user accounts, three locations, Active Directory management and maintenance.
  • Received and Built HP/Compaq servers with Windows 2003 Active Directory.
  • Deployed and managed a Windows Active directory LAN environment all Malrite businesses.
  • Managed multi-site Windows 2008 R2 Active Directory (Waltham to Cincinnati) including monitoring of replication between Domain Controllers.
  • Plan and implement Cisco and Hp routers and swtiches upgrade Active Directory administrator Database Server Administration Wireless Network implementation and Administration.

Show More

23. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Director Of Information Technology Security jobs:
  • Purchased and deployed new Information Security Lab equipment and software necessary for forensic and incident response capabilities.
  • Developed and institutionalized a Security Incident Response team and operational processes.
  • Automated incident response procedures to increase security responsibilities by 4x.
  • Provided technical lead for security incident response teams.
  • Performed Incident Response function for Security-related threats.
  • Facilitated MSSP (Managed Security Services Provider) contract and services implementation as well as manage vendor and incident response.
  • Develop incident response management processes and implement risk management practices in the kill chain to restore systems to normal operations.
  • Introduced and implemented audit compliant ITIL practices, SLA resolution and Incident Response procedures.
  • Established and documented the Computer Security Incident Response Team (CSIRT).
  • Lead incident response engagements, and have extensive incident response experience.
  • Developed and matured the Security Incident Response Program for the enterprise.
  • Received DOC CIRT recognition for a knowledgeable incident response team
  • Provided Incident Response support for customers including malware analysis and network forensics support.
  • Served as an escalation point for IT Operations incident response and request fulfillment in a [ ] op?orating environment.

Show More

8 Incident Response Jobs

No jobs at selected location

24. IP

demand arrow
average Demand
Here's how IP is used in Director Of Information Technology Security jobs:
  • Establish and manage business relationships, contract negotiations and recommendation to senior management on current and new technology solutions.
  • Implemented security measures including a network based IDS/IPS system at gateway for traffic monitoring and analysis.
  • Performed surveillance on organizational property and employees using IP security cameras and employee monitoring software.
  • Provide leadership in effective use of innovative and emerging technologies.
  • Provide project management leadership and coaching for new software/hardware implementations.
  • Develop and enhance cooperative interdepartmental and vendor relationships and communications.
  • Boosted availability, functionality, and flexibility of the corporate telephone system with the implementation of a flexible Cisco VoIP system.
  • Prepare budgets and quotes for equipment and software, negotiate with vendors for improved pricing.
  • Manage vendor contracts and maintenance agreements for software and computer and network equipment.
  • Worked with managers and legal counsel when a HIPAA security breach was reported.
  • Assumed leadership responsibility for the organization's PMO and Software Engineering teams.
  • Trained all employees and vendors in HIPAA compliance and reporting guidelines.
  • Chair IT Steering Committee and HIPAA Security Committee.
  • Create HIPAA policies and procedures.
  • Provided cost and resource scoping, including job descriptions and labor rate analysis required to respond to RFPs.
  • Managed the migration of MGRMC's PBX phone system to a Cisco VoIP and Unity voicemail system.
  • Designed, secured, and set the network and subnets on 4+ sites following HIPAA guidelines.
  • Manage the upgrade and maintenance of active directory-based Windows 2003/2008 network, multi-site, redundant, Mitel 3300 based VoIP system.
  • Collaborated with other disciplines, the IT Team and strategic business partners (i.e.
  • Maintain Avaya phone systems, IP Office, Definity, Intutity, VoIP * Supervised three employees in Help Desk.

Show More

25. Network Security

demand arrow
average Demand
Here's how Network Security is used in Director Of Information Technology Security jobs:
  • Led an Enterprise Information Security Program protecting Internal Network Security and Customer Corporate Cloud based Applications with no successful compromises.
  • Ensured network security, platform security, and wireless security processes and technologies were sufficient to support business requirements.
  • Analyzed information architectures and corrected technology direction for systems, applications, and network security.
  • Evolved Corporate Network Infrastructure from flat to VLAN architecture improving performance and network security.
  • Planned and implemented secure wireless infrastructure to ensure network security and mobility.
  • Performed network security and application level vulnerability scans on a daily basis.
  • Supervised team of 40 network and security engineers in the accomplishment of Center's information and network security objectives.
  • Managed Barracuda appliance to improve network security, secure corporate email, and reduce vulnerabilities into the network.
  • Researched, implemented and set up TrackIt System to augment network security, alarm and recording systems.
  • Team member Network Security Architecture Council reporting to CISO and CIO.
  • Established security team to detect and respond to cybersecurity events and reduce network security risk.
  • Produced MS Project plans to manage PMO Startup and Network Security projects.

Show More

3 Network Security Jobs

No jobs at selected location

26. Vmware

demand arrow
average Demand
Here's how Vmware is used in Director Of Information Technology Security jobs:
  • Utilized existing VMWare infrastructure to accommodate Electronic Medical Record system for Emergency Departments saving $100,000.
  • Created co-repositories, utilized SharePoint system for documentation storage, and established VMware security boundaries.
  • Redesigned the office data center to deploy a VMware/EMC virtual solution, increasing system performance, while reducing operating costs.
  • Updated legacy platforms by migrating applications to a VMWare centralized framework saving $120,000 in hardware costs.
  • Performed recent physical and Virtual (VMWare) server upgrades to Windows Server 2012 R2.
  • Installed VMware ESX and Win2008 servers on DELL Servers.
  • Virtualized server farm (14 servers) into a pair of geographically diverse redundant bare metal servers based on VMWare 3.5.
  • Manage VMware data center virtualization to reduce server footprint, expedite provisioning and reduce power, hardware and hosting costs.
  • Virtualized corporate data center from 300 real servers to 40 VMWare virtual servers.
  • Key Business Partners include Akamai, Lockheed Martin, VMWare, and NetApp
  • Architected VMWare server deployment for QA lab.
  • Exhibit experience in VMware and Citrix virtualization (server, desktop, application) and surrounding technologies.

Show More

27. Cyber

demand arrow
average Demand
Here's how Cyber is used in Director Of Information Technology Security jobs:
  • Increased awareness and transparency of complex technology and cyber-security risks using an award-winning technology risk reporting approach.
  • Directed Information and cyber security, including external and internal penetration testing and security kill chain process.
  • Lead implementation of two-factor authentication (DuoSecurity) in support of cybersecurity requirements of DoD projects.
  • Performed Audits for customers to include cyber security, to disaster recovery preparedness.
  • Key team member for organizing and developing written proposals with the goal of winning new cyber security business and revenue.
  • Implemented an ARMY approved Intrusion Prevention System (IPS) to recognize and address cyber-attacks in real time.
  • Designed cyber risk program and reported performance to executive leadership, updating strategic plan and annual budget.
  • Developed $750M global cyber security business strategy for CEO's corporate investment program.
  • Evaluated country and territory specific threats and cyber risks for global clients.
  • Developed and Maintain the Cyber Security Operations Center (CSOC).
  • Designed & built our Cyber Security solutions.
  • Established and manages Enterprise Cyber Risk Committee.
  • Represented Cybersecurity and IT Risk on the Operational Risk Management Council providing executive leadership on enterprise issues and risk governance.
  • Implemented Agilent Technologies' inaugural cyber security products initiative.
  • Led 13 cyber defense and communication security professionals; provided management for 17K users and over 10K systems.

Show More

6 Cyber Jobs

No jobs at selected location

28. Audit Procedures

demand arrow
average Demand
Here's how Audit Procedures is used in Director Of Information Technology Security jobs:
  • Created and managed security policies, incident response procedures and managed related audit procedures.

Show More

29. CIO

demand arrow
average Demand
Here's how CIO is used in Director Of Information Technology Security jobs:
  • Honored by CIO for pioneering University Technology Office telecommute program.
  • Direct report to CIO for privately-owned $2.5B pharmaceutical company with approximately 2000 employees in the US and worldwide.
  • Assigned to the office of the Chief Information Officer (CIO); supervise six staff members.
  • Viewed by the hospital's executive leadership team as the CIO of the facility.
  • Requested by CIO to lead multiple responsibilities throughout tenure, including several that required immediate attention to establish or remediate.

Show More

2 CIO Jobs

No jobs at selected location

30. Firewall

demand arrow
low Demand
Here's how Firewall is used in Director Of Information Technology Security jobs:
  • Implemented Intrusion Detection on external networks, plus firewall resolutions.
  • Managed firewall, wireless, and MDM technology evaluation and selection process.
  • Used Checkpoint Firewall, ISS Intrusion Detection and content filtering software.
  • Deploy firewalls, and data encryption strategies to protect sensitive information.
  • Implemented and managed Cisco Routers, Intelligent Switches, and Firewalls.
  • Researched and replaced corporate firewall with a WatchGuard XTM 850 device and configured Microsoft Remote Web Workplace for remote access.
  • Implemented and managed Cisco Meraki firewalls and wireless access points at 10 sites.
  • Created disaster recovery policies and implemented DR capabilities --Implemented new server/routers/switches/firewalls and licensing at new datacenter location.
  • Create an Infrastructure, implement and configuring the equipments, configuring Servers Raid 5, Firewall, Antivirus, Microsoft Programs.
  • Configured and deployed Cisco firewalls, routers, switches, and Radware load balancers.
  • Architected Security for an new Internal Private Cloud Capability Developed process for firewall rule exception review and enforcement of standard configuration.

Show More

31. VPN

demand arrow
low Demand
Here's how VPN is used in Director Of Information Technology Security jobs:
  • Designed solution for securing IP based camera solutions utilizing SSL VPN capabilities.
  • Negotiated a 24/7 Firewall, VPN, IDS/IPS, Log Management Monitoring Contract.
  • Planned, tested and deployed Microsoft RRAS and configured Checkpoint VPN solutions.
  • Engineered, planned and implemented a secure VPN service for OIG.
  • Implemented mobile VoIP communications and VPN technologies.
  • Implemented VPN for connectivity between Sites.
  • Installed new redundant Cisco ASA firewalls to replacing aging standalone ASA and VPN Concentrator.
  • Designed and implemented Fortinet VPN access for approved employees company-wide in thirty days.
  • Implemented Philips iSite PACs system and remote physician practice VPN access capabilities.

Show More

32. Assurance

demand arrow
low Demand
Here's how Assurance is used in Director Of Information Technology Security jobs:
  • Implemented an Information assurance environment to protect user and customer PII.
  • Support and manage corporate IT operational procedures (information assurance).
  • Served as Information Assurance Manager.
  • Served as the Information Assurance Manager and implemented security policies and procedures all of the organization's automated information systems
  • Assisted these departments with continuous process Improvement with structured quality assurance process reengineering.
  • Provided Security and IT Assurance Services to many Regional and University Hospitals.
  • Completed VCU Department of Assurance Services IT audit with no board reportable issues.

Show More

1 Assurance Jobs

No jobs at selected location

33. Strategic Plan

demand arrow
low Demand
Here's how Strategic Plan is used in Director Of Information Technology Security jobs:
  • Collaborated in strategic planning, expense forecasting, and corporate governance modeling.
  • Manage day-to-day operations as well as annual strategic plan implementation.
  • Perform budgeting tasks, develop next-steps strategic plans, and manage major design, implementation, and migration projects.
  • Developed and led the implementation of strategic plans in support of the organization's business goals and initiatives.
  • Key Goals & Accomplishments: Put in place a strategic plan incorporating input from business and technology leaders.
  • Developed strategic plans and set enterprise goals for the management and security of the technology infrastructure.
  • Focus on security and risk assessment, strategic planning, long-term goals, and assessment.
  • Create and Maintain IT Strategic Planning for any IT related systems and tasks.
  • Developed integrated long term strategic plan for yearly project plans and systems development.
  • Developed NOAA IT Security Strategic Plan and IT Security Enterprise Architecture.
  • Managed resources while rapidly deploying physical security technology solutions, project budgets and strategic planning.
  • Evaluate the current information security function and develop a strategic plan and roadmap to address the security readiness of the organization.
  • Managed Central Application Hosting facility to 99.999% up time Developed IT strategic plan and way ahead.

Show More

34. SAN

demand arrow
low Demand
Here's how SAN is used in Director Of Information Technology Security jobs:
  • Based initiative on SANS Institute 20 Critical Security Controls ensuring the ability to secure multiple financial institutional contracts.
  • Maintained 100% availability during Hurricane Sandy.
  • Spearheaded Virtual processing and SAN storage technologies that improved business productivity, built on a long-term strategy of service delivery.
  • Upgraded the switches, routers and firewalls in the Pittsburgh and San Diego offices to increase LAN/WAN performance and security.
  • Implemented disaster recovery plan due to outage caused by Hurricane Sandy accomplishing return to operations with the stated SLA.
  • Consolidated thousands of national utility sites under one domain to recover $10M to the business.
  • Provide on-call coverage 24 x 7 operation for SAN and Storage related issues and events.
  • Project Managed installation of new PowerScribe 360 with new PAC's and SAN server.
  • Led internal vulnerability assessment of tens of thousands of systems.
  • Oversee datacenter management, vendor relationships, technical support, application development, financial monitoring redundant backup sand disaster recovery planning.
  • Designed and implemented a iSCSI SAN, which allowed the migration and consolidation of all MGRMC data.
  • Gained 50% in systems performance improvements by deployment of EMC SAN devices and virtulization.
  • Jack Henry, FundTech Wire Automation, VMware, SAN, Cisco, Microsoft, FDIC, FFIEC, TDSML, SEC/FINRA
  • Scoped and managed projects that included new large scale network, virtualization, SAN, and system rollouts.
  • Installed a Packeteer applicance in San Diego office to increase fault tolerance and network performance.
  • Established and supported EMC Clariion CX4 SAN along with the Buffalo Terastations.

Show More

1 SAN Jobs

No jobs at selected location

35. Web Application

demand arrow
low Demand
Here's how Web Application is used in Director Of Information Technology Security jobs:
  • Reduced likelihood of external attack by implementing solutions such as web application firewalls and intrusion detection systems.
  • Documented policies and standards for web application development and hosting.
  • Conducted network vulnerability scanning and web application security testing.
  • Directed onshore and offshore resources in Web Application Management, support, testing, and services (AMS) Framework.
  • Manage Web Application Firewall team and direct expansion for 100% externally facing web application coverage.
  • Played key role as a Project Manager in designing Intranet Systems infrastructure architecture for web applications.

Show More

36. Access Management

demand arrow
low Demand
Here's how Access Management is used in Director Of Information Technology Security jobs:
  • Utilize file sharing on Windows servers to upload documents that can be accessed by the appropriate individuals using access management technology.
  • Implemented various programs to address open audit issues, including the deployment of a global identity and access management system.
  • Created identity and access management framework for a 35 million member base to register and personalize their on-line experience.
  • Developed data security and identity access management standards, guidelines, policies, procedures, and process manuals.
  • Provide oversight of Access Management and implementation of use of AD and Hitachi for user provisioning.
  • Performed server builds, break-fix, problem and change management, and access management.
  • Developed and managed Identity & Access Management policy, processes and procedures.
  • Implemented EmpowerID as an Identity and Access Management (IAM) solution for automated identity lifecycle management.

Show More

37. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Director Of Information Technology Security jobs:
  • Led Security Design team responsible for physical Security Requirements for all new construction, renovations and decommissions.
  • Project lead for developing and incorporating new security requirements for newly acquired Air Force communications system.
  • Managed CareMore IT systems security and ensured that applications and solutions met minimum security requirements.
  • Aided in the development of security policies based on business-defined security requirements.
  • Worked with high security research areas on their unique security requirements.
  • Performed risk assessment surveys to identify security requirements.
  • Managed Physical security requirements for all locations.
  • Managed a capital budget of 1M+ in delivering security infrastructure projects, enhancements and solutions for the firm's security requirements.
  • Worked with the Institutional Review Board and Clinical Trials Office to support their IT security requirements.
  • Provide physical security requirements for the Portland, OR.
  • Drafted security requirements to comply with HIPAA guidelines.
  • Developed Security Requirements Traceability Matrices.

Show More

6 Security Requirements Jobs

No jobs at selected location

38. Access Control

demand arrow
low Demand
Here's how Access Control is used in Director Of Information Technology Security jobs:
  • Implemented new security infrastructure which included Network Access Control and Security Incident Event Management System.
  • Implemented two-factor authentication for logical access control initiative.
  • Implemented CA's Identity Manager to augment user access control procedures and to move towards a single-sign-on solution.
  • Safeguard company information through surveillance of internet and email activity, phone, and premises access control.
  • Experience managing international security projects (access control, CCTV, policy & procedures)
  • Utilized access control to monitor all employees, visitors and logged information into database.
  • Coordinated the quarterly User Access Controls (UAC) reviews for SOX.
  • Implemented access control devices without loss of service.
  • Assess all network access controls between compromised system(s) and adjacent and surrounding networks associated with the possible breach..
  • Install Alarm, magnetic and biometric system to manage the access control.
  • Work with Final Cut, Premier, APP Design with Database Access control planning and Implementation Create trainings for sales department.

Show More

39. Nist

demand arrow
low Demand
Here's how Nist is used in Director Of Information Technology Security jobs:
  • Administered and oversaw all aspects of corporate technology and security for a high profile individual and their family.
  • Monitored and evaluated employees on key issues and programs then recommended or administered corrective action initiatives as needed.
  • Create cross departmental operational strategies with administrative, medical management, and external partners to increase productivity.
  • Administered all Desktop related functions including hardware and software set-up and configuration.
  • Served as Macintosh Network Administrator for any issue relating to the OS, hardware, peripherals, or creative solutions.
  • Supported the computing needs of 150-physician academic medical practice, and Third Party Administrator (TPA) line of business.
  • Developed and implemented security controls based on ISO 27000, SOC I Type II, and NIST guidelines.
  • Managed a staff of 15 Windows System Administrators maintaining all DNS, WINS and Trend Micro Anti-Virus administration.
  • Provided administration of general user access to IT applications, databases, and servers for over 12,000 users.
  • Administer the allocation of $1.5M in resources across all technical systems, operations and capital expenditures.
  • Provided administrative support for large requests for accessing AT&T Centers and general request.
  • Completed in 6 months with a budget of $185,000 for 200 administrative employees.
  • Administered a $30 million operating budget and $10 million capital requisitions.
  • Created processes covering the 17 families of information security as defined by NIST.
  • Administer networking, data center, system backup, and servers.
  • Administer IBM Endpoint Manager environment of 30 relays and 1500+ endpoints.
  • Established monthly IT Security Awareness training for the 40+ system administrators.
  • Developed strategy, conducted multi-department testing on Business Continuity Plans and Disaster Recovery using NIST standards.
  • Administer ForcePoint Triton/Websense policies for web security.
  • Promoted within six months of employment from Network Administrator to Director of the IT Department.

Show More

3 Nist Jobs

No jobs at selected location

40. Sarbanes-Oxley

demand arrow
low Demand
Here's how Sarbanes-Oxley is used in Director Of Information Technology Security jobs:
  • Program manager/Project director leading the information technology Sarbanes-Oxley compliance effort.
  • Coordinated a 3rd party audit of IT controls to achieve Sarbanes-Oxley compliance and SAS70 Type II certification.
  • Managed Sarbanes-Oxley program IT testing and involved with FFIEC reviews.

Show More

41. Itil

demand arrow
low Demand
Here's how Itil is used in Director Of Information Technology Security jobs:
  • Championed ITIL implementation to improve process maturity and efficiency.
  • Manage integration of Security into IT, business processes and application development using ITIL, OWASP and ISO 27001 as frameworks.
  • Implemented and educated clients on various Security Frameworks i.e ITILV3, COBIT5, NIST/ISO, COSO, HITRUST, etc.
  • Included ITIL service management, financial system, formal service desk and trouble-ticket systems, networks, and servers.
  • Redirected process changes from tactical toward industry best practice Information Technology Infrastructure Library (ITIL) framework.
  • Implemented compliance to standard ITIL best practices and defined first major incident management process.
  • Created and implemented change controls using ITIL technology support best practices.

Show More

4 Itil Jobs

No jobs at selected location

42. Executive Management

demand arrow
low Demand
Here's how Executive Management is used in Director Of Information Technology Security jobs:
  • Prioritized the risks, developed mitigation strategies and presented results to executive management for review and approval.
  • Positioned with the C-level executive management in direct consultation for strategic planning and budgeting.
  • Create in-house solutions or work with vendors to provide security solutions as desired by the owner or executive management.

Show More

43. Business Units

demand arrow
low Demand
Here's how Business Units is used in Director Of Information Technology Security jobs:
  • Provided updates every two weeks to all business units and executives of current and proposed Information Security Initiatives.
  • Develop comprehensive Global Strategy for Security and Risk Program ensuring involvement of IT and business units.
  • Managed extremely complex, large-scale projects that span multiple business units, colleges, departments, and campuses.
  • Coordinate activities across business units with regard to planning, production, cost control, delivery cost.
  • Developed, communicated and aligned IT security protocols, training, and procedures with business units.
  • Supported CFO in deploying MS Dynamics in support of 5 business units.

Show More

1 Business Units Jobs

No jobs at selected location

44. Data Centers

demand arrow
low Demand
Here's how Data Centers is used in Director Of Information Technology Security jobs:
  • Improved system performance by moving network and administration tasks from in-house to externally managed data centers.
  • Developed Connection Approval Process (CAP) to be used to stand up over 400 data centers.
  • Spearheaded the build of corporate data centers and led the corporate applications and security steering committees.
  • Spearhead multiple Data Center projects to consolidate, build and refresh existing data centers.
  • Deployed new next generation firewalls and IPS/IDS technology in four global data centers.
  • Consolidated multiple data centers producing more than $10,000 of monthly savings.
  • Manage the IT and security operations, infrastructure and data centers.
  • Designed and built distributed data centers serving our private cloud and business applications Implemented Force.Com platform for CRM and customer support.

Show More

45. HR

demand arrow
low Demand
Here's how HR is used in Director Of Information Technology Security jobs:
  • Provide analysis of current global threat landscape and resulting company exposures.
  • Maintained secure computing environment for warehousing electronic medical records, scans and applications for three branches of the US armed forces.
  • Helped my leaders manage the ebb and flow of the business cycles through contingent workforce augmentation during peak business cycles.
  • Redesigned and implemented a three tier Firewall solution to achieve better security for the egress and ingress traffic.
  • Created and enforced computer security policies on all information systems including three networks serving 2,300 personnel.
  • Prioritize and develop safety measures for HQ and Branch office operations regarding personal and company threats.
  • Provide risk evaluation, threat modeling, and deep technical expertise on projects and technology products.
  • Eliminate reliance on contractors and consultants across the health system through focused training and development.
  • Led a small security team that assessed the latest security threats and developed mitigation plans.
  • Conducted internal investigations, background checks, risk analyses and threat impact assessments.
  • Lead the acquisition and implementation of the widely-used EHR/EMR software, Epic.
  • Presented findings through both oral and written presentations to management.
  • Research and vendor selection for and integrated EHR solution.
  • Implemented Whole-Disk Encryption on laptops throughout the agency.
  • Delivered significant cost savings, improved service levels, and reduce hardware/software complexity thru standardization and consolidation.
  • Created security awareness program for annual training through Relias.
  • Achieved $2M in cost savings thru AT&T Voice/Data contract renegotiation and $300K reduction in cell phone devices
  • Supported company growth thru organic and M&A activity from 178 regional to over 450 global staff.
  • Observe and test Vulnerability Management process e. Facility/Data Center Walk Through i.
  • Allowed Hach and Hach Lange to reduce travel costs by more than 20% through use of videoconferencing.

Show More

1 HR Jobs

No jobs at selected location

46. Customer Service

demand arrow
low Demand

47. Saas

demand arrow
low Demand
Here's how Saas is used in Director Of Information Technology Security jobs:
  • Completed an integrated migration to SaaS environment using Microsoft Cloud-based storage of e-mail and archive data.
  • Designed entire IT Infrastructure, including Cloud hosting and SaaS applications.
  • Evaluated security of IAAS, PAAS and SAAS applications.
  • Reposition core IT infrastructure from physical to virtual data center production (SaaS) environments.

Show More

48. Technical Support

demand arrow
low Demand
Here's how Technical Support is used in Director Of Information Technology Security jobs:
  • Led technical support teams, web development activities, lab and classroom management including developing work profiles.
  • Support the Department of Defense with workstation technical support for the Heroes at Home program.
  • Provide leadership, guidance and mentoring to technical support employees.
  • Provided training and technical support.
  • Performed technical service calls for the IT Campus and developed technical support process improvements and common knowledge base.
  • Hired, trained and managed IT, Technical Support and Network Operations team and 24/7 helpdesks.

Show More

49. DLP

demand arrow
low Demand
Here's how DLP is used in Director Of Information Technology Security jobs:
  • Evaluated similar DLP products and provided recommendations for enterprise implementation.
  • Developed best practices for collection, investigation, and retention of DLP activity results, events and incidents.
  • Architected the global DLP for web/email deployment in addition to having oversight of the project rollout.

Show More

50. Linux

demand arrow
low Demand
Here's how Linux is used in Director Of Information Technology Security jobs:
  • Manage systems and implement security patches maintenance of all company computer systems, windows and Linux.
  • Upgraded and maintained LAN / WAN, SSL communications, and secure bank transactions with Linux.
  • Migrated from Linux-based e-mail platform to MS Exchange.
  • Utilize various Linux commands to determine open ports.

Show More

Director Of Information Technology Security Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Director Of Information Technology Security

Ensure Compliance

15.5%

Infrastructure

10.7%

Information Technology

9.3%

Recovery Procedures

5.9%

Windows XP

5.4%

Hipaa

5.3%

External Auditors

4.9%

Information Security Policies

4.8%

Architecture

4.0%

PCI

3.8%

Risk Assessments

3.7%

Governance

3.3%

Risk Management

3.3%

Information Security Program

3.3%

SOX

3.1%

Project Management

3.1%

Cloud

3.0%

Data Privacy

2.8%

Voip

2.5%

ISO

2.4%
Show More

Typical Skill-Sets Required For A Director Of Information Technology Security

Rank Skill
1 Ensure Compliance 10.6%
2 Infrastructure 7.3%
3 Information Technology 6.4%
4 Recovery Procedures 4.0%
5 Windows XP 3.7%
6 Hipaa 3.6%
7 External Auditors 3.3%
8 Information Security Policies 3.3%
9 Architecture 2.7%
10 PCI 2.6%
11 Risk Assessments 2.5%
12 Governance 2.3%
13 Risk Management 2.2%
14 Information Security Program 2.2%
15 SOX 2.1%
16 Project Management 2.1%
17 Cloud 2.1%
18 Data Privacy 1.9%
19 Voip 1.7%
20 ISO 1.6%
21 Data Loss 1.6%
22 Active Directory 1.6%
23 Incident Response 1.5%
24 IP 1.4%
25 Network Security 1.4%
26 Vmware 1.3%
27 Cyber 1.3%
28 Audit Procedures 1.2%
29 CIO 1.2%
30 Firewall 1.2%
31 VPN 1.2%
32 Assurance 1.2%
33 Strategic Plan 1.2%
34 SAN 1.0%
35 Web Application 1.0%
36 Access Management 1.0%
37 Security Requirements 0.9%
38 Access Control 0.9%
39 Nist 0.9%
40 Sarbanes-Oxley 0.9%
41 Itil 0.9%
42 Executive Management 0.9%
43 Business Units 0.9%
44 Data Centers 0.9%
45 HR 0.8%
46 Customer Service 0.8%
47 Saas 0.7%
48 Technical Support 0.7%
49 DLP 0.7%
50 Linux 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

13,252 Director Of Information Technology Security Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.