Information Systems of Maryland, LLC
Published
November 2, 2024
Location
Taneytown, MD
Category
Default  
Job Type

Description

Information Systems of Maryland (ISM), LLC is seeking Virtual CISO’s (vCISO) with an entrepreneurial spirit to join our growing team.  ISM is an IT consulting firm that specializes in providing small, medium, large and public sector organizations with IT project solutions, security solutions and talent acquisition services.  To meet the increasing needs of our organization we are seeking Virtual CISO’s that want to take part in our success and become key members of the company.  We offer an exceptional commission package and fast-tracked opportunity for growth.  If you would like to learn more about ISM and this exciting opportunity, please visit us on the web at www.is-md.com

JOB SUMMARY:

This position will be responsible for many aspects of our cyber security division.

ORGANIZATIONAL STATUS:

This position reports to the Managing Virtual CISO and will interface with executive staff, all internal and remote employees, including current customer(s).

SKILLS, ROLES & RESPONSIBILITIES:

Policy and Program Leadership

  • Provide leadership to customers and their workgroups of policy-makers, administrators, and lead technical staff in analysis, discussion and development of privacy and security policy, standards and practices, and guiding the acquisition of advanced security technology.
  • Provide input and influence the customer in addressing network and computing security needs with respect to choice of hardware and software technologies, choices between commercial and open source software, local and cloud-based services, and staffing requirements.

Compliance and Audit

  • Manage the customers information security and privacy compliance efforts.
  • Coordinate and track information technology and security related audits. Provide guidance, evaluation and advocacy on audit responses.

Risk Management and Incident Response

  • Deal with a broad range of complex security, privacy, and risk-related issues in information technologies. Evaluate risk and act expeditiously in making decisions and recommendations, understanding the factors associated with decision-making in a technological environment as well as the varying needs and viewpoints of the customer.
  • Investigates and coordinates response to security incidents that occur at customers.

Outreach, Education and Training

  • Assists to lead the cyber security division of Information Systems of Maryland, in concert with the Managing Principal. The resources in this division provide: consultation, guidance, investigation regarding information security, policy, security education and training, tracking of security incidents, administration of customer(s) IT Security Risk Management Program, and the deployment and management of certain key security tools, e.g., Nessus, FireEye,

Product Development

  • Assists thru collegial collaboration to further develop Information Systems of Maryland’s in-house product, the “run book”, to include relevant content, sections, frameworks, policies, etc. related to cyber security in an effort to bring more value to this in-house developed product.

CULTURAL REQUIREMENTS:

  • Integrity: The candidate must be honest and ethical at all times.
  • Work Ethic: The candidate must be dependable, hardworking, and willing to go the extra mile.
  • Team Player: The candidate must be collaborative and work well with others.
  • Positive Attitude and Enthusiasm: The candidate must focus on the positive and not the negative. The candidate must also exude a “can do” attitude.
  • Adaptability and Flexibility:The candidate will be someone who is not resistant to change and able to adapt to a new direction, often at a moment's notice.
  • Effective Communication and Confidence: The candidate will be someone who is a good listener and who must clearly articulate their ideas verbally or via written form.
  • Openness and Receptivity to Feedback:The candidate must be able to accept feedback, learn from it, and grow from the feedback, positive or negative.
  • Creative Thinking:  The candidate should be an individual who is intentional about innovating and “thinking outside the box”.
  • Critical Thinking and Problem Solving: The candidate must be able to see the link between different aspects of the organization and creatively find solutions to problems.
  • Entrepreneurial Thinking: The candidate must have clarity on why we are in business, how we overcome challenges and capitalize on our experience and knowledge.

  QUALIFICATIONS & REQUIREMENTS:

 5+ years of experience with evolving state-of-the-art information security technologies, technology policy and security administration.

  • 3+ years of experience in a leadership capacity.
  • Direct experience in the specific technical areas of systems administration, applications development, database administration, network operations, and data center operations.
  • Familiarity with the general commercial market.
  • Certified Information Security Systems Security Professional (CISSP) or Certified

Information Security Manager (CISM) preferred.

  • Significant experience with evolving state-of-the-art information security technologies and approaches; experience leading groups.
  • Accomplishments in program leadership, policy development, project management.
  • Demonstrated track record of maintaining currency with technological trends and available security solutions in the marketplace.
  • Experience and skill in developing and administering policy and procedure in a complex and decentralized environment.
  • Experience with information system auditing including computer security reviews, control selection, and evaluation of systems using a risk based approach.
  • Strong interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration, and cooperation.
  • Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse. Ability to work with senior customer leadership and technical personnel.
  • Foundational knowledge and experience with information and personal privacy policy and compliance issues, copyright and software piracy law, media interactions, and research support.
  • Expertise in risk management approaches to assess and address security and other types of Information Technology-related risks.
  • Expertise in computer forensic investigation methodology and investigation tools to collect, analyze and preserve electronic evidence.
  • Integrity and high standards of personal and professional conduct.

About ISM:

Information Systems of Maryland is a leading-edge information technology services firm that provides information technology services and solutions to the public sector and commercial markets. With over 15 years of information technology experience, we deliver solid solutions for today’s technology needs. To learn more about ISM, visit us on the web at https://www.is-md.com

Apply
Drop files here browse files ...

Related Jobs

Are you sure you want to delete this file?
/