• 2-minute read •
Job Description:
Directs the activities of the information security team administering and monitoring intrusion detection/prevention, anti-virus/anti-malware, data loss prevention, unified threat management, enterprise identity and access management, analytics, and event monitoring systems
Defines and drives a vision for the Workforce Technology Security in partnership with Intuit Information Security organization and other IT groups.
Thinks and acts strategically. Stays abreast of trends and advances in IT security solutions and monitors changes in legislation that affect information security.
Provides leadership for workforce technology security programs through strong collaboration across multiple business units and functional groups
Provides cyber security and protection recommendations for the administration and monitoring of workforce security controls.
Builds a framework for the cloud and mobility environments.
Develops external partnerships with vendors and outside entities as appropriate.
Takes ownership for key initiatives. Coordinates strategies with other members of the IT team and other knowledgeable resources. Develops plans and budgets for implementing the strategies.
Presents business updates, recommendations, strategic opportunities and assessments to the IT leadership and senior management as needed.
Develops, maintains, and communicates technical security strategy, plans, trends and effective security practices with senior business and technology executives, and employees
Develops strong and trusting relationships with business leaders, challenges thinking/status quo on security matters
Provides advice and leadership on a broad range of security items and strategies
Hires and develops outstanding IT security talent
Qualifications
Minimum 10 years of experience in information security management and administration. 5 years minimum experience managing and developing teams.
Demonstrated ability to build and execute complex IT security plans.
Experience in various security monitoring tools
Experience in defining and implementing Data Loss Prevention, MFA and UTM strategies
Experience in implementing and operating Enterprise Identity Access Management solutions
Experience working with information security laws and standards generally accepted information security principles, and accepted industry best practices.
Experience working in a risk based environment including mitigation, planning and implementation.
Operational flexibility in modifying business and operating practices to adapt to a changing environment and the ability to innovate and operate outside the comfort zone of established methods and procedures.
Leadership characteristics as shown by a history of inspiring and motivating people to a common purpose at all levels within a company. Ability to gain immediate credibility at all levels both inside and outside the organization and develop lasting, productive and collaborative relationships.
Excellent communication and influencing skills including the ability to simplify key messages, present compelling stories and promote technical and personal credibility with internal and external executives, and both technical and non-technical audiences.
Proven success working across organizational and geographic boundaries.
Contract and vendor negotiation experience
Experience with budget forecasting and overall financial management
Certifications such as CISSP, CISA, CISM, CRISC, CGEIT, ISO27001 desired.
Bachelor’s degree in Computer Science, Information Technology or a related discipline.
Pass it on for Referral Bonus. Not the right role for you, but know someone we should meet? Share with him to earn $1,000 referral bonus.