Information Security Risk Manager at Brigham Young University
Provo, Utah, USA -
Full Time


Start Date

Immediate

Expiry Date

09 Nov, 25

Salary

99000.0

Posted On

10 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Information Security, Perspectives, Iso, Components, Information Systems, Information Technology, Communication Skills, Access, Cisa, Consideration, Web Applications, F, Internet Security, Regulatory Compliance, Cissp, Conversant, Technology, Technical Architecture

Industry

Information Technology/IT

Description

WHY WORK AT BYU

As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, Brigham Young University (BYU) strives to be among the exceptional universities in the world. At BYU, we are devoted to our faith and to our students. We take an active role in the University’s Mission: “To assist individuals in their quest for perfection and eternal life.”
Our unique mission, deeply rooted in the Gospel of Jesus Christ, provides countless ways to serve and make an impact. This, along with our remarkable culture of belonging, weekly devotionals, and endless opportunities for learning and growth—all situated within a beautiful and historic campus—make it hard to imagine a more inspiring place to work.
Brigham Young University strongly prefers to hire faithful members of The Church of Jesus Christ of Latter-day Saints.

EDUCATION AND EXPERIENCE:

This position provides an opportunity for people of varying levels of skill . If you have a lot of education, experience, and skill, we’ll compensate you accordingly. If you are early in your career, this could be a great opportunity for you, too. Different levels of pay are assigned by the hiring department depending on experience/education/skills and business needs.
Minimum Required : Bachelor’s degree in Information Systems , Information Technology or equivalent professional experience; 5+ years of related work experience preferably in an information security, IT assurance, compliance, or risk management role.
Certifications : Prefer one or more recognized IT security or assurance certifications such as CISSP, CISA, CISM, CRISC, CPISA (other technical certifications are also given consideration).

SKILLS, ABILITIES, OR KNOWLEDGE:

You are not required to have experience in all areas listed below . What you don’t know we can teach you. We are seeking the most qualified candidates; the more you have, the more likely you will be selected. Compensation will be commensurate with experience and skills.

TECHNICAL SKILLS AND EXPERIENCE:

For this position, we are looking for someone with experience and expertise in several of the concepts and specific technical skills listed below:

  • F amiliar with security standards and best practices such as those specified by the payment card industry, ISO 27000, National Institutes of Standards and Technology, and Center for Internet Security
  • Excellent communication skills (Written and verbal)
  • Ability to develop, refine and follow processes
  • Proven ability to conceptualize, analyze and communicate complex issues and concerns to both technical and non-technical managers and workers
  • Conversant in the security and risk implications for common technical architecture and components. Ability to identify and assess security risks across technical domains such as segmented enterprise networks, identity and access management, cloud architectures, insider threats, endpoint protections, securing web applications, and privacy regulatory compliance.
  • Ability to work individually and as part of a team with minimal supervision
Responsibilities

Consulting and Advisory Duties:

  • Establish and maintain relationships with various campus partners
  • Assist business and technical leaders in understanding, prioritizing, and reducing information security risk
  • Participate i n key security and privacy compliance committees to ensure business practices adequately meet regulatory compliance requirements
  • Communicate risk and/or information security knowledge appropriately to technical and non-technical audience
Loading...