Head of Information Security & IT Compliance - Englewood, - TopicsExpress



          

Head of Information Security & IT Compliance - Englewood, Colorado, United States: Details: Head of Information Security & IT Compliance Attract, develop & engage a world-class workforce For more than 30 years, TeleTech has anticipated customer needs and stayed ahead of consumer demands. As the leading global provider of technology-enabled customer experience solutions, TeleTech designs, enables, manages, and grows superior customer experiences that drive shareholder value. Simply put, we help companies grow the value of their business by growing the value of their customer base. From design to delivery, our comprehensive solutions create value across the entire customer life cycle with industry-specific services. Our capabilities include: • Design: Customer Strategy Services • Enable: Customer Technology Services • Manage: Customer Management Services • Grow: Customer Growth Services Position Summary: The Head of Information Security and IT Compliance is responsible for implementing and driving the enterprise information security and IT compliance strategy. The position is also responsible for providing strategic guidance and alignment of security practices across all IT systems as well as consulting with the business to determine acceptable levels of risk for the organization. This leader needs to be able to articulate how the business drivers and external threats impact risk to TeleTech and its clients systems, data, and infrastructure. The Head of Information Security and IT Compliance will establish a program to identify, evaluate and report on information security risks in a manner that meets client requirements, compliance, regulatory requirements and aligns with the risk posture of the enterprise. The ideal candidate is an articulate and persuasive leader who builds consensus and can serve as an effective member of the management team. Must have the ability to present and articulate strategy and compliance goals and practices to executive leadership, IT staff, non-IT personnel, and clients. The candidate must be customer and business focused and looking to create business value through effective and efficient risk management strategies. Specific Duties include: Develops and implements strategic and operational plans to achieve short and long term security objectives. Ensure data privacy for our clients’ customer data and our own intellectual property and other confidential data. Ensure security programs are in compliance with client contracts, laws, regulations and policies to minimize or eliminate risk and audit findings. Evaluate security needs and recommend cost effective mitigating controls. Establish and oversee the organizations information security architecture. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. Work directly with IT staff to implement of processes and procedures to cost-effectively protect information systems assets from intentional or inadvertent modification, disclosure, or destruction. Lead security assessments of systems, applications and networks in a complex IT environment Make recommendations for products and procedures to maintain and improve IT security. Liaison with IT staff to ensure audit preparedness Manage security incidents and events to protect IT assets, including intellectual property, client data and the companys reputation. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. Promote, educate, and ensure compliance of IT security. Provide technical leadership, architectural support, guidance and direction for the protection of information systems assets to other functional units and to all global sites. Own and manage the configuration and administration functions for specific security tools. Assist Risk Management with fraud detection, documentation, and prevention. Provide reports to superiors regarding effectiveness of data security. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action. Report on any data exfiltration within program guidelines. Build, develop and manage the information security and compliance organization, consisting of direct reports and indirect reports. This includes hiring, training, staff development, performance management and conducting performance evaluations. dlvr.it/76CXmb
Posted on: Sun, 05 Oct 2014 08:41:41 +0000

Trending Topics



Recently Viewed Topics




© 2015