×
Register Here to Apply for Jobs or Post Jobs. X

Chief Information Security Officer

Job in Houghton, Houghton County, Michigan, 49931, USA
Listing for: Asiswny
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 150000 - 200000 USD Yearly USD 150000.00 200000.00 YEAR
Job Description & How to Apply Below
Location: Houghton

Department:
Information Technology

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Job Description Summary

Responsible for the development and delivery of a comprehensive information security strategy to optimize the security posture of the university.

Essential Duties & Responsibilities
  • Act as the primary security architect for the university's technology resources.
  • Lead incident response teams and forensic investigations related to the university’s technology resources.
  • Monitor the university's technology resources for attacks.
  • Work with information technology staff to educate them on security risks and train them in assessment and response techniques.
  • Provide reports as directed or requested to keep executive management and external agencies informed of security incidents.
  • Work with the Office of Risk Management and General Counsel as needed to resolve difficult legal security issues.
  • Develop, implement, and administer technical security standards, as well as a suite of security services and tools to address and mitigate security risk.
  • Perform vulnerability assessments on the university’s resources and evaluate the risk.
  • Lead the development and implementation of effective and reasonable policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation.
  • Keep abreast of security incidents and act as primary control point during significant information security incidents.
  • Act as liaison with law enforcement agencies, government agencies, and the court system, when dealing with security incidents.
  • Provide leadership, direction, and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies.
  • Examine impacts of new technologies on the Institution’s overall information security. Establish processes to review implementation of new technologies to ensure security compliance.
  • Direct the preparation of short- and long-term strategic and operating plans pertaining to the university's information security program.
  • Create education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilities.
  • Support the vision of the university when developing and enforcing security protocols.
  • Represent the university on committees and boards associated with the information security and in national and regional consortiums and collaborations.
  • Encourage continuous improvement practices among employees. Commit to applying continuous improvement strategies to strategic goals and leadership skills.
  • Ensure compliance with all applicable university, state, and federal regulations.
  • Apply safety-related knowledge, skills, and practices to everyday work.
  • Functional supervision may be exercised over staff and student assistants.
  • Required Education, Certifications, Licensures (minimum requirements)
    • Ability to obtain a U.S. Department of Defense security clearance, which requires United States citizenship. May not possess dual citizenship.
    • Bachelor’s degree in computer security, computer science, computer engineering or related field, or an equivalent combination of education and professional experience from which comparable knowledge and abilities can be acquired.
    Required Experience (minimum requirements)
    • Five years of experience in information security, information technology or other fields related to IT security and risk management.
    • Professional experience working with networking technologies and protocols.
    • Professional experience working with network firewalls and intrusion detection or prevention systems.
    • Professional experience with strong analytical and working knowledge of regulatory rules, frameworks, and controls including but not limited to HIPAA, HITECH, GLBA, PCI-DSS, and RFRs.
    • Experience designing and implementing controls related to NIST-800…
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary