Winning Edge Solutions - Columbia, MD

posted about 1 month ago

Part-time - Mid Level
Columbia, MD
Professional, Scientific, and Technical Services

About the position

The Virtual Chief Information Security Officer (CISO) Services role involves providing expert cybersecurity services to enhance the client's security posture, identify risks, and develop effective security measures. The consultant will work part-time, focusing on assessing current security protocols, implementing security frameworks, and leading incident response efforts.

Responsibilities

  • Identifying, estimating, and prioritizing information cyber security risks at the college.
  • Examining the client's current technology, security controls, policies, and procedures to assess potential threats or attacks.
  • Evaluating the client's threat landscape, vulnerabilities, and cyber gaps that pose a risk to its assets.
  • Developing an information security program using frameworks such as NIST 800-53 or CIS Critical Security Controls.
  • Providing information security leadership, communication, investigation, mitigation, containment, and post-incident analysis in the event of a cyber-incident.
  • Updating and enhancing existing cybersecurity policies and procedures as required by the client.
  • Developing and implementing a strategy to conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with security policies.
  • Implementing the incident response plan, ensuring that all relevant teams are mobilized and aware of their roles and responsibilities.
  • Overseeing the initial assessment to understand the scope and impact of the incident or breach.
  • Coordinating with internal stakeholders, including senior management and the board of directors, to keep them informed about the incident or breach and the steps being taken to address it.
  • Leading the investigation to determine the cause of the incident or breach, how it occurred, and what data or systems were affected.
  • Overseeing the remediation efforts to fix vulnerabilities and restore affected systems.
  • Ensuring that all actions taken during the incident or breach response are thoroughly documented.
  • Conducting a post-incident review to evaluate the response and identify lessons learned.
  • Providing a full written report of the incident, nature of the breach, compromised information, and corrective actions taken to prevent future incidents or breaches.

Requirements

  • Bachelor's degree in cybersecurity, computer science, information technology, or a related field from an accredited institution.
  • At least one of the following certifications: CISSP, CISM, or CISA.

Nice-to-haves

  • Master's degree in cybersecurity or a related field.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service