Information Manager Job at McHenry County College

McHenry County College Crystal Lake, IL 60012

Work Week

40 Hours | Must be available after hours to respond to security issues, when necessary.

Position Summary

The Information Security Manager provides expertise, advice and leadership in all areas of cyber security. The primary responsibilities of the ISM include leading incident response efforts, assisting in formulating, maintaining, enforcing and reviewing information security policies and procedures, and performing advanced analytics, device manipulation and control in support of information security operations. The Information Security Manager is responsible for daily management and coordination of network intrusion prevention and other security systems, monitoring of security controls, reviewing device and security logs for anomalies, and identifying trends for forensic analysis correlation. The Information Security Manager is responsible for the development and delivery of a comprehensive security and privacy program for the College.

Essential Job Functions and Responsibilities

  • Develop, maintain, implement, and evaluate security policies, procedures, standards, systems, and procedures
  • Define objectives, set priorities, and perform technical duties that drive successful project completing and response efforts that align with the College’s strategic goals
  • Collaboratively develop and maintain an information security program and conduct necessary actions to drive the adoption of the program’s requirements and recommendations College-wide
  • Coordinate response to security incident, including leading and directing people to take specific mitigating actions.
  • Provide guidance and leadership as part of the incident response team. Assist with the containment, eradication, and prevention of security incidents affecting the networking and security environments
  • Develop procedures to ensure confidentiality, integrity, and accessibility of data and software. Work closely with IT infrastructure and enterprise application teams to identify and implement appropriate security procedures, software, and hardware
  • Develop and implement procedures and guidelines for internal auditing of information security controls. Conduct or facilitate auditing procedures
  • In conjunction with other IT staff, investigate, recommend, and authorize security tests, penetration tests and security scans affecting information systems resources. Manage the efforts to address any vulnerabilities reported by scans or tests as the College-wide incident handler.
  • Evaluate proposed vendors, products, and processes for compliance with College policies
  • Manage and maintain the College’s digital identities through internal and external directory services and the processes that activate, deactivate, and synchronize those identities
  • Monitor Security and Incident Event Management and enterprise security appliances related to host and network, intrusion detection and prevention systems
  • Assure workstation and server security by leading or performing vulnerability assessment, patch validation, and security risk assessment
  • Collaborate with college departments to integrate and maintain processes to ensure compliance with information security best practices within departmental operating procedures. Provide consulting services to all College staff on system, data, access, control, and information security issues
  • Coordinate the development and delivery of an information security awareness and literacy program for all college employees, other authorized users, and students
  • Serve as information security risk management liaison to the College and make security recommendations to ensure that operations comply with contractual agreements and relevant laws and regulations.
  • Provide recommendations addressing the physical protection of information security-related assets
  • Participate in the planning and design of College-wide business continuity and disaster recovery strategies where appropriate
  • Ensure that College data, system, and information security policies are followed in all third-party system implementations, including projects originating outside the IT division
  • Remain informed of trends and issues in the information security industry, including current and developing technologies, emerging attack techniques, evolving best practice, and new regulations
  • Manage and maintain the College’s security certificates
  • Work collaboratively with others to accomplish functions and responsibilities
  • Assume additional duties as assigned by immediate supervisor

Required Qualifications

  • Bachelor’s degree from a regionally accredited institution in Computer Science or related field; or equivalent combination of education/experience




Please Note :
ajayjain.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, ajayjain.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, Site.com is the ideal place to find your next job.