American Credit Acceptance
Vice President, Information Security Officer
American Credit Acceptance, Spartanburg, South Carolina, United States, 29302
Overview:
The
Vice President, Information Security Officer
(ISO) will report directly to the General Counsel, and be responsible for:Establishing cybersecurity strategyImplementing and monitoring the security of information assets with current tools and technologiesDirecting day to day security operations, incident response, and mentor a team of security professionalsWorking closely with business leaders, technology leaders, and privacy professionals to assure the organization meets current standards, complies with regulatory requirements, and addresses the future direction of the business.Detailed ResponsibilitiesFinally, the ISO must be able to anticipate emerging threats as they relate to the changing business environment and work with the organization to address and mitigate any risks associated with these threats. Teamwork with legal, vendor management, IT operations, and the business are critical.The ISO will manage the Information Security Office functions and will be responsible for design, implementation, and maintenance of controls and procedures to ensure the integrity and security for all computer-based systems and networks across all technical platforms. In addition, the ISO will oversee the identity management lifecycle and work with the vendor management organization to assure third party vendors and contractors meet company standards. The ISO will work closely with other business groups and stakeholders, including Legal, Compliance, Audit and Risk, ensuring the protection of information and assets including data, systems, databases, networks, and other resources.The ISO will recommend information security investments which mitigate cyber and insider risks, strengthen defenses, and reduce vulnerabilities for development, internal, and client facing systems and products. In this role, the ISO must be able to not only define a strategic vision, but must also be able to implement and execute against it. The ability to communicate to peers, subordinates, and executive management are critical to the success of the ISO.Essential FunctionsReasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.Develop, implement, and monitor a strategic, comprehensive enterprise information security and risk management program.Leverage information security experts and technology to support a secure infrastructure, secure applications, and overall data security; lead strategic security planning with IT Operations, development teams, and users across the organization.Develop, communicate, and ensure compliance with organizational security policies and standards; proactively work with business units to implement practices that meet defined policies and standards for information security.Create and manage information security and risk management awareness training programs for employees, contractors, and approved system users.Work directly with business units to facilitate IT risk analysis and risk management processes; identify acceptable levels of risk, and establish roles and responsibilities with regard to information classification and protection.Provide subject matter expertise to executive management on a broad range of information security standards, best practices, and compliance requirements.Work with developers and architects to ensure security is appropriately built in the development cycle. Coordinate the performance of internal and external network and systems vulnerability assessments and penetration tests.Facilitate the review and verification of all new third party vendors with respect to their information security policies and procedures.Coordinate organizational efforts in response to security events.Develop business-relevant metrics to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security program.Provide oversight and accountability of the day-to-day security operations.Review and oversee all application projects impacting information security.Provide oversight and accountability of the day-to-day security operations and/or other administrative areasAssess information security risk as well as conduct functionality and gap analyses to determine the extent to which key business areas and infrastructure comply with statutory and regulatory requirements.Qualifications10+ years of experience in the information security field and 5+ years of leadership in an information security role.Experience with financial industry compliance regulations.Experience in developing a young organization is significant advantage.Proven experience with current IT security technologies.Demonstrated experience with information security frameworks.Demonstrated understanding of technological trends and developments in the areas of information security, risk management, web architectures, and cloud computing.Demonstrated ability to frame security and risk-related concepts to both technical and nontechnical audiences.Bachelors degree or equivalent experience in an IT-related discipline.3+ years in business architecture, project management, reengineering, IT consulting or other relevant experience.CISSP Certification Preferred.BA/BS required; MBA, MIS or other relevant post-graduate degree a plus.Ability to drive execution of aggressive goals through effective planning, prioritization, resource management, and follow through.Proven track record of building influential relationships with internal customers; ability to influence across departmental lines without direct authority.Ability to think strategically and identify and understand business needs and translate into strategic direction, plans and solutions.Experience working with business process reengineering and IT solutioning; experience working on project teams bringing together both business & technology. Capable of explaining technical concepts to a non-technical audience.Superior verbal and written communication skills, including ability to tailor communications based on audience.Experience leading people, with demonstrated ability to attract, develop, motivate and retain talent.Proficiency in interpreting financial results and business data to identify opportunities and risks.Supervisory ResponsibilityThis position has supervisory responsibilities.Work Environment and Physical DemandsThis job operates in a professional office environment. This role routinely uses standard office equipment such as computers, phones, photocopiers, filing cabinets and fax machines.Position Type/Expected Hours of WorkThis is a full-time position with a work schedule of Monday through Friday with some schedule variations as needed. Hours may vary or exceed 40 in any given week depending on the needs of the business.TravelUp to 10% travel may be needed in this role.EEO StatementACA provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ACA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.California Privacy Notice"As an employer of California residents, we are dedicated to protecting your privacy rights. Any personal information you provide during the application process will be used solely for permitted internal purposes and will be handled in accordance with applicable privacy laws. By applying to this position, you consent to the collection, use, and disclosure of your personal information as described in our Employee Privacy Notice."Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.#LI-KL1
The
Vice President, Information Security Officer
(ISO) will report directly to the General Counsel, and be responsible for:Establishing cybersecurity strategyImplementing and monitoring the security of information assets with current tools and technologiesDirecting day to day security operations, incident response, and mentor a team of security professionalsWorking closely with business leaders, technology leaders, and privacy professionals to assure the organization meets current standards, complies with regulatory requirements, and addresses the future direction of the business.Detailed ResponsibilitiesFinally, the ISO must be able to anticipate emerging threats as they relate to the changing business environment and work with the organization to address and mitigate any risks associated with these threats. Teamwork with legal, vendor management, IT operations, and the business are critical.The ISO will manage the Information Security Office functions and will be responsible for design, implementation, and maintenance of controls and procedures to ensure the integrity and security for all computer-based systems and networks across all technical platforms. In addition, the ISO will oversee the identity management lifecycle and work with the vendor management organization to assure third party vendors and contractors meet company standards. The ISO will work closely with other business groups and stakeholders, including Legal, Compliance, Audit and Risk, ensuring the protection of information and assets including data, systems, databases, networks, and other resources.The ISO will recommend information security investments which mitigate cyber and insider risks, strengthen defenses, and reduce vulnerabilities for development, internal, and client facing systems and products. In this role, the ISO must be able to not only define a strategic vision, but must also be able to implement and execute against it. The ability to communicate to peers, subordinates, and executive management are critical to the success of the ISO.Essential FunctionsReasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.Develop, implement, and monitor a strategic, comprehensive enterprise information security and risk management program.Leverage information security experts and technology to support a secure infrastructure, secure applications, and overall data security; lead strategic security planning with IT Operations, development teams, and users across the organization.Develop, communicate, and ensure compliance with organizational security policies and standards; proactively work with business units to implement practices that meet defined policies and standards for information security.Create and manage information security and risk management awareness training programs for employees, contractors, and approved system users.Work directly with business units to facilitate IT risk analysis and risk management processes; identify acceptable levels of risk, and establish roles and responsibilities with regard to information classification and protection.Provide subject matter expertise to executive management on a broad range of information security standards, best practices, and compliance requirements.Work with developers and architects to ensure security is appropriately built in the development cycle. Coordinate the performance of internal and external network and systems vulnerability assessments and penetration tests.Facilitate the review and verification of all new third party vendors with respect to their information security policies and procedures.Coordinate organizational efforts in response to security events.Develop business-relevant metrics to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security program.Provide oversight and accountability of the day-to-day security operations.Review and oversee all application projects impacting information security.Provide oversight and accountability of the day-to-day security operations and/or other administrative areasAssess information security risk as well as conduct functionality and gap analyses to determine the extent to which key business areas and infrastructure comply with statutory and regulatory requirements.Qualifications10+ years of experience in the information security field and 5+ years of leadership in an information security role.Experience with financial industry compliance regulations.Experience in developing a young organization is significant advantage.Proven experience with current IT security technologies.Demonstrated experience with information security frameworks.Demonstrated understanding of technological trends and developments in the areas of information security, risk management, web architectures, and cloud computing.Demonstrated ability to frame security and risk-related concepts to both technical and nontechnical audiences.Bachelors degree or equivalent experience in an IT-related discipline.3+ years in business architecture, project management, reengineering, IT consulting or other relevant experience.CISSP Certification Preferred.BA/BS required; MBA, MIS or other relevant post-graduate degree a plus.Ability to drive execution of aggressive goals through effective planning, prioritization, resource management, and follow through.Proven track record of building influential relationships with internal customers; ability to influence across departmental lines without direct authority.Ability to think strategically and identify and understand business needs and translate into strategic direction, plans and solutions.Experience working with business process reengineering and IT solutioning; experience working on project teams bringing together both business & technology. Capable of explaining technical concepts to a non-technical audience.Superior verbal and written communication skills, including ability to tailor communications based on audience.Experience leading people, with demonstrated ability to attract, develop, motivate and retain talent.Proficiency in interpreting financial results and business data to identify opportunities and risks.Supervisory ResponsibilityThis position has supervisory responsibilities.Work Environment and Physical DemandsThis job operates in a professional office environment. This role routinely uses standard office equipment such as computers, phones, photocopiers, filing cabinets and fax machines.Position Type/Expected Hours of WorkThis is a full-time position with a work schedule of Monday through Friday with some schedule variations as needed. Hours may vary or exceed 40 in any given week depending on the needs of the business.TravelUp to 10% travel may be needed in this role.EEO StatementACA provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ACA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.California Privacy Notice"As an employer of California residents, we are dedicated to protecting your privacy rights. Any personal information you provide during the application process will be used solely for permitted internal purposes and will be handled in accordance with applicable privacy laws. By applying to this position, you consent to the collection, use, and disclosure of your personal information as described in our Employee Privacy Notice."Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.#LI-KL1