Chief Information Security Officer

Position ID: 45625
Dalton State College
Position Description
New Position?: 
Job Class: 
Chief Information Officer
Job Description: 

Chief Information Security Officer


Acquire and manage the necessary resources/Advise senior management (e.g. CIO) (30%)
• Manage financial resources and key security personnel to support IT security goals and objectives and reduce overall organizational risk.
• Advise on cost/benefit analysis of information security programs, policies, processes, systems, and elements.
• Communicate the value of IT security throughout all levels of the organization, stakeholders and external partners.
• Advocate organization’s official position in legal and legislative proceedings.
• Interface with external organizations (e.g., public affairs, law enforcement, legal affairs, USG,) to ensure appropriate and accurate dissemination of incident and other cybersecurity operations information.

Cyber strategy (30%))
• Design/Implement a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan and assures full compliance with the laws and applicable regulations.
• Lead and align information technology (IT) security priorities with the IT and organizational strategy.
• Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure that they provide the intended level of protection.
• Develop data analytics that measure and support value or implement changes to improve efficiencies as needed.
• Ensure that disaster recovery and business continuity plans are in place and tested.

Policy and Awareness (30%)
• Recommend policy and coordinate review and approval.
• Serve as a champion for Information Security by actively participating in the professional community as well as providing presentations and awareness training to all Dalton State personnel.
• Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.
• Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

Collaboration and Support (10%)
• Collaborate with key stakeholders to establish a cybersecurity risk management program and manage a reoccurring information security risk assessment.
• Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.


• Ability to apply strong communication skills to interface with fellow team members, IT support staff, customers, business partners, management, vendors, and external parties to accomplish organizational security objectives.
• Ability to supervise cybersecurity departmental resources, including personnel, financial resources, and technical capabilities, to reduce overall organizational risk.
• Ability to collaborate with internal and external stakeholders to identify and/or develop appropriate solutions technology.
• Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities and which reflect the institution’s core privacy objectives.
• Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
• Knowledge in leading an enterprise information security team, including hiring, staff development and coaching a team of IT security experts. Knowledge of computer networking concepts and protocols, and network security methodologies.
• Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
• Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
• Knowledge of cybersecurity and privacy principles.
• Knowledge and experience of cyber threats and vulnerabilities.
• Knowledge and experience with operational impacts of cybersecurity lapses.
• Knowledge of application vulnerabilities.
• Knowledge of emerging security issues, risks, and vulnerabilities.
• Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
• Skill in negotiation, vendor management inclusive of agreements and privacy practices.

Application Procedure: 
Please see the below "Institution Employment Link" to view a complete job description, create an application, and apply for the position.
CIP Discipline Code: 
Computer and Information Systems/Cyber Security/Information Assurance
Computer Information Sciences and Systems, General
Computing Support (Admin code)
Information Technology
Computer/Information Technology Services Administration and Management, other
Degree Levels: 
Position Type: 
Application Deadline: 
Position Starting Date: 
Thursday, April 16, 2020
Recruitment Data
Search Chair: 
Jeff Marshall
Vacancy Status: 
Annual Salary: 
$71,265 - $75,000.

The hiring institution advertising this vacant position is responsible for the application, hiring procedures and content within this advertisement.  Please contact the institution for questions concerning this vacant position.

University System of Georgia
Applicant Clearinghouse
278 Brooks Hall
The University of Georgia
Athens, Georgia 30602

Phone: (706) 542-7817
Fax: (706) 542-2822


Janyce Dawkins, Director

Kristopher Stevens, Associate Director

Tafara Makaya, Assistant Director

Kieran Morrow, Assistant Director

Kristopher Bolden, Assistant Director

Thomas Brazzle, System Coordinator