As Chief Information Security Officer, you will:
- Serve as a senior advisor and program administrator to the CDC Chief Information Officer;
- Develop, implement, and monitor a strategic, comprehensive cybersecurity program with organizational units;
- Implement and maintain CDC’s cybersecurity program to ensure that information assets and associated technology, applications, systems, infrastructure, and processes are adequately protected in the digital ecosystem;
- Lead the development, planning, and coordination of the information security and privacy operations related to cybersecurity and privacy programs;
- Facilitate information security risk assessment and risk management processes with organizational units;
- Identify and evaluate the legal and regulatory requirements for information technology and cybersecurity risk to information assets while supporting and advancing the mission and business objectives;
- Implement practices that meet policies and standards for information security and privacy with business units and partners;
- Facilitate an information security governance structure through the implementation and oversight of an appropriate governance program;
- Develop and enhance an up-to-date information security management framework using standards and policies;
- Manage and contain information security incidents and events to protect corporate information technology (IT) assets, intellectual property, and regulated data;
- Represent and serve as spokesperson for the Chief Information Officer in establishing and maintaining relationships and partnerships with constituents including DHHS, congressional officials, other federal agencies, and representatives of business and industry.
- Provide supervision and direction to employees and staff…”
G2X TAKE: On the heels of the CDC CISO departing the Agency, the Centers for Disease Control and Prevention is seeking a lead for this SES role that implements and maintains its cybersecurity program to ensure that information assets and associated technology, applications, systems, infrastructure, and processes are adequately protected in the digital ecosystem.