LiveCareer
LiveCareer
  • Dashboard
  • Jobs
  • Resumes
  • Cover Letters
  • Resumes
    • Resumes
    • Resume Builder
    • Resume Examples
      • Resume Examples
      • Nursing
      • Education
      • Administrative
      • Medical
      • Human Resources
      • View All
    • Resume Search
    • Resume Templates
      • Resume Templates
      • Nursing
      • Education
      • Medical
      • Human Resources
      • Customer Service
      • View All
    • Resume Services
    • Resume Formats
    • Resume Review
    • How to Write a Resume
    • CV Examples
    • CV Formats
    • CV Templates
    • Resume Objectives
  • Cover Letters
    • Cover Letters
    • Cover Letter Builder
    • Cover Letter Examples
      • Cover Letter Examples
      • Education
      • Medical
      • Human Resources
      • Customer Service
      • Business Operations
      • View All
    • Cover Letter Services
    • Cover Letter Templates
    • Cover Letter Formats
    • How to Write a Cover Letter
  • Jobs
    • Mobile App
    • Job Search
    • Job Apply Tool
    • Salary Calculator
    • Business Letters
    • Job Descriptions
  • Questions
  • Resources
  • About
  • Contact
  • 0Notifications
    • Notifications

      0 New
  • jane
    • Settings
    • Help & Support
    • Sign Out
  • Sign In
Member Login
  • LiveCareer
  • Resume Search
  • Director, IT Security and Risk Management
Please provide a type of job or location to search!
SEARCH

Director, IT Security and Risk Management Resume Example

Resume Score: 70%

Love this resume?Build Your Own Now
DIRECTOR, IT SECURITY AND RISK MANAGEMENT
Professional Summary
directs strategy, operations and the budget for the protection of the enterprise information assets and manages that program. The scope of responsibility will encompass communications, applications and infrastructure, including the policies and procedures which apply.
Skills

PCI DSS •Sarbanes-Oxley (SOX) •IDS/IPS •Malware prevention •Secure password repositories •SIEM •SPAM prevention •Web content filtering •IdM/IAM •Encryption and encryption key management •Data Loss Prevention •Change detection •Vulnerability scanners •Incident handling

 •Incident response •Active Directory •Architect and implement security technologies •Investigations and e-discovery •Vendor Security Review •Exchange
Work History
Director, IT Security and Risk Management, 02/2016 to Current
Brinker International – Dallas, TX
  • Developed and implemented a strategic enterprise IT security and IT risk management program to ensure that the integrity, confidentiality and availability of information
  • Managed the information security organization, consisting of direct reports and indirect reports.   This includes hiring, training, staff development, performance management and annual performance reviews
  •  Develop, maintain and publish information security related policies, standards and procedures
  • Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from service providers.
  • Develop and manage the information security budget
  •  Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
  • * Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk. * Provide regular reporting on the current status of the information security program to the enterprise risk team, senior Tribal and casino leaders and the Tribal Business Committee as part of a strategic enterprise risk management program. * Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection. * Develop and enhance an information security management framework based on the following: National Institute of Standards and Technology (NIST) Cyber security Framework and ISO-27K standards as well as any requirements and best practices required by the San Manuel Gaming Commission. * Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. * Liaise with the solution architecture and planning and design team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. * Coordinate information security and risk management projects with resources from the IT organization and business unit teams. * Create and manage a unified and flexible control framework to integrate and normalize the wide variety and ever-changing requirements resulting from global laws, standards and regulations. * Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. * Liaise among the information security team and enterprise compliance, Gaming Commission, audit, legal and HR management teams as required. * Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. * Manage security incidents and events to protect Tribal IT assets, including intellectual property, regulated data and San Manuel's reputation. * Establish relevant threat intelligence feeds and monitor the external threat environment for emerging threats. Advise relevant stakeholders on the appropriate courses of action. * Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. * Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. * Oversee and refine effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. * Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. * Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management. * Perform related duties and fulfill responsibilities as required. 
Senior Manager of Information Technology Security and Risk Management, 06/2014 to 02/2016
Brinker International – Dallas, TX

Senior Manager of Information Security, Network Engineers and IT Phones, 08/2013 to 06/2014
Brinker International – Dallas, TX

Manager of Information Security, Network Engineers and IT Phones, 04/2013 to 08/2013
Brinker International – Dallas, TX

Manager of Information Security, 10/2012 to 04/2013
Brinker International – Dallas, TX

Information Security Analyst, 10/2009 to 10/2012
Brinker International – Dallas, TX
In this role I support the implementation and administration of information security policies, practices, procedures, and technologies in order to ensure the protection of networks, systems, applications, and data. The information security analyst role is the expert within the organization, helping ensure compliance with all security policies and standards, as well as with industry regulations and laws. Day-to-day security operations include responding to security events of interest and recommending corrective action by working with IT and non-IT team members.
Network Security Administrator , 01/2007 to 10/2009
Brinker International – Dallas, TX
In this role I administered all aspects of corporate and restaurant information systems. I planned and coordinated system security and performed analysis/design to produce a variety of innovative solutions to secure the company's data. I was responsible for providing support for help desk issues. I provided technical consultation to project managers as well as developing, designing, testing, and implementing plans and procedures to protect and continue information security activities. Key team member in the implementation of the Identity Management Platform.
IT Corporate Support Analyst, 04/2005 to 12/2006
Brinker International – Dallas, TX
April 2005 - December 2006  (1 year 9 months) In this role I provided technical phone support to corporate and remote users. I addressed hardware, software, and networking issues, as well as one-on-one training. I supported in-house applications and third party applications.
IT Restaurant Support Analyst , 07/2004 to 04/2005
Brinker International – Dallas, TX
In this role I provided technical assistance to restaurant managers, vendors, service providers with the following: critical system failure, hardware or software issues, general questions, clarification on operational procedures, or required one-on-one training for specific functions with their personal computer. This assistance includes support for in-house developed and approved third applications. I scheduled and followed-up of service with vendors; provided hardware, network, and peripheral device installation and troubleshooting.
Support Specialist, 03/2004 to 06/2004
Fossil – Richardson, TX

Support Analyst , 10/2001 to 02/2004
Martin Fletcher – Irving, TX
In this role I supported all aspects of the IT infrastructure for the organization.
Education
BBA: Management Information Systems, 2001
University of Oklahoma - Norman, OK
Accomplishments
STAR Award
Certifications
CISSP (Certified Information Systems Security Professional) International Information Systems Security Certification Consortium GIAC Security Essentials Certification Global Information Assurance Certification License 29008 October 2010 to October 2014 CompTia A+ CompTia February 2005 CompTia Network + CompTia February 2005
Build Your Own Now

DISCLAIMER

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

Resume Overview

Companies Worked For:

  • Brinker International
  • Fossil
  • Martin Fletcher

School Attended

  • University of Oklahoma

Job Titles Held:

  • Director, IT Security and Risk Management
  • Senior Manager of Information Technology Security and Risk Management
  • Senior Manager of Information Security, Network Engineers and IT Phones
  • Manager of Information Security, Network Engineers and IT Phones
  • Manager of Information Security
  • Information Security Analyst
  • Network Security Administrator
  • IT Corporate Support Analyst
  • IT Restaurant Support Analyst
  • Support Specialist
  • Support Analyst

Degrees

  • BBA : Management Information Systems , 2001

Create a job alert for [job role title] at [location].

×

Advertisement

Similar Resumes

View All
Security-and-Risk-Management-resume-sample

Security and Risk Management

Lodo's Bar and Grill

Parker, Colorado

IT-Security-Consultant-/-Risk-Management-resume-sample

IT Security Consultant / Risk Management

Glenview, Illinois

Information-Security-and-Risk-Management-resume-sample

Information Security and Risk Management

Allison Transmission, Inc.

Greenwood, Indiana

About
  • About Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
Help & Support
  • Work Here
  • Contact Us
  • FAQs
Languages
  • EN
  • UK
  • ES
  • FR
  • IT
  • DE
  • NL
  • PT
  • PL
Customer Service
customerservice@livecareer.com
800-652-8430 Mon- Fri 8am - 8pm CST
Sat 8am - 5pm CST, Sun 10am - 6pm CST
  • Stay in touch with us
Site jabber winner award

© 2021, Bold Limited. All rights reserved.