Director, Cyber Operations - Information Solutions/Security
South Park - Building 3, United States
Medical University of South Carolina
The Medical University of South Carolina (MUSC) aims to empower the state and beyond through innovative research, education, and commitment to patient care.Job Description Summary
The Director of Cyber Operations reports to the Chief Information Security Officer of Information Solutions. The Director of Cyber Operations leads the strategy and execution of system initiatives, ensuring alignment with IS and organizational goals. They set the vision and direction for their teams in collaboration with the CISO. Overseeing budgeting, resource allocation, and vendor relationships, they ensure successful implementation and optimization of systems. The Director drives roadmap development and leadership engagement, while prioritizing initiatives and providing resource oversight. They also establish and enforce policies to ensure operational efficiency, compliance, and continuous improvement.Entity
Medical University Hospital Authority (MUHA)Worker Type
EmployeeWorker Sub-Type
RegularCost Center
CC002271 SYS - CISO OperationsPay Rate Type
SalaryPay Grade
Health-35Scheduled Weekly Hours
40Work Shift
Job Description
The Director of Cyber Operations reports to the Chief Information Security Officer of Information Solutions. The Director of Cyber Operations leads the strategy and execution of system initiatives, ensuring alignment with IS and organizational goals. They set the vision and direction for their teams in collaboration with the CISO. Overseeing budgeting, resource allocation, and vendor relationships, they ensure successful implementation and optimization of systems. The Director drives roadmap development and leadership engagement, while prioritizing initiatives and providing resource oversight. They also establish and enforce policies to ensure operational efficiency, compliance, and continuous improvement.
Oversees the following areas:
Security Operations functional area of the information security program. Leads a team of security experts, including analysts and engineers, responsible for cyber security monitoring, incident response, threat intelligence, insider risk, vulnerability management, red teaming and blue teaming, and eDiscovery.
Governance, Risk, and Compliance functional area within the Information Security Office. Leads a team of security experts responsible for managing enterprise information security risk, including compliance with federal, state, local and industry regulations pertaining to information security in support of the academic, research and healthcare missions of MUSC. Facilitates the creation, adoption and socialization of information security policy as well as analyzing risk for new information technology services and solutions. Manages the people, process and technology components of the Security Governance, Risk and Compliance team. Oversees business continuity and problem management for the IT department. Assists with communicating cyber risk to institutional leadership.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree or equivalent in information security, information assurance, computer science, or a related field with 9 years of information security experience; and, at least 4 years of management experience.
Experience with security and compliance frameworks including one or more of the ISO 27000 series,
HIPAA/HITECH, PCI and NIST/FISMA frameworks. Ability to work with contracting officers, Institutional Review Boards, and Legal Affairs on information technology matters. Advanced understanding of security administration for various systems, operating systems and software.
Ability to develop project plans for information security systems. Advanced analytical and problem-solving skills. Advanced knowledge and understanding of information risks concepts and principles as a means of relating business needs to security controls. Excellent documentation and presentation skills required. Ability to manage several information security programs simultaneously.
One of the following is required: CISSP, CISM, CISA, CRISC or GIAC. Other relevant Information Security certifications highly desirable.
Physical Requirements: Ability to perform job functions while standing. (Continuous) Ability to perform job functions while sitting. (Continuous) Ability to perform job functions while walking. (Continuous) Ability to climb stairs. (Infrequent) Ability to work indoors. (Continuous) Ability to work outside in temperature extremes. (Infrequent) Ability to work from elevated areas. (Frequent) Ability to work in confined/cramped spaces. (Frequent) Ability to perform job functions from kneeling positions. (Infrequent) Ability to bend at the waist. (Continuous) Ability to twist at the waist. (Frequent) Ability to squat and perform job functions. (Frequent) Ability to perform "pinching" operations. (Frequent) Ability to perform gross motor activities with fingers and hands. (Continuous) Ability to perform firm grasping with fingers and hands. (Continuous) Ability to perform fine manipulation with fingers and hands. (Continuous) Ability to reach overhead. (Frequent) Ability to perform repetitive motions with hands/wrists/elbows and shoulders. (Continuous) Ability to fully use both legs. (Continuous) Ability to use lower extremities for balance and coordination. (Frequent) Ability to reach in all directions. (Continuous) Ability to lift and carry 50 lbs. unassisted. (Infrequent) Ability to lift/lower objects 50 lbs. from/to floor from/to 36 inches unassisted. (Infrequent) Ability to lift from 36" to overhead 25 lbs. (Infrequent) Ability to exert up to 50 lbs. of force. (Frequent) Examples include: To transfer a 100 lb. patient that can not assist in the transfer requires 50 lbs. of force. For every 100 additional pounds, assistance will be required from another healthcare worker. 20 lbs. of force is needed to push a 400 lb. patient in a wheelchair on carpet. 25 lbs. of force is required to push a stretcher with a patient with one hand. Ability to maintain 20/40 vision, corrected, in one eye or with both eyes. (Continuous) Ability to see and recognize objects close at hand or at a distance. (Continuous) Ability to match or discriminate between colors. (Continuous) Ability to determine distance/relationship between objects; depth perception. (Continuous) Good peripheral vision capabilities. (Continuous) Ability to maintain hearing acuity, with correction. (Continuous) Ability to perform gross motor functions with frequent fine motor movements. (Continuous) Ability to deal effectively with stressful situations. (Continuous) Ability to work rotating shifts. (Frequent) Ability to work overtime as required. (Frequent) Ability to work in a latex safe environment. (Continuous) Ability to maintain tactile sensory functions. (Continuous) (Selected Positions) *Ability to maintain good olfactory sensory function. (Continuous) *(Selected Positions) *Ability to be qualified physically for respirator use, initially and as required. (Continuous) (Selected Positions)
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: http://www.uscis.gov/e-verify/employees
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CISA CISM CISO CISSP Compliance Computer Science CRISC FISMA GIAC Governance HIPAA Incident response ISO 27000 Monitoring NIST Red team Strategy Threat intelligence Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.