Sample Job Description for InfoSec/Access Control Manager

Job Description Management

A sample job description outlines the essential duties, responsibilities, and requirements of a specific role within an organization. It provides a clear and concise summary of what the job entails, the expectations for the position, the qualifications, and skills and competencies required to perform the job successfully.
An accurate, well-written job description example can attract qualified candidates and ensure that both the employer and employee have a clear understanding of the role. It can also serve as a basis for performance evaluations and career development plans.
Additionally, sample job descriptions are helpful in other areas of HR, such as to determine pay structure, create a sound job architecture, and ensure legal compliance with labor laws and regulations.
Matching the right person with the right background and skills to the appropriate role is critical to the success of any organization and it starts with an accurate job description.
Our job description management solution, JobArchitect, simplifies the process of creating and maintaining job descriptions, and helps companies accurately communicate a job’s required skills so that you can hire right and perform better.

InfoSec/Access Control Manager Job Overview

InfoSec/Access Control Manager Job Description Sample

Manages the team responsible for ensuring the security of the organization's systems and information assets.

JOB LEVEL
M02
EDUCATION/DEGREE
Bachelor's Degree
REPORTS TO
Director
Salary Range
BASE 50%
$162,157
TOTAL 50%
$175,602
Job Responsibilities for InfoSec/Access Control Manager

Oversees the development and implementation of security systems, guidelines, and strategies. Implements processes and procedures to protect the organization against unauthorized access, use, disclosure, disruption, modification, and/or destruction. Conducts and reviews audits and risk assessments. Reviews and evaluates internal operations and controls. Oversees the migration of non-compliant environments to compliant environments. Ensures compliance with data protection guidelines and applicable laws.

Search Job Openings

Job Openings for InfoSec/Access Control Manager

View Job Description Templates of Similar Jobs

Job Title Job Description
1 Human Resource Information System Manager The Human Resource Information System Manager develops, implements, and modifies software and hardware requirements based on changing business requirements. Manages and oversees an organization's Human Resources Information Systems (HRIS). Being a Human Resource Information System Manager provides the necessary training to meet end users needs. Maintains internal database files and tables, and develops custom reports to meet the requirements of company management and staff. In addition, Human Resource Information System Manager typically requires a bachelor's degree or its equivalent. Typically reports to Director. The Human Resource Information System Manager manages subordinate staff in the day-to-day performance of their jobs. True first level manager. Ensures that project/department milestones/goals are met and adhering to approved budgets. Has full authority for personnel actions. Extensive knowledge of department processes. Working as a Human Resource Information System Manager typically requires 5 years experience in the related area as an individual contributor. 1 to 3 years supervisory experience may be required.
2 Cyber Infrastructure Security Manager The Cyber Infrastructure Security Manager researches and evaluates new or improved security measures to implement for Web systems' security. Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Being a Cyber Infrastructure Security Manager typically reports to a manager or head of a unit/department. Requires a bachelor's degree. The Cyber Infrastructure Security Manager typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Capable of resolving escalated issues arising from operations and requiring coordination with other departments. Working as a Cyber Infrastructure Security Manager typically requires 3+ years of managerial experience.
3 Big Data Analytics Manager The Big Data Analytics Manager oversees the interpretation of results from multiple sources using a variety of techniques, ranging from simple data aggregation via statistical analysis to complex data mining. Manages the daily activities of the team responsible for identifying business trends and problems through big data analysis. Being a Big Data Analytics Manager may require extensive knowledge of big data tools like Hadoop, Hbase, Hive, Zookeeper, etc. Requires a bachelor's degree in related area. Manages the design and implementation of big data solutions for the organization. In addition, Big Data Analytics Manager typically reports to senior management. The Big Data Analytics Manager manages subordinate staff in the day-to-day performance of their jobs. True first level manager. Ensures that project/department milestones/goals are met and adhering to approved budgets. Has full authority for personnel actions. Working as a Big Data Analytics Manager typically requires 5 years experience in the related area as an individual contributor. 1 - 3 years supervisory experience may be required. Extensive knowledge of the function and department processes.
4 VP of Information Security Risk The VP of Information Security Risk is responsible for determining the organization's information security policies and strategies. Plans and leads all information security activities within an organization. Being a VP of Information Security Risk reviews risk evaluations, audits, and security incident investigations and presents information to senior leadership as needed. Provides leadership and oversight to the development, implementation, and enforcement of information security standards and procedures. In addition, VP of Information Security Risk stays current on the latest information security standards and best practices. Ensures compliance with data protection guidelines and applicable laws. May require a master's degree. Typically reports to top management. The VP of Information Security Risk manages a departmental function within a broader corporate function. Develops major goals to support broad functional objectives. Approves policies developed within various sub-functions and departments. Typical
5 Cyber Security Systems Designer I The Cyber Security Systems Designer I defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Being a Cyber Security Systems Designer I designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. In addition, Cyber Security Systems Designer I utilizes a variety of security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in designs. Partners with stakeholders to encourage the adoption of security-compatible software designs and best practices. Keeps abreast of the latest intelligence from law enforcement and other sources of cyber threat information. Typically requires a bachelor's degree in computer science or engineering or equivalent. May require security certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM). Typically reports to a manager or head of a unit/department. Being a Cyber Security Systems Designer I occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. Working as a Cyber Security Systems Designer I typically requires 2 -4 years of related experience.

InfoSec/Access Control Manager Skills & Proficiency Level

Skills Proficiency Level
Budgeting Level 2
Risk Management Level 3
Planning and Organizing Level 3