Skip navigation

ISMS Manager

Help

ISMS Manager

ISO Document Type: 
Job Descriptions (JD)
Related To:
Related Department: 
Customer Service
Issue no: 
01
Code: 
1213 -- 1313
Approved By: 
Chairman
Job Purpose: 
the Information Security manager is in charge of the Information Security Management function, providing line management, leadership and strategic direction for the function and liaising closely with other managers. The purpose of the Information Security Management function, in turn, is to bring the organization’s information security risks under explicit management control through the Information Security Management System
Reports to: 
Chairman

Key responsibilities[this is not an exhaustive list and the details are bound to change over time]:

·     Routine line management and leadership of staff within the Information Security Management function

·     Leadership and strategic direction for the function, ranging from planning and budgeting to motivational and promotional activities expounding the value of information security

·     Liaison with and offers strategic direction to related governance functions (such as Physical Security/Facilities, Risk Management, IT, HR, Legal and Compliance) plus senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies

·     Recruitment, leadership and direction for a loose network of information security ambassadors distributed throughout the organization

·     Leads the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27000 series standards, including certification against ISO/IEC 27001 where applicable

·     Forms a “centre of excellence” for information security management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively

·     Leads or commissions the preparation and authorizes the implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the Security Committee

·     Leads the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations

·     Leads or commissions suitable information security awareness, training and educational activities

·     Leads or commissions information security risk assessments and controls selection activities

·     Leads or commissions activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties

Key personal characteristics and competencies of the ideal candidate[this is also not an exhaustive list, and some aspects may not be legal in some jurisdictions]:

·     At least 5 yearsof full-time work experience in information security management and/or related functions (such as IT audit and IT Risk Management)

·     Information security management qualifications such as CISSP or CISM

·     Absolutely trustworthy with high standards of personal integrity (demonstrated by an unblemished career history, complete lack of criminal convictions etc.), and willing to undergo vetting and/or personality assessments to verify this if necessary

·     Hands-on team leadership and management experience, ideally coupled with suitable management qualifications such as an MBA

·     Typically a background in technical IT rôles such as IT architecture, development or operations, with a clear and abiding interest in information security

Demo | QMS (ISO 9001)
Need help?

Notebook

The notebook section provides a way for you to store and share information with your group members. With the book feature you can:

  • Add book pages and organize them hierarchically into different books.
  • Attach files to pages to share them with others.
  • Track changes that others have made and revert changes as necessary.
  • Archive books that are no longer of interest to the group. Archived books can be reactivated later if needed.