Virtual GRC Manager

We will responsible for establishing and maintaining a corporate wide information security management program to ensure that information assets are adequately protected. We will be identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise.

We are team of visionary leader with sound knowledge of business management and a working knowledge of information security technologies more than two decades. We will proactively work with business units to implement practices that meet defined policies and standards for information security. We will work with executive management to determine acceptable levels of risk for the organization.

Strategic Support and Management

  • Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization.
  • Manage the enterprise’s information security organization. This includes hiring, training, staff development, performance management and annual performance reviews.
  • Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
  • Review and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
  • Review, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
  • Develop and manage information security budgets, and monitor them for variances.
  • Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
  • Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
  • Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
  • Ensure that security programs comply with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
  • Review and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
  • Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company’s reputation.
  • Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action.
  • Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.
  • Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
  • Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.
  • Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and comply with policies and audit requirements.
  • Manage security issues and incidents, and participate in problem and change management forums. Ensuring timely reporting and adequate participation in investigation for ICT security incidents, with Q-CERT and / or Law Enforcement agencies as applicable.
  • Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.
  • Assist resource owners and IT staff in understanding and responding to security audit failures reported by auditors.

Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.