Chief Information Security Officer

University of Utah

Salt Lake City, UT

ID: 7058068
Posted: June 18, 2019

Job Description

Job Summary
This position reports to the CIO and has overall responsibility for ensuring that appropriate policies, standards, procedures and automated mechanisms, designed to appropriately protect the security of information are documented and followed across the Institutions (University of Utah and University of Utah Hospital and Clinics). Sensitive or protected information may include information related to patients, employees, students, and faculty, as well as information protected by state, federal, or industry policy (FERPA, HIPAA, FISMA, PCI, etc.). This information may exist in either electronic or paper form.

The Chief Information Security Officer (CISO) has management responsibility over the Information Security Office, including the hiring, evaluating, training, performance management, salary administration, mentorship, development and retention of staff.

The position works closely with the General Counsel of both the University and Hospital and Clinics, those areas within Information Technology with responsibility for system and network security, access control, physical security, application development and/or application product selection and procurement, as well as all relevant academic and administrative Schools and Departments throughout the Institutions.

This position also interfaces with other Utah higher education institutions, as well as other private and governmental agencies.

The CISO will work with relevant government and regulatory agencies to interpret regulations related to the protection of information owned or trusted to the control of one of the University of Utah institutions.
The CISO will provide advice and counsel related to the development of policies, procedures and electronic safeguards designed to meet the needs of government regulations. The CISO must help the Institutions identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of information; evaluate the effectiveness of the current safeguards for controlling these risks; design and implement safeguard programs, and regularly monitor and test those programs. The CISO will work with appropriate senior leadership to determine methods for dealing with infractions of policies associated with privacy and security, and will identify individuals or groups where inappropriate behavior exists. The CISO will be responsible for development of procedures related to internal reaction to a security event. Additionally, the CISO will take a leadership role in coordinating activities related to a security event and will act as a focal point for the distribution of security information including alerts, notices of significant intrusions, etc. They will also develop and conduct regularly scheduled security and privacy awareness programs.

About UIT: University Information Technology (UIT), the central IT service provider for campus, reports to the Chief Information Officer and is responsible for many of the University of Utah’s most critical common IT resources including the campus network; the Campus Information Services (CIS) portal; UMail, telephone, and online collaboration services; high performance and research computing; information security; teaching and learning technologies; software licensing; and a host of other systems and services. For more information about UIT visit

About the University: Located in Salt Lake City, in the foothills of the Wasatch Mountains, the University of Utah is the flagship institution of the State of Utah’s system of higher education and a member of the PAC-12 Conference. Salt Lake City combines the amenities of a major metropolitan area of more than one million people with the friendliness and ease of living of a small, Western city. Seven major ski resorts are within an hour’s drive from campus, and opportunities to pursue activities from biking to hiking to fishing abound. Salt Lake is also home to the Utah Symphony and Opera, the Utah Ballet, several professional sports teams, and a wide range of other cultural and recreational activities.

● Development of security and privacy policies (in conjunction with IT governance and other policy development groups) that embody industry best practices. Areas of oversight include, but are not limited to, EMR system, ERP system, data warehouses, information systems, email, identity and access management, software evaluation, cloud storage and systems, infrastructure for accessing systems, security systems used to monitor activities, and business systems.
● Perform management functions associated with leadership of the Information Security Office, including the hiring, evaluating, training, performance management, salary administration, mentorship, development and retention of staff in a complex multi-billion dollar organization.
● Coordinate responses to security events or violations of the confidentiality of information. This includes coordination of activities related to containment, forensics, management notification, interaction with Marketing and Communications and General Counsel, etc.
● Review and oversee critical notification processes for security incidents. Ensure that processes to identify and appropriately announce security incidents as well as internal procedures outlining responses to security related problems appropriately reflect widely practiced processes found at other national research universities as well as other major academic medical centers and adhere to all regulatory requirements.
● Coordinate planning activities related to responses to security events. Planning activities are to include cross departmental and cross campus procedures, as well as coordination with outside law enforcement or partner agencies.
● Work with regulatory bodies and the Legal offices to interpret regulations, laws, grant stipulations, etc. and develop policies, processes and standards that ensure compliance with these regulations.
● Develop a formal process to review, on a quarterly basis, procedures, incidents, and responses associated with the security of information and report to senior management all relevant materials. Also facilitate a metrics and reporting framework for measuring the efficiency and effectiveness of the security program.
● Participate in the evaluation of vendors, and weigh in on activities and capabilities that relate to business continuity, disaster recovery, and enterprise architecture.
● Prepare and present training activities, materials, and awareness programs that encourage proper security practices and prepare the organization for security events.
● Validate that activities and controls related to the prevention of security incidents are in place and being followed and improved. This includes a review of physical access controls where secure information is contained, review of software programs and operating systems to ensure that updates and patches are being applied, review of security procedures to ensure compliance, review of adherence to policies and standards governing the use and management of systems, involvement in testing of disaster recovery and business continuity plans and validation of results, etc.
● Ensure that risk assessments are conducted as they relate to the appropriate protection of electronic resources. In conjunction with other departments within the Institutions, conduct regular risk assessments.
● Ensure that appropriate controls related to the access of secure information are documented and are being followed (this may include access control lists, passwords or other access controls, authentication and authorization mechanisms, etc.).
● Evaluate gaps in security and identify solutions to mitigate risk, including business process, technical controls, or policy improvements.
● Work with other groups and offices within the Institutions to assess the level of risk associated with the maintenance of paper records, management of information contained in non-electronic form, use of electronic signatures, use of identifying information (patient identifier, Social Security Number, etc.), use of identification cards including smart card technology. Assist with the development of policies and processes designed to protect information and reduce the risk of exposing this information.
● Assess the Institutions compliance with policies and report the results of these assessments to executive management.
● Develop guidelines for disciplinary actions that would apply to persons/groups found to be violation of policies
● Build collaborative internal relationships with research, clinical and administrative groups as well as external relationships with regulatory bodies, other hospitals, universities, especially other academic medical centers as well as local and national security groups (i.e. SAN, CERT, etc.).

This job description is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to the job.

Minimum Qualifications
Requires a bachelor’s degree in a related area or equivalency with at least 10 years of progressively more responsible management experience; and no less than 4 of those years in IS related capacity and demonstrated leadership, human relations and effective communications skills required. Master’s degree related area preferred.

Applicants must demonstrate the potential ability to perform the essential functions of the job as outlined in the position description.

Preference will be given to applicants with the following qualifications:

Four-year degree in a related technical, audit, law or security field, in combination with a minimum of 10 years of experience in a business environment (health care or high education preferred) with a track record of progressive responsibilities and at least five years in a management capacity. A combination of work experience and specialized technical training may be substituted for college degree. Candidate should have a minimum of four years of experience in an IS related capacity that includes a general understanding of application programming and design, data base design, networking components (switching, routing, wireless technologies, etc.), security components (firewalls, intrusion detection engines, etc.), computer operations, and operating system maintenance. It is essential that the individual have an understanding of privacy and security regulations as they apply to FERPA, HIPAA, FISMA, and PCI-DDS. Ideal candidates also should have:
● At least one industry accepted certification, such as CISSP, CISM, or CISA.
● A general understanding of the research environment, the need for using production data for research purposes, regulations related to government grants, and some familiarity with government agency reviews and audits related to grants.
● The ability to assess the effects and requirements of government regulations and the ability to interpret that information for business leaders.
● Excellent written and oral communications skills, including high-level presentation abilities.
● The ability to mediate contentious situations and develop consensus across the academic and health systems.
● A demonstrated history building bridges across organizational boundaries and the ability to communicate with technical as well as non-technical persons in management across a large, complex organization. They will be a transparent leader with high integrity, capable of building strong, trusting relationships.
● The candidate must have deep knowledge and experience with security and regulatory compliance as well as external audits, and a proven record of creating and implementing a successful multi-year information security program in a complex environment.


Apply Now

Please mention to the employer that you saw this ad on