Vice President of Information Security

TRC is a national engineering, consulting, and construction management firm that provides integrated engineering, consulting and construction management services to the Environmental, Power, Oil & Gas and Infrastructure markets. The company is a rapidly growing, highly acquisitive, entrepreneurial company with lots of opportunities. To handle growth activity as well as the continuous evaluation and improvement of systems and processes, the company is actively seeking a highly skilled and focused candidate for the position of Vice President (VP) of Information Security to take on responsibility for enterprise-wide information security and compliance.  TRC is seeking someone that brings a very proactive orientation and is willing to roll up his/her sleeves. This is an excellent opportunity to be part of an industry leading business led by a highly motivated and dynamic CEO with strong support from a private equity partner.  The VP of Information Security must be informed on business practices, regulatory requirements and technical trends. The job requires a strong background and experience in Information Technology, securityarchitecture, high-level communication and interpersonal skills to assemble and create a positive culture for information security and effective business practices. The ideal candidate will be able to consult with internal teams, clients, executives, board members, government agencies, partners and other 3rd parties that to promote security and insure that TRC is protected in delivering world class services. This person should not only understand IT and IS functions, but they should also be able to review contracts attestations and be able to speak as well as understand at a high level what TRC does for its clients that sit in the DHS critical 16 infrastructures. Our clients help support this nation through power generation, energy deliver, infrastructure creation and environmental responsibility, requiring the VP to be as committed to safety and quality as much as if they were to deliver those services. Required Skills: Masters' Degree Minimum 6 years of applicable experience in similar roles OR a minimum of 8 years equivalent experience and a bachelor's degree The ability to quantify the risks for various IT architectures, and then communicate to executive leadership on how to manage that risk The ability to lead the internal team and managed services to detect and respond to threats and vulnerabilities both in day to day services and assessments Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed Knowledge and understanding of relevant legal and regulatory requirements Ability to be a consensus builder, collaborative and persuasive leader who can work cooperatively across the entire enterprise Experience with ISO27001:2013, General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI) and other relevant compliance requirements Desired Skills: Certified Information Systems Security Professional (CISSP), GCIH Certified Incident Handler, Certified Ethical Hacker (CEH) or equivalent information security certification 10 or more years of experience performing systems or network administration, troubleshooting in a complex enterprise environment Familiarity with OSI model and general IP networking Ability to respond to cybersecurity attestations relative to client inquiries Ability to perform contract reviews Experience in development and automation of security operations  TRC offers advancement potential and a competitive compensation and benefits package including a 401k plan with a company match. please visit our website at .  EOE Minorities/Females/Protected Veterans/Disabled
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Vice President of Information Security
New Providence, NJ TRC Companies, Inc.
Head of People Services (Senior Vice President...
Parsippany, NJ Skanska US
Information Security Automation Engineer (Pyth...
Jersey City, NJ UNION BANK, N.A.
Senior Information Security Business Risk Analyst
Camden, NJ Campbell Soup Company
AM Technology - WPF UI Engineer - Vice President
Jersey City, NJ JPMorgan Chase
Information Security Project Manager
Camden, NJ Campbell Soup Company