PRIMARY JOB RESPONSIBILITY
the organization’s corporate systems, network and management information systems, mail, digital systems, ERP, and all other automated services are up, secure, and meet the availability requirements. This is done by leading the ICT Team in conceptualizing, developing, and implementing IT projects and solutions.
Information and communication technology in areas of accountability and responsibility:
- Develops, aligns, and implements practices to maximize efficiency, increase scalability, manage risks, allow for future growth, and deliver a highly satisfying client experience for all stakeholders; collaborates with corporate leadership to provide strategy, oversight, and direction for healthcare management operations; and
- The information security administrator has a technical role in many risk management controls’ deployment and upkeep.
A. Duties and Responsibilities
- Drive the creation of strategies and plans for enhancing both architectural and application security by collaborating with the Enterprise applications team.
- Define the standards and required application security controls for built IT applications.
- Improve outcomes by working together with information security, IT, and business.
- Create and deploy procedures and equipment for integrating static and automated testing methods.
- Application Security Testing (SAST, DAST, and other types of testing)
- To find holes and overlap in the security portfolio, do threat assessment and modeling, and make recommendations.
- Oversee various projects of varying sizes and complexity X
- Creates management reports with custom metrics, trend statistics, and management information on the health of application security
- Use industry best practices for incident response to take corrective action, and offer guidance on remediation measures for security events escalated to information security.
- Maintains expertise in tools, techniques, countermeasures, and trends in exploits and attack vectors through research and development
- Does penetration testing on all websites, applications, and third-party partnerships for the firm.
- Understanding and providing strategic adoption roadmaps for cutting-edge technologies such as cloud, developments, cloud native architectures, data and cognitive, and AI-driven threat detection and security evaluations
- Make sure security measures are implemented and documented.
- oversee the regular upkeep of controls,
Operations, Information Communication Technology
- Identify and handle incidents with information security in accordance with a process.
- To stop an information security incident, the information security administrator acts.
- wherever possible, prevent from happening or escalating
- Keep information security records in compliance with the rules and guidelines that have been established.
B. Duties and Responsibilities done at IRREGULAR or INTERMITTENT Intervals
- Gives leadership to the teams in charge of the technical support, application support, and project implementation; establishes roles and duties; and sets performance goals in accordance with ISO standards (KRA-KPI)
- Creates, develops, and implements the organization’s security solutions and information security projects.
- Finds the most competent and suitable vendors or suppliers of hardware and software.
- Ensures that shared resources and services are reasonably utilized in coordination with the IT departments of affiliated organizations to achieve cost effectiveness and expedited delivery of IT services.
- Through communication and cooperation with ICT service providers, heads of departments and divisions, and all elements of the coordinated ICT decision-making framework, develops an agile and standard-based ICT culture open to change and innovation.
C. STANDARD RESPONSIBILITY STATEMENTS
- Accepts responsibility for quality and information security management system effectiveness;
- Ensures that the goals and policies for the quality and information security management system are created and are consistent with the organization’s context and strategic direction;
- Ensures that the organization’s business processes comply with the standards of the quality and information security management systems;
- Encourages the application of process thinking and risk-based thinking;
- Guaranties the availability of the resources required for the quality and information security management system;
- Conveys the significance of adhering to the quality and information security management system and effective quality and information management;
- Makes certain that the quality and information security management system produces the desired results;
- Engages, guides, and supports individuals to contribute to the quality and information security management system’s effectiveness;
- Promotes progress; and Aids other pertinent management positions to show their leadership as it relates to their responsibilities.
- Performs additional related tasks that THE IMMEDIATE SUPERIOR may delegate