Close

OCU C)ISSO D Discussion Lesson 06

Viewing 4 reply threads
  • Author
    Posts
    • #65764
      Jessica Jagerson
      Keymaster

      Construct a job posting for a company for an Operations Security Management position.  Be sure to discuss the basic responsibilities, concerns, logs and monitoring, records management, change control process, patch management, and access rights. Write in complete sentences using information from the text and videos.

    • #85167
      Marcena Davis
      Participant

      Job Title: Operations Security Manager

      Job Overview:

      We are looking for an experienced Operations Security Manager to join our team. The ideal candidate is a detail-oriented professional with a strong background in security management and risk assessment. As an Operations Security Manager, you will be responsible for ensuring the security and integrity of our company’s systems and data.

      Key Responsibilities:

      Develop and implement security policies and procedures to protect company assets and data

      Conduct risk assessments and vulnerability testing to identify potential threats and recommend appropriate controls

      Monitor and analyze security logs and alerts to identify potential security breaches

      Manage records and documentation related to security incidents, investigations, and remediation efforts

      Oversee the change control process to ensure that system changes are properly reviewed and approved

      Manage the patch management process to ensure that systems are kept up-to-date with the latest security patches

      Manage access rights to ensure that only authorized personnel have access to sensitive data and systems

      Requirements:

      Bachelor’s degree in Computer Science, Information Security, or a related field

      5+ years of experience in security management or operations management

      Strong understanding of security frameworks and standards (e.g., ISO 27001, NIST)

      Experience with security monitoring tools and techniques

      Excellent communication and interpersonal skills

      Ability to work independently and manage multiple projects simultaneously

      If you’re a security professional with a passion for protecting data and systems, we encourage you to apply for this exciting opportunity. We offer competitive compensation, comprehensive benefits, and a dynamic work environment.

      • #85214
        Kelly Crooks
        Participant

        Marcena, awesome job on the Operations Security Manager job listing. Your listing was very well written and easy to follow. It looked very professional. liked how you listed the key responsibilities of the position as well as the applicant requirements.

        I liked how you listed one of the requirements that the applicant must have a strong understanding of security frameworks and standards. I didn’t think of listing any educational background in my post. Very well done! I would definitely apply for the position.

      • #85713
        Kevin Mehok
        Participant

        Marcena,

        I would like to apply for this role. What is the most important piece of your job description that you would like for a candidate to possess?

        God Bless,

        Kevin

    • #85178
      Kelly Crooks
      Participant

      We are looking to add an experienced Operations Security Officer to our organization to organize and oversee all security operations. Applicants must have experience in security management as well as risk assessment.

      As the Operations Security Manager, your responsibilities will include the following:

       Ensuring that all systems are operated according to policy and procedure
       Ensure that backups and other essential tasks are performed
       Develop and support an effective incident response plan
       Change management, patch, and configuration management plans
       Fix hardware and software issues
       Maintain security mechanisms
       Controlling and maintaining remote access
       Maintaining input/output controls
       Vendor software licensing issues
       Variance detection
       Contingency planning

      Applicant requirements:
       At least five years of professional experience
       Familiarity with security frameworks and how to implement them
       Great communication skills
       Ability to work under deadlines or pressure
       Willingness to work long hours on occasion
       Ability to work with other team members or individually
       Great management skills
       Ability to focus and stay on task
       Ability to complete tasks promptly
      We offer competitive wages, paid training, paid vacation, paid time off, 401k, and dental, health, and vision insurance for individuals or families. If this sounds like the career for you please click on the link below to apply today and get your future started.

      • #85712
        Kevin Mehok
        Participant

        Hey Kelly,

        Excellent job. I feel like applying for a job. Your description is darn near perfect. I just need the pay to be 250k annually, please.

        Best regards,

        Kevin

    • #85195
      Marcena Davis
      Participant

      I appreciate how the job responsibilities are well laid out and cover a broad range of security-related tasks such as incident response, change management, contingency planning, and maintaining security mechanisms. These tasks are essential in ensuring that the organization’s systems and data are secure from any security threats.

      I also like that the job requirements are specific and require at least five years of professional experience in security management. Additionally, the organization offers competitive wages, paid training, vacation, and health insurance for individuals or families, making it an attractive opportunity.

    • #85711
      Kevin Mehok
      Participant

      IST3100 Information Systems Security Officer
      Week Two
      Lesson 6 Discussion

      What Is Records Management? Well, this week we have learned that records management (RM), also known as records and information management (RIM), is an organizational function responsible for the creation and maintenance of a system to deal with records throughout a company’s lifecycle (Weller, 2017). RM includes everything from the creation of a record to its disposal (Weller, 2017). Essentially, it comprises anything that is part of a business transaction (Weller, 2017).

      Some people use the term information governance (IG) when talking about records management (Weller, 2017). IG is the management of information to support an organization’s present and future, keeping in mind the regulatory, legal, environmental, and operational requirements (Weller, 2017). It includes the structure, policies, procedures, and processes necessary to manage all the information stored within an organization (Weller, 2017).

      What Makes Something a Record? We learned this week that a record is somewhat complicated (Weller, 2017). The International Organization for Standardization (ISO) is an independent, non-governmental international organization that develops international standards to be implemented globally throughout its 162 national standards bodies (Weller, 2017). The ISO 15489-1:2001 defines records as “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction of business” (Weller, 2017). ISO 15489 is divided into two parts: concepts and principles, and guidelines (Weller, 2017). Together, the two parts provide an outline for a comprehensive records management program (Weller, 2017).

      Essentially, a record is content that documents a business transaction (Weller, 2017). A record usually does not include drafts, duplicates, or convenience copies of documents (Weller, 2017). For example, a final response to a proposal is a record, but the drafts, comments about the drafts, and correspondence about the proposal might not be (Weller, 2017). Personnel files are records, as are social media posts and instant messages (therefore, records management does not just involve paper documents)(Weller, 2017). According to The Global Trade Association for Information Management Companies (PRISM), courts consider all of the following to be records: doodles on a paper napkin, core samples from oil exploration, a pipe with a part number on it, and sections of frozen tissue samples (Weller, 2017).

      A record serves as evidence of an event. Therefore, you can often take a record into a court of law to prove authenticity, reliability, integrity, and usability (Weller, 2017). Records can provide necessary documentation for an audit, court case, or other official uses (Weller, 2017).

      A record can also be anything that includes personally identifiable information (PII) (Weller, 2017). Companies that are in the financial services, health, government, or legal sectors must be particularly aware of this kind of record (Weller, 2017).

      God Bless,

      Kevin

      References:

      Weller, J. (2017) https://www.smartsheet.com/record-management

Viewing 4 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission