• Success
    Manage your Success Plans and Engagements, gain key insights into your implementation journey, and collaborate with your CSMs
    Success
    Accelerate your Purchase to Value engaging with Informatica Architects for Customer Success
  • Communities
    A collaborative platform to connect and grow with like-minded Informaticans across the globe
    Communities
    Connect and collaborate with Informatica experts and champions
    Have a question? Start a Discussion and get immediate answers you are looking for
    Customer-organized groups that meet online and in-person. Join today to network, share ideas, and get tips on how to get the most out of Informatica
  • Knowledge Center
    Troubleshooting documents, product guides, how to videos, best practices, and more
    Knowledge Center
    One-stop self-service portal for solutions, FAQs, Whitepapers, How Tos, Videos, and more
    Video channel for step-by-step instructions to use our products, best practices, troubleshooting tips, and much more
    Information library of the latest product documents
    Best practices and use cases from the Implementation team
  • Learn
    Rich resources to help you leverage full capabilities of our products
    Learn
    Role-based training programs for the best ROI
    Get certified on Informatica products. Free, Foundation, or Professional
    Free and unlimited modules based on your expertise level and journey
    Self-guided, intuitive experience platform for outcome-focused product capabilities and use cases
  • Resources
    Library of content to help you leverage the best of Informatica products
    Resources
    Most popular webinars on product architecture, best practices, and more
    Product Availability Matrix statements of Informatica products
    Monthly support newsletter
    Informatica Support Guide and Statements, Quick Start Guides, and Cloud Product Description Schedule
    End of Life statements of Informatica products
Last Updated Date May 25, 2021 |

The Security manager is responsible for defining and ensuring adherence to security policies and standards within the Enterprise Information Technology (IT) environment and works to develop security policies and guidelines in conjunction with application and process owners. The Security Manager is responsible for promoting organizational security awareness and advising management about security issues and potential threats. He/she may also carry out risk analysis activities. It is important that the Security Manager be current on the latest security problems/risks/resolutions. Interacting with partner companies and security organizations to share ideas around security issues is highly recommended.

Responsibilities

  • Develops enterprise security standards and policies 
  • Makes recommendations to achieve operational and project goals in conjunction with security requirements and best practices
  • Monitors and assesses security vulnerabilities across technical disciplines
  • Acts as a subject matter expert for the technical security arena
  • Provides advisory services to direct reports, security team members and the business
  • Serves as an escalation point for security related issues and works to resolve security risks and to minimize potential threats
  • Researches and stays current on new and evolving technologies and associated security risks
  • Develops security tools and utilities that may be leveraged by the organization
  • Reviews security specific change requests and provides risk assessments for changes
  • Builds and maintains relationships with peer security professionals

Qualifications/Certifications

  • Experience in the IT security sector
  • Ability to lead and manage technical staff
  • Capable of designing and implementing state-of-the-art security services
  • Experience providing advisory services in the area of technology and security architecture
  • Broad understanding of computer and communication systems and networks and their interrelationships
  • Strong task and project management skills with the ability to manage parallel work streams
  • Good understanding of privacy and regulatory laws, their implications, and mitigating measures
  • CISSP or related certification

 

Table of Contents

Success

Link Copied to Clipboard