The CTO will oversee and coordinate both Information Technology and Cybersecurity efforts for the organization and the identification of emerging technologies, security initiatives and the development of standards for both. Implement and support technology initiatives throughout the organization. Direct the compliance of all technology and information security related policies and procedures and serve as the primary technology consultant to the organization. Leads the development and enforcement of technology policies, guidelines, and procedures. Performs periodic technology and information security risk assessments.
Primary Responsibilities- Create overall technology strategy based on needs internal business and systems, in consultation with senior management
- Maintain accountability over the organizations technology environment though leadership and management of technology and security direct reports
- Oversee cyber security efforts, ensuring a high level of protection from cyber threats
- Recommend and develop plans for system development and operations, hardware and software purchase, budget, and staffing
- Manage the development, implementation, installation, and operation of information systems for the organization
- Develop, implement, and monitor information systems policies and control to ensure data accuracy, security, legal; and regulatory compliance
- Negotiate and contract with consultants, technical personnel, and vendors for services and products
- Provide direction and support to end users
- Ensure the management of computer operations – scheduling, backup, storage, and retrieval functions
- Ensure the management of the User Help Desk service, providing first-level support to over 500 users. Review problem incident reports to constantly improve quality of systems and level of service
- Develop, maintain, and test disaster recovery plans
- Explore new technologies for future planning and potential implementation
- Interface with industry peers and experts on information management and information technology matters, to ensure up-to-date knowledge of systems
Distinguishing Characteristics:- The Chief Technology Officer is required to be a proven leader with the ability to define and execute the technology strategy, adding rigor to operations, while building a highly skilled and diverse team. This position will partner across functions to drive major security initiatives and will be responsible for effectively communicating goals, risks, and tradeoffs to executive leadership.
- The CTO requires a demonstrated knowledge of information technology best practices, security standards, rules and regulations related to information security and data confidentiality and other various security and privacy standards and policies.
- The CTO also requires strong interpersonal and communication skills with the ability to influence at all levels of the organization, while being able to simplify complex topics for understanding and critical decision making by Executive Management and the Board of Directors.
- The CTO should be well informed of developing technology tactics, emerging security threats, and proactively create strategies that assure an acceptable level of program maturity.
Primary Accountabilities- Strategic Planning/Vision: Provide vision and strategic planning for development and management of a complete technology program. Develop and manage short and long term objectives to support the technology and information security program. Responsible for creating, updating and ensuring compliance with an information security program. Creating technology policies and procedures as needed according to established best practices.
- Fiscal Management: Demonstrate a personal accountability for financial results through monitoring and evaluation of compliance and budgetary impacts. Makes recommendations to the organization for solutions that consider the potential fiscal impact due to compliance and regulations.
- Customer Service: Exhibit commitment to providing excellent service to leadership, employees, talent and customers. Demonstrates effective communication skills through effective exchange of information with others, including written and oral communication, active listening, influencing the behavior of others and building personal rapport. Communicates with others in an open and friendly manner. Exhibits strong interactive skills through a demonstration of respecting others' feelings, ideas and opinions; fosters an open interchange, displays a genuine understanding and acceptance of others. Responsible for assuring a respectful work environment. Sets the tone by communicating values and attitudes that will significantly shape the culture of the organization. Models appropriate behaviors and values; sets expectations for respectful behavior with all employees.
- Human Resource Management: Ability to develop others through setting clear expectations, mentoring and coaching, and holding others accountable for results. Conducts oneself in an honest, credible, trustworthy manner consistent with established legacy organizational values. Demonstrates an integration of values, beliefs, attitudes and behaviors through an acceptance of responsibility and accountability for individual's own actions. Ensures that the work force has the necessary skills to accomplish the work required to achieve the objectives of the department. Fosters an open working environment for easy access to express ideas and concerns. Demonstrates and expects open communications. Promotes an environment that is open and collaborative while keeping focused on a common goal. Builds rapport, encourages teamwork, creates an environment where employees may feel empowered.
- Operational Management: Exhibit a commitment to operational management and completing tasks through personal initiative, and persistence. Demonstrates an ability to plan, organize, coordinate, prioritize, balance workload and follow through to achieve institutional and individual goals and objectives. Demonstrates use of good judgments and sound decision making (common sense, intuition, data collection, analytical skills, impact evaluation, and communications) to systematically address problems, define alternate solutions, negotiate and facilitate implementation of solutions. Able to balance need for consensus and involvement with need for decisiveness and action. Provides consistent and open encouragement to trying new and creative approaches, yet willing to decide and take a stand. Develops and implements information security policies and procedures, which support the organization and are aligned with Personnel Policies and Administrative Policies. Ensures compliance with regulations governing the privacy and sensitivity of operations by continually monitoring the organization's service delivery system and by initiating changes as required. Must be committed to working with both internal and external customers in fulfilling the mission of the department and the institution.
- Duty Specific: Plans and directs all aspects of Information Technology to ensure compliance with best practices as well as state and federal guidelines. Establishes a comprehensive security program to protect organizational information assets and to comply with regulatory guidelines. Perform regular Information Technology and Security reviews which include internal and external penetration studies.
- The capability to develop, deploy and/or use security management tools to monitor all network information systems. Monitor all Information Technology assets for potential security breaches and incident response.
Skills & Qualifications- Proven 10+ year experience in information technology and security with 8+ years in managerial roles.
- Graduation from an accredited four-year college or university with major coursework in information cybersecurity, computer information systems, computer science, management information systems, or a related field.
- Experience and education may be substituted for one another. An ideal candidate must demonstrate at least six to eight years of supervisory experience.
- Knowledge of local, state, and federal laws and regulations relevant to information security, privacy, and computer crime; the principles and practices of technology administration and management; the limitations and capabilities of computer systems; technology across all network layers and computer platforms; and operational support of networks, operating systems, Internet technologies, databases, and security applications. Skill in the use of a computer and applicable software and the configuring, deploying, and monitoring of security infrastructure.
- Ability to direct and organize program activities; to identify problems, evaluate alternatives, and implement effective solutions; to develop and evaluate policies and procedures; to prepare reports; to resolve advanced security issues in diverse and decentralized environments; to communicate effectively; and to supervise the work of others.
Physical Demands:- On premises 3-5 days per week; closer to 4-5 days initially