[Close] 

Data Security Manager

Company Name:
T. Rowe Price
Title: Data Security
manager
Location: Maryland-Owings Mills
Other Locations: null
PRIMARY PURPOSE OF THE POSITION
The Data Security Manager is responsible for securing T. Rowe Price global information assets, customer information, and for protecting the Brand. The Data Security Manager works closely with Business Channels, Development Teams, Infrastructure Teams, Compliance, Legal, and Risk
management
to educate and guide secure approaches to business needs.
The Data Security Manager oversees efforts to secure the information assets of the firm. This includes proprietary information which is critical to the business, as well as sensitive identity information for clients and associates. Working closely with other managers in GBS&T and the business, the Data Security Manager provides strategic guidance to ensure appropriate security and privacy are applied to information assets which could negatively impact the organization if breached.
PRINCIPAL RESPONSIBILITIES
Designs, implements, and directs strategies with respect to data security. Provides
expert
knowledge of concepts to multiple technical and business channels within the organization.
Responsible for developing, enhancing, and evaluating T. Rowe Price security and privacy controls and the continuous review of emerging technologies, threats, and associated risks across security domains.
Works with various Business and GBS&T partners to evaluate technology, select secure solutions and implement technology from a risk aware perspective.
Identifies needs for improvement within existing or proposed
systems
, processes and strategies with respect to data security. Works with various internal business and GBS&T groups, as well as outside vendors, business partners and industry experts to create short, mid and long term strategies/action plans to address related concerns.
Works with other data teams (Database
services
, Information Architecture, and Middleware & Engineering) to align data strategies and security strategies to ensure data integrity.
Provides thought leadership at the management and project level. In a strategic manner provides consultation to key business leaders and stays current on new data security risks. Responsible for technical governance of sensitive data across channels and within or across a line of business. Ensures that reference architecture and standards are followed in critical areas. Prepares research, presentations, whitepapers and proposals that clearly and effectively demonstrate data security concepts.
Manages vendor relationships, determines budget and negotiates price. Assesses, evangelizes, and implements new functionality and architectural paradigms in the environment.
QUALIFICATIONS
Preferred
College degree in
computer
Science, Information Systems, Business Administration, or other related field
10 years of technology or business/industry work experience
4 years of Project Management experience preferred
4 years of previous technical/business focused experience preferred
Project Management Certificate (PMI or PMP) preferred
MBA or MS in Finance or Technology preferred
Required
College degree and 6 years of related work experience, or
Associate degree and 8 years related work experience, or
High School diploma/equivalent and 10 years related work experience
Prior Information Security experience
Process-oriented
Analysis and troubleshooting skills
Strong interpersonal skills and ability to forge relationships
Experience indirectly managing resources
Ability to communicate with all levels within an organization, influence and impact
Demonstrates political savvy and professionalism
Strong interpersonal skills
Negotiation skills
Business acumen
Customer-focused
Competent technical abilities
Project Management
T. Rowe Price is an Equal Opportunity Employer
null
null
Organization: GBS&T

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.