Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.
Mobile Logo

Job Information

Case Western Reserve University Chief IT Information Security Officer in Cleveland, Ohio

POSITION OBJECTIVE Under the general direction of the Vice President for University Technology and Chief Information Officer (CIO), the Chief Information Security Officer (CISO) is responsible for Case Western Reserve University's overall information security and the development and delivery of a comprehensive information security strategy and privacy program to ensure university information assets are adequately protected. The CISO is responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the university. The CISO will work with key IT offices, data custodians, governance groups, and stakeholders in the development of security and application policies and best practices. The position has oversight of the effective dissemination of policies, standards, and procedures to the university community; establishes annual and long-range security and compliance goals; defines security strategies, metrics, reporting mechanisms, and services for continual program improvements. The CISO influences and stays abreast of information security issues and regulatory changes affecting higher education at the state and national level and communicates to the campus community on a regular basis. The CISO serves as the process owner of all assurance activities related to the availability, integrity and confidentiality of the customer, business partner, employee and business information in compliance with the organization's information security policies. A key element of this role is working with executive management to determine acceptable levels of risk for the organization. The CISO will highly knowledgeable about the business environment and ensure that information systems are maintained in a fully functional, secure mode. Additionally, the CISO serves as the University Technology (UTech) policy leader, responsible for development, maintenance, coordination and interpretation of university policies and policy issues in the area of information technology, including acceptable use, telecommunications, and identity management. ESSENTIAL FUNCTIONS *Campus Leadership. Serve as a program leader for development of information security, data protection, and risk management activities in the university enterprise. As part of the CIO's Leadership Team, advise CIO on security impact on IT operations and strategy. Serve as chair of the Information Security Committee and the Identity and Access Management Committee, and play a key leadership role in the University Compliance, Cloud Governance, PCI Compliance, Data Governance committees. Also serve as UTech representative to University Emergency Management Operations group." A member of the VP UTech Cabinet and provide invited participation on Faculty Senate Committee on Information and Communications Technology and the IT Executive Committee. (10%) *Risk Management. Continually evaluate risks and act expeditiously in making mitigation decisions and recommendations, while considering the technology environment as well as the varying needs and viewpoints of the university community and its unique requirements. Maintain and report regularly on the university security risk tolerance levels. Develop security plans to support information protection needs across the complete system lifecycles from design and architecture to disaster recovery and potential system retirement. (20%) *Security Management and Operations. Oversee and direct university wide technology incident management program to effectively defend the university brand from cyber, physical loss, and network-based threat sources. Use established incident response mechanisms and policies to advise university leadership in management actions in response to information security events and incidents. Train and support team members in t