🔒 Security Management
👥 People & Roles

👥 People & Roles — Security Management

Effective security management depends on clearly defined roles with non-overlapping responsibilities. Below are the key personas aligned to ITIL 4's Information Security Management practice.

Core Roles

Chief Information Security Officer (CISO)

  • Owns the enterprise security strategy and risk appetite
  • Sponsors security policies and budget allocation
  • Reports to the Board and/or CIO on security posture
  • Escalation point for critical incidents and breaches

Information Security Manager

  • Day-to-day ownership of the ISMS (Information Security Management System)
  • Manages policy lifecycle: creation, review, retirement
  • Coordinates audits (internal and external)
  • Interfaces with Change Management to enforce security gates

Security Analyst (L1/L2/L3)

  • Monitors SIEM dashboards and alert queues
  • Triages security events; escalates true positives
  • Conducts threat hunting and forensic analysis (L3)
  • Documents findings and produces threat intelligence reports

Risk Manager

  • Maintains the Risk Register and risk treatment plans
  • Conducts Business Impact Analyses (BIA)
  • Tracks residual risk against appetite thresholds
  • Presents risk reports to the steering committee

Compliance Officer

  • Maps controls to regulatory frameworks (GDPR, ISO 27001, NIS2)
  • Coordinates external audits and certification renewals
  • Manages Data Protection Impact Assessments (DPIA)

Identity & Access Management (IAM) Specialist

  • Owns role-based access control (RBAC) and PAM policies
  • Reviews access provisioning/deprovisioning workflows
  • Conducts periodic access recertification campaigns

Security Architect

  • Designs zero-trust network segmentation and control frameworks
  • Reviews architecture proposals for new services
  • Defines encryption standards, key management policies

RACI Matrix

ActivityCISOISMAnalystRisk MgrCompliance
Define security policyARCCI
Risk assessmentARCRC
Security incident responseARRII
Access review & recertificationIARIC
Audit coordinationIRICA
Vulnerability scanningIARII
Patch prioritisationCARCI
Supplier security assessmentCRIAC

R = Responsible · A = Accountable · C = Consulted · I = Informed

Skill Requirements

RoleCore SkillsCertifications
CISOStrategic leadership, risk governanceCISSP, CISM, ISO 27001 Lead Auditor
ISMISMS management, policy writingISO 27001 LA, CISM
Security AnalystSIEM, threat hunting, EDRCompTIA Security+, CEH, SANS GIAC
Risk ManagerRisk frameworks, BIA, quantitative riskCRISC, ISO 31000
Compliance OfficerRegulatory knowledge, audit prepCIPP/E, ISO 27001 LA
IAM SpecialistDirectory services, PAM, SCIMMCSA, Okta Certified

Downloadable Resources

ResourceFormatDownload
RACI Matrix TemplateWord⬇ Download
Risk RegisterExcel⬇ Download

← Back to Security Management Overview

Digital Kimya — MENA & Europe

Ready to implement what you've read?

Our ITSM practitioners deliver ITIL 4 & 5 projects across ServiceNow, Jira SM, SMAX and BMC Helix — from initial assessment to full ESM deployment.

🚀 ITIL Implementation🔧 ITSM Platform Setup📊 Assessment & Roadmap🏭 Industry-Specific Projects
🌍 MENA & Europe🎯 ITIL 4 & 5 Certified🏢 6 Industries covered Assessment in 2 weeks
contact@digitalkimya.net