Under direction of the CISO, this position is responsible for ensuring University information generated, stored, and transmitted electronically; assesses security risks and threats to University information systems; provides security technology advice for the University community; coordinates the implementation and management of information security and compliance tools, systems, policies, and procedures; participates in security-related policy development, communications, enforcement, and management of the University’s response to security threats and incidents.
Demonstrated ability to think strategically about business, product, and technical challenges
Demonstrated knowledge of contemporary hardware, software, and network architectures
Hands-on technical expertise in Security Architecture, automation, integration, and deployment (DevOps)
High level of integrity and sound judgment concerning security, privacy issues and complex situations
Written and verbal communication skills
Strong service commitment
Ability to work as a productive, responsible, self-motivated member and/or leader of a team
Ability to work independently and manage time effectively
Ability to understand and implement cultural change related to technology
Bachelor’s degree or six (6) years of equivalent experience relevant to information security architecture and implementation, preferably in a complex, multi-platform higher education IT environment. Certification as a Certified Information Systems Security Professional (CISSP) or CISSP-ISSAP: Information Systems Security Architecture Professional (CISSP-ISSAP)
Provides technical expertise for the monitoring and assessment of security risks to the University’s information assets; identifies information systems security requirements; coordinates the implementation and management of information security tools, systems, policies, and procedures.
Provides guidance in assessing network threats, managing intrusion detections and virus protection systems, monitoring security logs, and responding to security problems and intrusions.
Directs the assessment of IT security and compliance impacts of new technology implementations; organizes, convenes, and moderates information security program committees and working groups
Conducts threat and vulnerability assessments and determines security requirements and controls following assessment of the business impact of a security event.
Engages in a planned program of professional development, coordinates with ITS goals and responsibilities, to maintain continual growth in professional skills and knowledge essential to the position; performs other duties as assigned.
You were inactive for over twenty minutes. To protect you, we have logged you out. Any unsaved data has been lost.