IT Cyber Security Manager
Summary of Position |
The IT Cyber Security Manager is responsible for managing the IT Cyber Security Services team, development and implementation of security strategies, coordinating incident response activities, applying best practices and monitoring compliance with IT procedures, University policy and applicable law. The IT Cyber Security Manager will work with leadership and IT Services staff to ensure university devices and data are appropriately protected. |
---|
Required Education |
Bachelor’s degree. |
---|---|
Required Work Experience |
Five years of professional work experience in IT cyber security with a strong working knowledge of operating systems, network utilities, and security software. Knowledge of classified and open source research and data analysis methods and techniques. Knowledge in the collection, analyzing, and dissemination of criminal intelligence information. |
Duties
Duties |
Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation. |
---|---|
Essential/Marginal | Essential |
Duties |
Communicates immediately to management the discovery of any breaches or incidents related to our network infrastructure or systems. |
---|---|
Essential/Marginal | Essential |
Duties |
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security procedures, policies, best practices, and compliance laws. |
---|---|
Essential/Marginal | Essential |
Duties |
Performs system audits and vulnerability assessments, including user accounts, application access, server, file systems and external Web integrity scans to determine compliance. |
---|---|
Essential/Marginal | Essential |
Duties |
Evaluates university-owned computers and mobile devices for security vulnerabilities, recommends standards, and performs computer forensics as needed |
---|---|
Essential/Marginal | Marginal |
Duties |
Participates in IT cyber security incident response activities and coordinates with other appropriate agencies to record and report incidents |
---|---|
Essential/Marginal | Essential |
Duties |
Assists in the development and management of policies, standards, guidelines and procedures related to IT security |
---|---|
Essential/Marginal | Essential |
Duties |
Chairs and/or takes an active role in meetings, committees, projects, and outside professional groups as requested or assigned. |
---|---|
Essential/Marginal | Essential |
Duties |
Performs work duties according to the university and department policies, procedures, standards and guidelines |
---|---|
Essential/Marginal | Essential |
Duties |
Research and keep abreast of testing tools, techniques, and process improvements in support of security topics |
---|---|
Essential/Marginal | Essential |
Duties |
Provides occasional support for network authentication services |
---|---|
Essential/Marginal | Marginal |
Duties |
Provides occasional support for network bandwidth administration |
---|---|
Essential/Marginal | Marginal |
Duties |
Provides occasional support for core and edge networking devices |
---|---|
Essential/Marginal | Marginal |
Duties |
Lift, move and relocate computer network equipment |
---|---|
Essential/Marginal | Marginal |
Duties |
Other duties as assigned |
---|---|
Essential/Marginal | Marginal |
Duties |
Manage IT Cyber Security budget. |
---|---|
Essential/Marginal | Marginal |
Duties |
Work with vendors to obtain quotes for annual maintenance contracts and cyber security solutions. |
---|---|
Essential/Marginal | Essential |
Duties |
Participate in IT leadership meetings and strategic planning. |
---|---|
Essential/Marginal | Essential |
Duties |
Manage IT Cyber Security team, directing daily tasks and other aspects such as approving leave requests, organizing team-building events, performance/technical coaching, and conducting performance evaluations. |
---|---|
Essential/Marginal | Essential |
Responsibilities / Skills and Abilities
Responsibilities
Responsibilities |
Carries out supervisory responsibilities in accordance with University policies and applicable law |
---|
Responsibilities |
Performs all duties in compliance with applicable University policies and procedures and state and federal requirements |
---|
Responsibilities |
Reports directly to the Chief Technology Officer or his/her designee |
---|
Responsibilities |
Responsible for maintaining the confidentiality of designated information |
---|
Responsibilities |
Responsible for the training and supervision of assigned staff within area of responsibility |
---|
Responsibilities |
Support the core values of the University. |
---|
Required Physical Abilities
Required Skills and Abilities
Required Skills and Abilities |
Adapt readily to changing technology |
---|
Required Skills and Abilities |
Analyze problems logically; develop and test solutions thoroughly |
---|
Required Skills and Abilities |
Communicate well, both orally and in writing |
---|
Required Skills and Abilities |
Evaluate, select and implement security related software and hardware. |
---|
Required Skills and Abilities |
Remain calm under pressure/during a crisis |
---|
Required Skills and Abilities |
Work after hours as necessary, especially during security incidents and emergencies. |
---|
Required Skills and Abilities |
Work effectively with diverse IT staff and university personnel |
---|
Required Skills and Abilities |
Work independently, use sound judgment |
---|
Required Skills and Abilities |
Ability to collect, assemble, analyze, and evaluate evidence, statistics, and other pertinent information to draw logical conclusions in order to effectively solve security incidents. |
---|