We recognize our competitive advantage -- our people. We believe in our people, who share our vision of meeting the needs of our employees, customers, and communities and who carry out the continued success of the company.
Our employees are committed to the company's foundational values: integrity, excellence, teamwork, environmental stewardship, and community commitment. In turn, we invest in our employees, providing opportunities for challenge and advancement and offering a competitive compensation package.
BRIEF POSTING DESCRIPTION:
The P EF ENTERPRISE ARCHITECTURE & PLANNING Department of the P ENTERPRISE ARCHITECTURE & PLANNING Division at Hawaiian Electric Company has 1 Management vacancy available. (Role: Professional)
JOB FUNCTION:
The Cybersecurity Technical Architect is responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Plans and designs Company’s cybersecurity architecture (infrastructure, desktop, network, wireless, Operations Technology (OT) and application-level components) with the objective of ensuring security requirements are adequately addressed to create a secure and defendable operating environment for organization. Collaborates with Architects in the Telecommunications, Information Technology and Services (ITS), Software Application Services (SAS), Enterprise Architecture and Planning, and the Operations Technology. Develops security solutions and guidance for network architecture, technology direction, acquisition plans, standards, migration strategies, and contingency plans. Provides technical leadership as a Cybersecurity subject matter expert for Company strategic decision making to project planning and implementation.
ESSENTIAL FUNCTIONS:
- Collaborates with the Chief Information Security Officer and Company leadership to develop an enterprise security architecture strategy/plan and corresponding procedures and guidelines, with the objective of addressing security requirements and mitigating risk. Strategies and plans are based on Cybersecurity Risk Management, IT, OT and Telecommunications and operating units’ technological direction and is an end-to-end view that includes hardware, software, operating systems, application systems, platforms, networking, interoperability, contingency arrangements, and directions for acquisition of technology resources. Advises client and project teams on how to integrate security concepts and strategies with and leverage existing enterprise architecture.
- Solely and/or in collaboration with other groups, teams, clients (users of various levels up thru executives), vendors, project teams, and/or consultants, analyzes work processes automation proposals, data requirements, and/or customer needs. Proposes technical security solutions to meet said needs or improve work processes that integrate well into the overall IT technical architecture. Performs detailed cost justification, analysis, and work estimation of medium to high complexity information systems, including new system design, development, modification or integration of existing systems and data structures. Proposes process improvements to enhance security and reduce risk. Participates, as needed, in departmental task forces and cost/benefit reviews.
- Works closely with management and IT staff to analyze existing and emerging technologies and security techniques and concepts. Recommends pilots, prototypes, and/or adoption of new security technologies. Develops plans to help determine which security technology direction is appropriate for the business and Cybersecurity Risk Management, IT, OT and Telecommunication units to achieve company strategic goals. This includes security technologies that have the potential to create business opportunities and the architecture, technology direction, and migration strategies of infrastructure, application, and desktop components.
- Provides feedback regarding technical capabilities and performance of Cybersecurity Risk Management (CRM) staff to CRM management for performance evaluations. Recommends project and post system launch security staffing levels. Assists with project budgets and forecast development. Mentors staff on emerging technologies. Performs other duties as assigned or requested.
- Work solely or in concert with others to author requisite security documentation to meet a variety of company needs, be it text for rate case or project filings, responses to information requests from interveners, decision synopses, department/team strategies, etc.
- Participates in Company emergency response activities as assigned, including any activities required to prepare for such emergency response.
BASIC QUALIFICATIONS:
Knowledge Requirements
- Extensive knowledge of the principles of information, data and office technology management normally acquired through college level courses or equivalent experience.
- Working knowledge of utility business, business and/or engineering principles & practices.
- Extensive knowledge of cybersecurity threats, vulnerabilities, and risk management processes.
- Extensive knowledge of cybersecurity frameworks, laws, and regulations.
- Extensive or advanced knowledge of business software solutions and architecture.
- Extensive or advanced knowledge of one or more and working knowledge in all of the following technical disciplines: Unix, Active Directory Windows Server infrastructure, Storage Area Networking, TCP/IP networking, Internet technologies, network security architecture, cryptography, application security best practices, desktop operating Systems, mobile devices, application virtualization, application delivery mechanisms, Service Oriented Architecture, Business Intelligence Systems, Database Management Systems and systems development.
- Conceptual knowledge of Sarbanes-Oxley (SOX), physical and logical information security issues and trends
- Conceptual knowledge of utility business and related Operations Technology Systems (SCADA, DCS, etc.)
- Ability to translate business requirements into security technical design and maintain comprehensive technical documentation.
- Ability to develop security configuration standards and guidelines.
- Ability to identify security constraints or gaps in business requirements and effectively communicate issues/risks to management.
- Ability to keep abreast of ever evolving and emerging security technologies.
- In depth knowledge of people, processes, and technologies in use within multiple teams within the division.
- Ability to translate security requirements into technical design and maintain comprehensive technical documentation.
- Ability to identify system constraints or gaps in security requirements and effectively communicate issues/risks to the project manager in a timely manner.
Skills Requirements
- Senior level skills on one or more IT disciplines; Application Development, Infrastructure, and/or Desktop
- Ability to remain flexible in a demanding work environment and adapt to rapidly changing priorities.
- Ability to effectively communicate with all levels of the organization, both verbal and written communication.
- Leadership skills and ability to work with a variety of individuals, occasionally dealing with sensitive, difficult, or confrontational issues.
- Strong interpersonal skills to influence and persuade various groups or individuals.
- In-depth analytical, organizational, and conceptual skills to handle various projects and programs.
- Ability to design, code, test, and implement programs in one or more of the following languages/systems: Python, Go, R, Swift, Dart, Rust, MATLAB, Kotlin, Scala, C/C++/C#, shell scripting, Perl, PHP, Java, SQL, PL/SQL, Microsoft .Net, JavaScript, XML, HTML, on Windows and Unix platforms.
Experience Requirements
- One or more of the following required; CCIE Routing and Switching, CCIE Security, JNCIE-SEC, JNCIE-ENT, GIAC Security Expert (GSE), Offensive Security Certified Professional OSCP.
- Extensive (10 or more years) supporting development of network, system, telecommunications and security infrastructure.
- Extensive (10 or more years) analytical experience in simple to complex systems.
- Graduate Degree in Engineering, Information Systems Management, or Computer Science.
Role: Professional
Number of Vacancies: 1
Location: Honolulu – Oahu
Hiring Range: The hiring range for the Cybersecurity Technical Architect [Req ID 9077] position is $118,200.00 to $153,600.00. The person selected will be placed according to his/her skills and qualifications.
About Hawaiian Electric Companies
Hawaiian Electric Companies provide electricity and services to 95 percent of the state's 1.4 million residents. The company is also one of the state's leading employers and a major contributor and supporter of community and educational programs.
The demand for power that has fueled the growth of the Hawaiian Islands has been met by Hawaiian Electric Companies for well over a century. And as the next millennium unfolds, the company is committed to providing quality service and seeking clean local energy sources to power generations of Hawaii families and businesses to come. Visit us at http://hawaiianelectric.com.
Interested individuals should apply online. The application must clearly indicate the demonstrated experience/knowledge/skills/abilities the candidate possesses which specifically qualifies him/her for the position.
Applicant Certification
By submitting an application for the position, candidates:
1. Authorize the Hawaiian Electric Companies to confirm all statements contained in the application and/or any materials submitted and made a part of the application as they relate to the position and to the extent permitted by law;
2. Authorize and consent to, without reservation, the Hawaiian Electric Companies sharing any and all information regarding previous or present employment, educational training or personal information from their records and from any other source with the hiring department or subsidiary company;
3. Release, discharge, and hold harmless, Hawaiian Electric Companies, from any and all liability for any damage which may be claimed as a result of furnishing such information to the hiring department or subsidiary company;
4. Authorizes release and transfer of all personnel records to be maintained by the hiring company in the event of an inter-company transfer; and
5. Authorize, direct, and consent to Hawaiian Electric Companies and/or its authorized agents to conduct investigations into candidates' background. These investigations may include, but are not limited to searches for information about applicants; record of criminal convictions to the extent permitted by law, education records, professional certifications, personal character references, and employment history.
EEO Statement
Hawaiian Electric Companies is an equal employment opportunity/affirmative action employer. We actively seek diversity among our employees. We do not discriminate on the basis of age, race, color, religion, sex/gender (including gender identity/expression), ancestry/national origin, disability, marital status, arrest and court record, sexual orientation, pregnancy, veteran status, genetic information, domestic or sexual violence victim status, or other protected categories in accordance with state and federal laws. We further encourage individuals with disabilities, minorities, veterans and women to apply.
Hawaiian Electric Companies complies with Title I of the Americans with Disabilities Act. Any request for reasonable accommodation needed during the application process should be communicated by the candidate to the HR Service Center at (808) 543-4848.
Affiliate Disclaimer
Hawaiian Electric Company, Inc., Maui Electric Company, and Hawaii Electric Light (“Company”) are Hawaii Public Utilities Commission (“PUC”) regulated companies. The disclosure relating to Affiliate Transaction Requirements that follows is made pursuant to the PUC’s Decision and Order No. 35962, issued on December 19, 2018, and subsequently modified by Order No. 36112, issued on January 24, 2019 in Docket No. 2018-0065.
By submitting your application, you understand and acknowledge that, if you are hired by the Company and subsequently transferred, assigned or otherwise employed by an Affiliate, said Affiliate will be required to make a one-time payment to the Company in an amount up to twenty-five percent (25%) of your base annual compensation.
In addition, if you are hired by the Company and subsequently transferred, assigned or otherwise employed by an Affiliate or an Affiliate-Related Entity, for a period of one year, you cannot appear in negotiations or otherwise interact directly with the Company or work on the same matter that you worked on while with the Company.
Affiliate is defined as “any person or entity that possesses an ‘affiliate interest’ in a utility as defined by section 269-19.5, Hawaii Revised Statutes (“HRS”), including a utility’s parent holding company, except as otherwise provided by HRS section 269-19.5(h).”
Affiliate-Related Entity is defined as “a third party that provides electricity-related services in a regulated utility’s service territory that has a material financial, operational, or ownership interest with an unregulated affiliate of the utility and of whom the utility has reasonable knowledge.”
For a current list of all Affiliates and Affiliate-Related Entities, please see:
https://www.hawaiianelectric.com/about-us/key-performance-metrics/financial/affiliate-transactions
This list may be amended, updated or revised from time to time without notice.