Primary Purpose Of Position
The Lead Information Security Administrator (Administrator) is a senior security position that provides the extensive technical expertise required to design, build, and manage the complex information security infrastructure necessary to protect the confidentiality, integrity, and availability of the university’s technology infrastructure. The Administrator identifies cybersecurity and compliance requirements, develops controls to meet these requirements, and leads the implementation of these controls in new technology or existing systems. This position assesses technology to identify and address cybersecurity issues. This position plays a senior role in incident management and performs advanced technical work including forensics and ensures that containment, eradication, and recovery tasks are completed both successfully and in a timely manner. The Administrator coordinates with network, system, and security staff in other departments, and provides technical cybersecurity leadership to them. This position coordinates with service providers and consultants to ensure that the university’s needs are addressed. The Administrator works closely with senior Information Technology Services ( ITS ) managers and architects and acts as a consultant in cybersecurity-related matters. The Administrator reports to the Chief Information Security Officer ( CISO ) and is a senior member of the Information Technology Services ( ITS ) technical staff and security team. The Administrator works with other leaders to ensure a high level of service to faculty, staff, and students, and to ensure that all technology systems are secured and meet compliance requirements.
Minimum Requirements
Master’s degree in computer science, Information Technology, or a related field with three years experience directly related to the duties of the position, or bachelor’s degree in computer science, Information Technology, or a related field with five years’ experience directly related to the duties of the position. Significant technical knowledge of and experience with network, server, storage, endpoint, and cybersecurity systems, and related management and monitoring applications. In-depth knowledge of information system, network, and cybersecurity architecture, and integration of disparate technology systems. In-depth knowledge of common network protocols such as IP, TCP , UDP , ICMP , ARP , SNMP , DHCP , DNS , NTP , HTTP , SSH and RDP . In-depth knowledge of technology systems from Microsoft, Linux, VMware, NetApp, Palo Alto, Extreme, Cisco, and other leading vendors. In-depth knowledge of and experience with firewalls, IDS / IPS , SIEM , EDR / XDR , network management systems and network scanning tools. Knowledge of information security standards such as ISO 27002 or NIST SP 800-171 and their incorporation into technology systems design. Knowledge of incident response and forensics procedures. Knowledge of change control procedures. Ability to act independently with little or no guidance, especially during incident response situations where IT managers are unavailable. Demonstrated ability to use effective problem-solving, negotiation, and decision-making skills to influence management and staff, as well as internal and external partners. Demonstrated strong customer service orientation, experience in partnering with other units, and fostering a team spirit within the department. Strong interpersonal and communication skills and the ability to work effectively with a wide range of constituencies in a diverse community and with a commitment to outstanding client service. Demonstrated ability to work collaboratively with ITS staff and university stakeholders of all levels of technical ability.
Preferred Years Experience, Skills, Training, Education
Demonstrated project management experience and excellent analytical skills. Ability to write scripts to automate processes.