• Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise.
• Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Responsible for the tracking and monitoring of software viruses.
• Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness.
• Provides direct support to the business and IT staff for security related issues.
• Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Must have extensive knowledge in networking, databases, systems and/or Web operations.
• More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.
Scope of Services:
• The primary function of this position is to provide technical expertise and analysis to assist the Information Security Management Office in their work to establish, implement and monitor the security strategy of the Department.
• This candidate must have a working knowledge of supporting, monitoring and maintaining an enterprise-level Microsoft environment.
• This understanding of networked environments will allow the candidate to review, implement and support security-related functions such as vulnerability management, compliance monitoring, and continuous security monitoring.
Education:
• Bachelor’s Degree in Computer Science, Information Systems, Business Administration, Information Security or another related field; or equivalent work experience.
Experience:
Four years of experience in the work related to the position.
Primary Job Duties/Tasks:
The submitted candidate must be able to perform the following duties and/or tasks:
• Serve as a member of the Computer Security Incident Response Team. Duties includes researching incidents, identifying corrective actions, documenting status and coordinating responses to Computer Security Incidents.
• Complete research and analysis into the security impacts of a variety of technologies, applications (COTS and custom developed) and processes. Provide recommendation that will be used by the Information Security Manager to support purchasing decisions, standards development and risk assessment.
• Review and evaluate System Security Plans developed for Information Technology Systems within the Department. Assess compliance with existing standards and provide recommendations that will be used by the Information Security Manager to support approval of the plans.
• Work with the Information Security Manager and Enterprise Architect to identify technologies, processes and tools that can be implemented to support the security architecture.
• Work in conjunction with the Department’s Patch Management and Configuration Team in identifying secure configurations for standard products. Provide support/information as needed for implementation of secure baselines through package roll out and/or group policy. After implementation of secure baselines, use tools to review and ensure compliance with established baselines.
Knowledge Skills and Abilities (KSAs):
The submitted candidate must be able to apply common knowledge, skills, and abilities in the following areas:
• Knowledge in the use of appropriate security controls to protect the confidentiality, integrity and availability of information technology resources.
• Knowledge of, and experience with, various computing technologies such as, but not limited to: Windows, Windows Server, proxies, firewalls, switches, routers, Transmission Control Protocol/Internet Protocol (TCP/IP)
• Knowledge of perimeter technologies (firewalls, proxies, intrusion detection/prevention systems (IDS/IPS) and vulnerability management tools.
• Knowledge in the use of information security practices and standards such as NIST, CIS Critical Security Controls and the Florida Cybersecurity Standards (74-2 Florida Administrative Code). Ability to review, assess and document compliance with standards.
• Knowledge of Microsoft Systems Center Configuration Manager (SCCM) and other Microsoft support tools/technologies such as Group Policy and PowerShell.
• Knowledge of the application of operating system security settings through direct manipulation of the registry.
• Knowledge of Security Information and Event Management (SEIM) tools. Ability to utilize, configure and manage SPLUNK preferred but not required.
• Skills in applying, analyzing and assessing information systems and security controls.
• Skills in applying, analyzing and assessing information systems and security controls.
• Ability to analyze complex technical architecture for security issues.
• Ability to be self-motivated, detail-oriented with excellent follow through.
• Ability to assess and analyze risk and provide recommendations to successfully manage risk.
• Ability to author documented analysis of systems to verify compliance with security controls.
• Ability to effectively communicate orally and in writing to a variety of audiences. This includes the ability to communicate professionally with management, to communicate technical issues and concepts to non-technical staff, and to effectively explain security concepts and their benefit.
• Ability to solve problems independently and with teams and exhibit sound judgement and decision making skills.