Search Jobvertise Jobs
Jobvertise

Information Security Officer
Location:
US-AZ-Tempe
Email this job to a friend

Report this Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

<p><b>Position Description </b></p> <ul> <li>Core hours Start Date: asap End Date: 6 month assignment with potential for extension Starting remote from their residence however, it may be necessary to work from the office or visit a MCCCD college in the future. </li> <li>This role cannot be guaranteed to be remote for the duration of the assignment so the candidate will need to be local. Information Technology Services (ITS) at the Maricopa County Community College District (MCCCD) is growing and seeks to add an Information Security Officer Senior to the Information Security Team. </li> <li>The successful candidate will act as an administrative and technical expert for all Information Security topics, including preventing and resolving security incidents. </li> <li>This position plays a primary role in planning, developing, implementation and monitoring of procedural and technical security initiatives and standards. </li> <li>This position also has a responsibility to ensure the technological safety of MCCCD employees and students. </li> <li>The ideal candidate will have the ability to effectively advise and implement security protections from an educational and technical perspective. </li> <li>The candidate must be able to effectively communicate with decision-makers the potential impact of security issues and propose mitigation plans. </li> <li>This person should bring an engineering mindset to security, designing and building automated systems that work at scale. </li> <li>This role also partners with our corporate infrastructure and IT teams to help architect our future authentication, identity management, and network security systems. </li> <li>This role reports directly to the MCCCD Chief Information Security Officer. </li> </ul> <p><b>Skills Required </b></p> <ul> <li>Essential Functions 50%<b> </b>- Executes the shared security model in the current/future state blueprints; coordinates security-related architecture activities between application, data, system and network architects and engineers; implement the central directory schema; participate in the project process ensuring the feasibility of architectural design, and determine steps for implementation 20% - Performs technical research into advanced, targeted attacks, crime ware campaigns, malware and other emerging technologies and techniques to identify and report on cyber-attacks and attackers; performs proactive research to identify, categorize and produce reports on new and existing threats 20% - Ensures that security solutions are acquired, configured and implemented correctly; ensures the confidentiality, integrity and availability of the data residing on or transmitted to/from/through enterprise workstations, servers and other systems and in databases and other data repositories 10% - Advises in, and participates in, the design of secure products and architectures; mentors more junior security engineers by leading and influencing technical decisions, processes, and best practices with a moderate ability to explain technical concepts in written and verbal forms; performs additional duties as assigned </li> </ul> <p> </p> <p><b>Experience Required</b> </p> <ul> <li>Minimum Qualifications Bachelor's Degree from a regionally accredited institution in any field and four (4) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. OR Associate's degree from a regionally accredited institution and six (6) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. OR High School Diploma/GED and eight (8) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. </li> </ul> <p> </p> <p><b>Experience Preferred</b> </p> <p><b>Desired Qualifications </b></p> <ul> <li>Seven (7) years of hands-on experience in server administration and performing information security assessments for both Windows and Linux based DB platforms (e.g. Oracle, MSSQL, MySQL) </li> <li>Five (5) or more years of hands-on experience in information systems auditing, digital forensics, threat hunting, vulnerability management, penetration testing, server administration, database administration, network administration or related fields that provide the required knowledge and abilities </li> <li> Five (5) or more years of hands-on experience in the application of information security principles and practices in at least three areas of Information Technology (e.g. server, database, network, software development/programming) </li> <li> Five (5) or more years of demonstrated experience with formal risk and regulatory frameworks (e.g. NIST, ISO 27001, FERPA, HIPAA, ITIL) </li> <li> Experience in centralized device/endpoint management and configuration of software including services such as: encryption, mobile device management, malware protection, application whitelisting/blacklisting, patch management, software deployment, etc. </li> <li>Experience in administering security assessments and/or administration of network security technologies (e.g. VPN, intrusion, detection, intrusion prevention, firewalls, web application firewalls, network access control, data leakage prevention (DLP), SIEM, and vulnerability assessments, vulnerability scanning, penetration testing, and/or auditing of one or more information resources servers, networks, network devices, databases, web, software/code, application)</li> <li> Familiar with software development, programming, and/or scripting in one or more languages (e.g. C/C++/C#, PHP, Python, Perl, Powershell, Bash)</li> <li> Relevant information security and/or information technology certifications (e.g. CISSP, Security+, CEH, CISA, CISM, GSEC) </li> </ul> <p> </p> <p><b>Education Required</b> </p> <ul> <li>Minimum Qualifications Bachelor's Degree from a regionally accredited institution in any field and four (4) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. OR Associate's degree from a regionally accredited institution and six (6) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. OR High School Diploma/GED and eight (8) years of technical experience planning and overseeing information technology initiatives such as data security, systems development or network design and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, operating systems and security tools. </li> </ul> <p><b>Education Preferred </b></p> <ul> <li>Seven (7) years of hands-on experience in server administration and performing information security assessments for both Windows and Linux based DB platforms (e.g. Oracle, MSSQL, MySQL) </li> <li> Five (5) or more years of hands-on experience in information systems auditing, digital forensics, threat hunting, vulnerability management, penetration testing, server administration, database administration, network administration or related fields that provide the required knowledge and abilities</li> <li> Five (5) or more years of hands-on experience in the application of information security principles and practices in at least three areas of Information Technology (e.g. server, database, network, software development/programming)</li> <li> Five (5) or more years of demonstrated experience with formal risk and regulatory frameworks (e.g. NIST, ISO 27001, FERPA, HIPAA, ITIL) </li> <li>Experience in centralized device/endpoint management and configuration of software including services such as: encryption, mobile device management, malware protection, application whitelisting/blacklisting, patch management, software deployment, etc. </li> <li> Experience in administering security assessments and/or administration of network security technologies (e.g. VPN, intrusion, detection, intrusion prevention, firewalls, web application firewalls, network access control, data leakage prevention (DLP), SIEM, and vulnerability assessments, vulnerability scanning, penetration testing, and/or auditing of one or more information resources servers, networks, network devices, databases, web, software/code, application)</li> <li> Familiar with software development, programming, and/or scripting in one or more languages (e.g. C/C++/C#, PHP,

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations