Designs, develops, and implements security changes and enhancements to the Information Technology (IT) computing environments citywide. Is responsible for determining appropriate security measurees and creating policies and procedures that monitor and control access to system resources and data. Oversees the establishment, implementation, and adherence to policies and procedures that guide and support the provision of information security services. Conducts risk assessments and risk analyses to ... more details
Description
Cyber Security Analyst
Examples of Duties
Designs, develops, and implements security changes and enhancements to the Information Technology (IT) computing environments citywide. Is responsible for determining appropriate security measurees and creating policies and procedures that monitor and control access to system resources and data. Oversees the establishment, implementation, and adherence to policies and procedures that guide and support the provision of information security services. Conducts risk assessments and risk analyses to help the organization develop security standards and procedures that support strategic, tactical, and operation objectives on a cost-effective basis. Makes recommendations on appropriate personnel as well as physical and technical security controls. Manages the information security incident reporting program and participates in resolving problems with security violations. Is responsible for the content and delivery of information security seminars and training classes. Coordinates the communication of information security awareness to all members of the organization. Certifies that IT systems meet predetermined security requirements citywide. Conducts security audits. Assesses and reviews security plans, policies and procedures of all City departments/divisions and related entities. Develops and implements a year-round in-service training program. Performs other job related duties as required.
Minimum Qualifications
A High School Diploma or GED is required. A Bachelors Degree in Computer Science, Information Technology, Engineering, Accounting, or related field from an accredited four year college or university is required. Two years of full time paid experience with the configuration, monitoring, or security of network, internet, or email applications in a Windows, Netware, and/or Unix environment is required. (Substitution: One year of experience in Information Technology may substitute for each year of college education lacking.) A valid State of Ohio Drivers License is required. Must be able to lift and carry a minimum of 30 pounds. Must possess excellent interpersonal and written communication skills. The following areas of experience are highly desired: Encryption, firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, Virtual Private Networks, Web filtering, IT forensic analysis, and the principles and use of identification, authentication, and authorization; Knowledge of security hardware and software products that comply with current industry standards; Hands-on experience with major security platforms for certification authority, security management products, and tools; Monitoring network and systems management processes and operational procedures; Web hosting; Microsoft Exchange Server. Certification as an Information Systems and Security Professional of Information Systems Auditor is highly desired.
Supplemental Information
Additional Duties:
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond and recover from cyber threats and vulnerabilities.
Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems.
Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats.
Utilizes a variety of security event and incident management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools.
Partners with stakeholders to encourage the adoption of security-compatible software designs and best practices.
Keeps abreast of the latest intelligence from law enforcement and other sources of cyber threat information.
Preferred Qualifications: The following areas of experience are highly desired: Encryption, firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, Virtual Private Networks, Web filtering, IT forensic analysis, and the principles and use of identification, authentication, and authorization; Knowledge of security hardware and software products that comply with current industry standards; Hands-on experience with major security platforms for certification authority, security management products, and tools; Monitoring network and systems management processes and operational procedures; Web hosting; Bachelor's degree in Cybersecurity, Information Technology, Computer Science or a related field (or equivalent experience).
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.