TRAVIS COUNTY TX Information Security Architect (Travis County Staff Only) in Austin, TX

pin
pin
Job Summary

Oversees the deployment, maintenance and administration of the most highly complex security appliances, network systems and software. Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. Monitors system performance and capacity and tracks performance trends. Provides security technical support to end user departments. Troubleshoots, and works with external vendors, as necessary, to resolve the most complex system issues. Consults with departments to understand security needs and service requirements and to implement the appropriate integrated network services.

Distinguishing Characteristics:

This class is in the Information Technology series of job classifications. The security architect plays an integral role in defining and assessing the organization's security strategy, architecture and practices. Oversees the deployment, maintenance and administration of the most highly complex security hardware, systems and applications. Provides information security technical support to end user departments and consults with departments to understand highly complex security needs and service requirements and implement the appropriate integrated services. Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. This classification may require a flexible work schedule in order to meet the needs of the department.

The salary range for this posting is $105,892.80 - $140,000 and any offer will be made based on qualifications and experience within that range.

Duties and Responsibilities

  • Develops and maintains a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
  • Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. Trains staff and coordinates systems activities. Assists in appraising performance, discipline and hiring decisions.
  • Develops security strategy plans and road maps based on sound enterprise architecture practices.
  • Participates in application and infrastructure projects to provide security planning advice.
  • Drafts security procedures and standards to be reviewed and approved by executive management.
  • Determines baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and identity and access management (IAM).
  • Conducts security assessments of internal systems, applications and IT infrastructure as part of the overall risk management practices of the organization.
  • Conducts vulnerability assessments and other security reviews of systems, and prioritizes remediation based on the risk profile of the asset and guidance from executive management.
  • Establishes procedures including escalations for when indicators of compromise (IOCs) are discovered.
  • Validates IT infrastructure and other reference architectures for security best practices, and recommends changes to enhance security and reduce risk where applicable.
  • Reviews security technologies, tools and services, and make recommendations to the broader security team for their use based on security, financial and operational metrics.
  • Conducts forensic analysis of security-related incidents in a manner consistent with guidance from the organization's counsel, human resources or law enforcement.
  • Troubleshoots and resolves the most difficult and complex security system access and connectivity problems through the use of highly advanced system utilities.
  • Develops, recommends and implements information security policies, standards and procedures and ensures adherence to approved security and disaster recovery procedures.
  • Consults with departments on proper systems security to meet business objectives while maintaining full integration with other networks and resources.
  • Coordinates the evaluation of vendor products in hardware, software and telecommunications equipment and recommends purchases consistent with the organizations short-term and long-term security objectives.
  • Tracks performance trends, develops reports, maintains data bases, and assists users in utilizing automated systems applications.
  • Coordinates work performed by outside vendors and monitors vendor service level agreements (SLAs).
  • Provides or coordinates user assistance in the field or through Help Desk activities.
  • Performs other job-related duties as assigned

Minimum Requirements

Education and Experience:
Bachelor's degree in Computer Science, Information Systems, Business Administration or a directly related field AND seven (7) years of relevant work experience, including one (1) year of team lead, supervisory or management experience;
OR,
Any combination of education and experience that has been achieved and is equivalent to the stated education and experience and required knowledge, skills, and abilities sufficient to successfully perform the duties and responsibilities of this job.

Licenses, Registrations, Certifications, or Special Requirements:
Valid Texas Driver's License.

Preferred:
Certified Information Security Professional (CISSP).
Global Information Assurance Certification (GIAC) certifications from SANS.

Knowledge, Skills, and Abilities:
Knowledge of:

  • Policies, practices, procedures and terminology of assigned function.
  • Federal, State, and Local laws, statutes, regulations and program requirements relating to the assigned function.
  • Information technology hardware, software and peripherals as related to assigned function.
  • Systems integration and multiple network protocols such as TCP/IP, IPX/SPX, DHCP, DNS, and SNMP.
  • Computer equipment to include word processing, spreadsheets, databases, and a variety of software packages.

Skill in:
  • Allocating resources and evaluating projects.
  • Leadership, collaboration and negotiation techniques.
  • Installation of security hardware and software.
  • Problem solving and decision-making.
  • Both verbal and written communication, including presentations and communicating technical issues in non-technical language.

Ability to:
  • Design, install, manage and monitor the most highly complex security systems, operating system software and applications.
  • Work independently and efficiently and as part of a team.
  • Manage time well, perform multiple tasks, and organize diverse activities.
  • Demonstrate strong customer services skills.
  • Translate policies and objectives into ideas and applications web-based information products.
  • Research, compile, analyze, interpret and prepare a variety of memorandums or reports.
  • Establish and maintain effective working relationships with departmental clientele, outside agencies and providers, other county staff and officials, and the general public.

Work Environment & Other Information

Physical requirements include the ability to lift/carry up to 35–40 pounds occasionally, visual acuity, speech and hearing, hand and eye coordination and manual dexterity necessary to operate a computer and office equipment. Subject to standing, walking, sitting, repetitive motion, reaching, occasional indoor/outdoor activities, climbing stairs, bending, stooping, kneeling, crouching, crawling, pushing, pulling, balancing, client/customer contact, squatting to perform the essential functions.

Travis County employees play an important role in business continuity. As such, employees can be assigned to business continuity efforts outside of normal job functions.

This job description is intended to be generic in nature. It is not necessarily an exhaustive list of all duties and responsibilities. The essential duties, functions and responsibilities and overtime eligibility may vary based on the specific tasks assigned to the position.

Work Hours: M-Th 8:00am - 5:00 pm. Works some holidays, Works some nights, Works some weekends

Department: Information Security

Location: 700 Lavaca St. Austin, TX 78701

Criminal Background Checks Required.

For updates or questions about this posting, contact: Shari.Campos-lopez@traviscountytx.gov

Oversees the deployment, maintenance and administration of the most highly complex security appliances, network systems and software. Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. Monitors system performance and capacity and tracks performance trends. Provides security technical support to end user departments. Troubleshoots, and works with external vendors, as necessary, to resolve the most complex system issues. Consults with departments to understand security needs and service requirements and to implement the appropriate integrated network services. Distinguishing Characteristics:This class is in the Information Technology series of job classifications. The security architect plays an integral role in defining and assessing the organization's security strategy, architecture and practices. Oversees the deployment, maintenance and administration of the most highly complex security hardware, systems and applications. Provides information security technical support to end user departments and consults with departments to understand highly complex security needs and service requirements and implement the appropriate integrated services. Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. This classification may require a flexible work schedule in order to meet the needs of the department. The salary range for this posting is $105,892.80 - $140,000 and any offer will be made based on qualifications and experience within that range. Duties and Responsibilities Develops and maintains a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers. Leads and oversees the work of subordinate technical systems staff and functions as a technical expert. Trains staff and coordinates systems activities. Assists in appraising performance, discipline and hiring decisions. Develops security strategy plans and road maps based on sound enterprise architecture practices. Participates in application and infrastructure projects to provide security planning advice. Drafts security procedures and standards to be reviewed and approved by executive management. Determines baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and identity and access management (IAM). Conducts security assessments of internal systems, applications and IT infrastructure as part of the overall risk management practices of the organization. Conducts vulnerability assessments and other security reviews of systems, and prioritizes remediation based on the risk profile of the asset and guidance from executive management. Establishes procedures including escalations for when indicators of compromise (IO - Cs) are discovered. Validates IT infrastructure and other reference architectures for security best practices, and recommends changes to enhance security and reduce risk where applicable. Reviews security technologies, tools and services, and make recommendations to the broader security team for their use based on security, financial and operational metrics. Conducts forensic analysis of security-related incidents in a manner consistent with guidance from the organization's counsel, human resources or law enforcement. Troubleshoots and resolves the most difficult and complex security system access and connectivity problems through the use of highly advanced system utilities. Develops, recommends and implements information security policies, standards and procedures and ensures adherence to approved security and disaster recovery procedures. Consults with departments on proper systems security to meet business objectives while maintaining full integration with other networks and resources. Coordinates the evaluation of vendor products in hardware, software and telecommunications equipment and recommends purchases consistent with the organizations short-term and long-term security objectives. Tracks performance trends, develops reports, maintains data bases, and assists users in utilizing automated systems applications. Coordinates work performed by outside vendors and monitors vendor service level agreements (SLAs). Provides or coordinates user assistance in the field or through Help Desk activities. Performs other job-related duties as assigned Minimum Requirements Education and Experience:Bachelor's degree in Computer Science, Information Systems, Business Administration or a directly related field AND seven (7) years of relevant work experience, including one (1) year of team lead, supervisory or management experience;OR,Any combination of education and experience that has been achieved and is equivalent to the stated education and experience and required knowledge, skills, and abilities sufficient to successfully perform the duties and responsibilities of this job. Licenses, Registrations, Certifications, or Special Requirements:Valid Texas Driver's License. Preferred:Certified Information Security Professional (CISSP). Global Information Assurance Certification (GIAC) certifications from SANS. Knowledge, Skills, and Abilities:Knowledge of:Policies, practices, procedures and terminology of assigned function. Federal, State, and Local laws, statutes, regulations and program requirements relating to the assigned function. Information technology hardware, software and peripherals as related to assigned function. Systems integration and multiple network protocols such as TCP/ IP, IPX/ SPX, DHCP, DNS, and SNMP. Computer equipment to include word processing, spreadsheets, databases, and a variety of software packages. Skill in:Allocating resources and evaluating projects. Leadership, collaboration and negotiation techniques. Installation of security hardware and software. Problem solving and decision-making. Both verbal and written communication, including presentations and communicating technical issues in non-technical language. Ability to:Design, install, manage and monitor the most highly complex security systems, operating system software and applications. Work independently and efficiently and as part of a team. Manage time well, perform multiple tasks, and organize diverse activities. Demonstrate strong customer services skills. Translate policies and objectives into ideas and applications web-based information products. Research, compile, analyze, interpret and prepare a variety of memorandums or reports. Establish and maintain effective working relationships with departmental clientele, outside agencies and providers, other county staff and officials, and the general public. Work Environment & Other Information Physical requirements include the ability to lift/carry up to 35–40 pounds occasionally, visual acuity, speech and hearing, hand and eye coordination and manual dexterity necessary to operate a computer and office equipment. Subject to standing, walking, sitting, repetitive motion, reaching, occasional indoor/outdoor activities, climbing stairs, bending, stooping, kneeling, crouching, crawling, pushing, pulling, balancing, client/customer contact, squatting to perform the essential functions. Travis County employees play an important role in business continuity. As such, employees can be assigned to business continuity efforts outside of normal job functions.
search terms: Security+Staff
Expired
pin
pin
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not endorsed, sponsored or affiliated with the actual employer of the job. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder.
 
 
Local Job Bulletin is an independent Job Search Engine. Local Job Bulletin is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Local Job Bulletin uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, job descriptions and other company descriptions / details are the property of their respective holder. Local Job Bulletin does not have its users apply for a job on the LocalJobBulletin.com website. Additionally, Local Job Bulletin may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.;
pin
pin