LEAD SECURITY ADMINISTRATOR - Information Technology Department

Recruitment #2303-0774-001


The Lead Security Administrator’s work is widely varied, involving analyzing and evaluating many complex and unique systems. This position will participate in the development, implementation, maintenance and/or recommendation of ITD and city-wide security policies and procedures.  Applicants to this position should have experience in a fast-paced, ever-changing environment and must be able to analyze, organize and prioritize tasks and requests all while meeting multiple deadlines.

General Description

Under general direction of the Network Services Manager, the Lead Security Administrator is responsible for the development and delivery of a comprehensive information security and privacy program for the City. The scope of this program is City wide and includes information in electronic, print and other formats. The purposes of this program include: to assure that information created, acquired or maintained by the City and its authorized users, is used in accordance with its intended purpose; to protect City information and its infrastructure from external or internal threats, and to assure that the City complies with statutory and regulatory requirements regarding information access, security and privacy.

The Lead Security Administrator develops and administers processes and standards for information security within the City's defense in depth information security architecture. The position validates that security policies are implemented and that monitoring and testing is in place, and maintains awareness of new threats and counter measures. This individual directs the work of staff responsible for computer and IT security inside the organization. The Lead Security Administrator performs the role of Disaster Recovery Manager for incidents that result from unauthorized access.

Distinguishing Characteristics

The Security Administrator’s work is widely varied, involving analyzing and evaluating many complex and unique systems. This position will participate in the development, implementation, maintenance and/or recommendation of ITD and city-wide security policies and procedures.

The Security Administrator must always remain calm and professional during stressful situations and must be able to analyze, organize and prioritize tasks and request all while meeting multiple deadlines

Essential Functions

This is a lead position affording guidance to other positions performing the same tasks. This lead position also reviews workloads, assigns work and coaches employees with specialized instructions and practices for job accomplishments.

Lead personnel may contribute to other employees' performance evaluations, assist with the hiring process by interviewing and making recommendations and providing input to supervisory staff.

Function as the overall information security officer for technical matters for the City.

Coordinate development of City information security policies, standards and procedures. Ensure that City policies support compliance with external requirements such as HIPAA, HITECH, Red Flag, PCI, etc.

Develop and implement an incident report and response system to address City security incidents (breaches), respond to alleged policy violations or complaints from external parties. Serve as official IT contact point for information security, privacy incidents. Conducts investigation, analysis and review following breaches of security controls, and prepares incident reports recommendations for appropriate improvements.

Develop, implement and manage an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation.

Keep abreast of latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities pertaining to City.

Plan and manage the work of small teams of security staff on complex IS security projects.

Determine appropriate levels of security controls and systems monitoring at all levels of the security architecture.

Conduct periodic vulnerability and security risk assessment of the assets of the City, and administers firewalls, IPS, IDS, application firewalls, SIMS, router and switch ACL's, VPN remote access servers, and point-to-point encryption routers.

Identify new and recurring potential security threats and vulnerabilities, assess the risks of these to the City and implement appropriate corrective or preventative action.

Identify foreseeable information security risks in order to comply with privacy and information security regulations, policies and procedures.

Monitor compliance of information security procedures and policies and report infringements to top management.

Audit and review Information Security issues in the organization.

Cooperates with other Organizations on Information Security Issues.

Minimum Qualifications

Minimum Education Level & Type: Bachelor's Degree

Minimum Experience Qualifications: At least 5 years experience in information security administration, including experience in policy, management, and technology

Driver's License

Preferred Qualifications

Master’s degree from an accredited college or university in Computer Information Systems (CIS), Cybersecurity, Information Technology (IT), Management Information Systems (MIS), or a degree closely related to the core functions of this position.

Cisco or Microsoft plus non-vendor certifications from ISC (System Security Certified Professional), SANS (GIAC), ISACA (Certified Information Security Auditor or Certified Information Security Manager); CISSP certification is a plus.

Experience in the following Cybersecurity Domains:

· Security Operations - Investigations and Response, Vulnerability Management, Threat Hunting, and Sterilization.

· Security Architecture - Network Design, DDoS Protection, Access Control, Data Protection, Cryptography and Encryption Standards, Cloud Security, Endpoint Security, and Patch Management.

· Threat Intelligence - Provide Internal and External Context on Indicators of Compromise (IOC), Emerging and Persistent Threats, and Threat Actor’s Tactics Techniques and Procedures (TTPs).

· Governance - 1). Policies and Procedures, Laws and Regulations, Frameworks, Standards, and Compliance Enforcement.  2). Payment Card Industry (PCI), Criminal Justice Information Services (CJIS), Health Information Portability and Accountability Act (HIPAA), International Organization for Standards (ISO), Federal Information Security Modernization Act (FISMA), Open Web Application Security Project (OWASP), Center for Internet Security (CIS), National Institute for Standards and Technology (NIST).

· Enterprise Risk Management - Risk Appetite and Acceptance, Crisis Management, Audits, and Risk Registers

· Risk Assessments - Vulnerability Scans, Asset Inventory and Classification, Penetration and Vulnerability Testing, Social Engineering, and Risk Monitoring

· Application Security - Software Development Life Cycle, Security UX, API Security, Source Code, and Open-Source Scans

Selection Plan

*Applications must include a resume for consideration, any application without a resume will be considered incomplete*

Applicants who meet the minimum qualifications will be evaluated on the education and work experience in their employment profile and the responses to their supplemental questions. The highest scoring applicants will then be invited to participate in an oral board interview. 

  • Virtual Oral Board interviews will be held April 6, 2023 via Microsoft Teams
Upon completion of all examination processes, the highest scoring applicants will be placed on the Civil Service Employment List.

An applicant's ranking on the Civil Service list will be based on their final score which will be calculated as:
  •  20% of your rating for education and work experience 
  •  80% of your rating for panel board interview

    This recruitment will establish a civil service list that will be utilized to fill vacancies occurring within the next 6 months.

    Veterans, Native American, or Disability preference points will be added to the final score for those that are placed on the Civil Service Employment List.  If you qualify for preference points as outlined in the Employment Profile, you must present your documentation prior to your oral board interview. The DD 214 must be a copy that indicates characterization of service.  

    If you are in need of Americans with Disabilities Act-related accommodation during the testing process, please email Erin.Gallego@tucsonaz.gov at least 48 hours prior to the evaluation.
  • Conclusion

    You are highly encouraged to print this bulletin because it contains important testing dates and information that you will need to refer to later, as it will not be available after the closing date.

    Communication throughout this process will be sent via email exclusively so please ensure your browser accepts emails from jobs@tucsonaz.gov and check your email account regularly.  Failure to respond or follow instructions will result in disqualification.  All email inquiries should be directed to Curtis.Rohlfs@tucsonaz.gov.

    Driving Requirements

    License Type: Valid and Unrestricted Class D – Driver