The Lead Security Administrator’s work is widely varied, involving analyzing and evaluating many complex and unique systems. This position will participate in the development, implementation, maintenance and/or recommendation of ITD and city-wide security policies and procedures. Applicants to this position should have experience in a fast-paced, ever-changing environment and must be able to analyze, organize and prioritize tasks and requests all while meeting multiple deadlines.
Under general direction of the Network Services Manager, the Lead Security Administrator is responsible for the development and delivery of a comprehensive information security and privacy program for the City. The scope of this program is City wide and includes information in electronic, print and other formats. The purposes of this program include: to assure that information created, acquired or maintained by the City and its authorized users, is used in accordance with its intended purpose; to protect City information and its infrastructure from external or internal threats, and to assure that the City complies with statutory and regulatory requirements regarding information access, security and privacy.
The Lead Security Administrator develops and administers processes and standards for information security within the City's defense in depth information security architecture. The position validates that security policies are implemented and that monitoring and testing is in place, and maintains awareness of new threats and counter measures. This individual directs the work of staff responsible for computer and IT security inside the organization. The Lead Security Administrator performs the role of Disaster Recovery Manager for incidents that result from unauthorized access.
The Security Administrator’s work is
widely varied, involving analyzing and evaluating many complex and unique
systems. This position will participate in the development, implementation,
maintenance and/or recommendation of ITD and city-wide security policies and
Security Administrator must always remain calm and professional during
stressful situations and must be able to analyze, organize and prioritize tasks
and request all while meeting multiple deadlines
This is a lead position affording guidance to other positions performing the same tasks. This lead position also reviews workloads, assigns work and coaches employees with specialized instructions and practices for job accomplishments.
Lead personnel may contribute to other employees' performance evaluations, assist with the hiring process by interviewing and making recommendations and providing input to supervisory staff.
Function as the overall information security officer for technical matters for the City.
Coordinate development of City information security policies, standards and procedures. Ensure that City policies support compliance with external requirements such as HIPAA, HITECH, Red Flag, PCI, etc.
Develop and implement an incident report and response system to address City security incidents (breaches), respond to alleged policy violations or complaints from external parties. Serve as official IT contact point for information security, privacy incidents. Conducts investigation, analysis and review following breaches of security controls, and prepares incident reports recommendations for appropriate improvements.
Develop, implement and manage an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation.
Keep abreast of latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities pertaining to City.
Plan and manage the work of small teams of security staff on complex IS security projects.
Determine appropriate levels of security controls and systems monitoring at all levels of the security architecture.
Conduct periodic vulnerability and security risk assessment of the assets of the City, and administers firewalls, IPS, IDS, application firewalls, SIMS, router and switch ACL's, VPN remote access servers, and point-to-point encryption routers.
Identify new and recurring potential security threats and vulnerabilities, assess the risks of these to the City and implement appropriate corrective or preventative action.
Identify foreseeable information security risks in order to comply with privacy and information security regulations, policies and procedures.
Monitor compliance of information security procedures and policies and report infringements to top management.
Audit and review Information Security issues in the organization.
Cooperates with other Organizations on Information Security Issues.
Minimum Education Level & Type: Bachelor's Degree
Minimum Experience Qualifications: At least 5 years experience in information security administration, including experience in policy, management, and technology
Master’s degree from an accredited college or university in
Computer Information Systems (CIS), Cybersecurity, Information Technology (IT),
Management Information Systems (MIS), or a degree closely related to the core
functions of this position.
Cisco or Microsoft plus non-vendor certifications from ISC (System
Security Certified Professional), SANS (GIAC), ISACA (Certified Information
Security Auditor or Certified Information Security Manager); CISSP certification
is a plus.
Experience in the following Cybersecurity Domains:
Operations - Investigations
and Response, Vulnerability Management, Threat Hunting, and Sterilization.
Architecture - Network Design,
DDoS Protection, Access Control, Data Protection, Cryptography and Encryption
Standards, Cloud Security, Endpoint Security, and Patch Management.
Intelligence - Provide Internal
and External Context on Indicators of Compromise (IOC), Emerging and Persistent
Threats, and Threat Actor’s Tactics Techniques and Procedures (TTPs).
- 1). Policies and Procedures,
Laws and Regulations, Frameworks, Standards, and Compliance
Enforcement. 2). Payment
Card Industry (PCI), Criminal Justice Information Services (CJIS), Health
Information Portability and Accountability Act (HIPAA), International
Organization for Standards (ISO), Federal Information Security Modernization
Act (FISMA), Open Web Application Security Project (OWASP), Center for Internet
Security (CIS), National Institute for Standards and Technology (NIST).
Risk Management - Risk Appetite
and Acceptance, Crisis Management, Audits, and Risk Registers
Assessments - Vulnerability Scans,
Asset Inventory and Classification, Penetration and Vulnerability Testing, Social
Engineering, and Risk Monitoring
Security - Software
Development Life Cycle, Security UX, API Security, Source Code, and Open-Source
*Applications must include a resume for consideration, any application without a resume will be considered incomplete*
Applicants who meet the minimum qualifications will be evaluated on the education and work experience in their employment profile and the responses to their supplemental questions. The highest scoring applicants will then be invited to participate in an oral board interview.
- Virtual Oral Board interviews will be held April 6, 2023 via Microsoft Teams
Upon completion of all examination processes, the highest scoring applicants will be placed on the Civil Service Employment List.
An applicant's ranking on the Civil Service list will be based on their final score which will be calculated as:
20% of your rating for education and work experience
80% of your rating for panel board interview
This recruitment will establish a civil service list that will be utilized to fill vacancies occurring within the next 6 months.
Veterans, Native American, or Disability preference points will be added to the final score for those that are placed on the Civil Service Employment List. If you qualify for preference points as outlined in the Employment Profile, you must present your documentation prior to your oral board interview. The DD 214 must be a copy that indicates characterization of service.
If you are in need of Americans with Disabilities Act-related accommodation during the testing process, please email Erin.Gallego@tucsonaz.gov at least 48 hours prior to the evaluation.
You are highly encouraged to print this bulletin because it contains important testing dates and information that you will need to refer to later, as it will not be available after the closing date.
Communication throughout this process will be sent via email exclusively so please ensure your browser accepts emails from firstname.lastname@example.org and check your email account regularly. Failure to respond or follow instructions will result in disqualification. All email inquiries should be directed to Curtis.Rohlfs@tucsonaz.gov.
License Type: Valid and Unrestricted Class D – Driver