Job Description
Full job description
Description
Title: Security Administrator
Position Number: 0077441
Hiring Unit: Information Technology Services/Office of the VP for IT
Location: UH System Offices
Date Posted: September 9, 2024
Closing Date: October 6, 2024
Band: B/A
Salary : salary schedules and placement information
Full Time/Part Time: Full-time
Month: 11-month
Temporary/Permanent: Permanent
Duties and Responsibilities (* denotes Essential Functions)
Pay Band B
- As a member of the UH Information Security Team, develops, implements & maintains the system-wide information security program that supports research, academic & administrative use of IT resources in a distributed/decentralized computing environment.
- As part of the governance, risk, and compliance group within the UH Information Security Team, is responsible for compliance related to federal/state/local/external regulations/laws/standards such as but not limited to the DOD Cybersecurity Maturity Model Certification program, GDPR, PCI-DSS, HIPAA, FERPA, NIST 800-171, HRS 487N, HRS 92F & UH policies/procedures across the UH system.
- Serves as a subject matter expert on regulatory/legal/compliance requirements related to information security.
- Develop & maintain information security awareness materials including development of web pages, video/audio recordings, managed instructional materials in a learning management system (e.g. Brightspace); includes providing materials/training for targeted audiences in face-to-face and distance-delivered environments (e.g. compliance training programs for specific regulations, specific training for functional areas, etc.).
- Actively promotes security awareness among university faculty, staff and students.
- Responsible for the evaluation, development, implementation, and enforcement of information security policies, standards, procedures, guidelines, and best practices with primary focus on regulatory/legal/compliance requirements.
- Provides general guidance, technical advice, problem-solving assistance, and answers to questions regarding the information security program, policies, standards and procedures.
- Identifies potential compliance vulnerabilities & risk; develops/implements corrective action plans for resolution of issues.
- Performs quantitative and qualitative information risk and vulnerability assessments to identify deficiencies in security and compliance requirements; and develops and implements (or oversees implementation of) remediation plans as appropriate.
- Performs compliance risk assessments. Provides reports to senior staff on the operation and progress of compliance efforts.
- Performs remote and on-site vulnerability scans of data networks and computing devices using commercial or open source vulnerability scanning tools and reviews reports for threats and vulnerabilities; reports findings to appropriate staff; monitors remediation efforts; summarizes findings & generates reports on a regular basis for senior staff.
- Participates in security incident response & investigations, including any emergency situations, and also includes investigations into policy and regulatory violations, and legal requests, and provides remediation support.
- Evaluates and recommends security-related technologies as needed to address new security deficiencies and threats.
- Continuously monitors security trends, security threat landscape, technological developments and emerging practices in the IT industry and higher education.
- Develop and coordinate 'security-themed' events such as informational fairs, workshops, conferences including identifying and scheduling of location venues, speakers, etc.
- Perform other related duties as directed by senior information security staff, Chief Information Security Officer, VP IT & CIO, AVP IT & Deputy CIO, General Counsel and/or other UH system administrators.
- Other Duties as Assigned.
Pay Band A
- As a member of the UH Information Security Team, helps develop, implement & maintain the system-wide information security program that supports research, academic & administrative use of IT resources in a distributed/decentralized computing environment.
- As part of the governance, risk, and compliance group within the UH Information Security Team, assists with compliance related to federal/state/local/external regulations/laws/standards such as but not limited to the DOD Cybersecurity Maturity Model Certification program, GDPR, PCI-DSS, HIPAA, FERPA, NIST 800-171, HRS 487N, HRS 92F & UH policies/procedures across the UH system.
- Develop & maintain information security awareness materials including development of web pages, video/audio recordings, managed instructional materials in a learning management system (e.g. Brightspace); includes providing materials/training for targeted audiences in face-to-face and distance-delivered environments.
- Actively promotes security awareness among university faculty, staff and students.
- Assists with the evaluation, development, implementation, and enforcement of information security policies, standards, procedures, guidelines, and best practices.
- Provides technical advice, problem-solving assistance, and answers to questions regarding the information security program, policies, standards and procedures.
- Assists with identifying potential compliance vulnerabilities & risk; develops/implements corrective action plans for resolution of issues.
- Assists with quantitative and qualitative information risk and vulnerability assessments to identify deficiencies in security and compliance requirements; and also assists with the development and implementation of remediation plans.
- As directed by senior staff, performs compliance risk assessments. Provides reports on a regular basis & keep UH officers/senior leadership & functional groups informed of the operation and progress of compliance efforts.
- As directed by senior staff, performs remote and on-site vulnerability scans of data networks and computing devices using commercial or open source vulnerability scanning tools and reviews reports for threats and vulnerabilities.
- As directed by senior staff, participates in security incident response & investigations, including any emergency situations, and also includes investigations into policy and regulatory violations, and legal requests, and provides remediation support.
- Assists with projects concerning the evaluation and implementation of security-related technologies.
- Continuously monitors security trends, security threat landscape, technological developments and emerging practices in the IT industry and higher education.
- Develop and coordinate 'security-themed' events such as informational fairs, workshops, conferences including identifying and scheduling of location venues, speakers, etc.
- Perform other related duties as directed by senior information security staff, Chief Information Security Officer, VP IT & CIO, AVP IT & Deputy CIO, General Counsel and/or other UH system administrators.
- Other Duties as Assigned.
Minimum Qualifications Pay Band B
- Possession of a pertinent baccalaureate educational degree in Information & Computer Sciences, Information Assurance, IT with an emphasis in information security/information assurance or related field and 5 years of progressively responsible professional information technology experience with responsibilities for Information Security of which 2 years of the experience must have been comparable in scope and complexity to the next lower payband in the University of Hawai'i broadband system; or any equivalent combination of education and/or professional work experience which provides the required education, knowledge, skills and abilities as indicated.
- Considerable working knowledge of information security as demonstrated by the broad knowledge and understanding of the full range of pertinent standard and evolving information technology concepts, principles and methodologies.
- Considerable working knowledge and understanding of the broad technology, systems, hardware and software associated with information security.
- Demonstrated ability to recognize a wide range of intricate problems, use reasoning and logic to determine accurate causes, and apply principles and practices to determine, evaluate, integrate, and implement practical and thorough solutions in an effective and timely manner.
- Demonstrated ability to interpret and present information and ideas clearly and accurately in writing, verbally and by preparation of reports and other materials.
- Demonstrated ability to establish and maintain effective working relationships with internal and external organizations, groups, team leaders and members, and individuals.
- Demonstrated ability to lead subordinates, manage work priorities and projects, and manage employee relations.
- Considerable knowledge of information security current practices and threat landscape.
- Considerable knowledge of current information security technologies and tools.
- Considerable knowledge of security incident response
- Considerable knowledge of information security related frameworks as it applies to higher education.
- Considerable knowledge of international, federal, state and local laws, rules, and regulations related to information security, privacy, and higher education.
- Functional knowledge of a scripting or programming language used to develop open source tools.
- Demonstrated ability to configure, administer, and manage systems and network hardware as related to information security.
- Demonstrated ability to combine and apply skill sets from many areas of IT.
- Demonstrated ability to speak, read, comprehend, interpret and write fluently in English.
- Demonstrated ability to establish and maintain effective working relationships in a positive, service-oriented manner with others.
- Demonstrated ability to work cooperatively with UH leadership, supervisor, project staff, and customers in a team environment to accomplish tasks and meet deadlines.
- Demonstrated ability to understand and follow oral and written instructions and documentation, write reports and procedures, and communicate effectively in a variety of situations.
- Demonstrated ability to learn and apply new technologies independently and in a timely manner using books, manuals, online research, and other resources.
- Demonstrated ability to develop effective training materials.
- Demonstrated ability to conduct effective in-person or virtual training/workshops.
- Working knowledge of HTML/CSS.
- Working knowledge of common Internet protocols and applications.
- Working knowledge of TCP/IP protocols and analysis.
- Ability to manage multiple projects.
- Ability to work a variable work schedule; and work outside normally scheduled work hours including day, night, weekend and/or holiday hours as directed.
Pay Band A
- Possession of a baccalaureate educational degree in Information & Computer Sciences, Information Assurance, IT with an emphasis in information security/information assurance or related field and 0 year(s) of progressively responsible professional information technology experience with responsibilities for information security; or any equivalent combination of education and/or professional work experience which provides the required education, knowledge, skills and abilities as indicated.
- Functional knowledge of information security demonstrated by knowledge, understanding and ability to apply principles, concepts, methodology and terminology.
- Functional knowledge and understanding of technology, systems, hardware and software associated with information security.
- Demonstrated ability to recognize problems, identify possible causes and resolve routine problems in the area of information security.
- Demonstrated ability to understand oral and written documentation, write reports and procedures, and communicate effectively in a variety of situations.
- Demonstrated ability to establish and maintain effective working relationships with internal and external organizations, groups, team members and individuals.
- Functional knowledge of information security current practices and threat landscape.
- Functional knowledge of current information security technologies and tools.
- Functional knowledge of security incident response
- Functional knowledge of information security related frameworks as it applies to higher education.
- Functional knowledge of international, federal, state and local laws, rules, and regulations related to information security, privacy, and higher education.
- Functional knowledge of a scripting or programming language used to develop open source tools.
- Demonstrated ability to combine and apply skill sets from many areas of IT.
- Demonstrated ability to speak, read, comprehend, interpret and write fluently in English.
- Demonstrated ability to establish and maintain effective working relationships in a positive, service-oriented manner with others.
- Demonstrated ability to work cooperatively with UH leadership, supervisor, project staff, and customers in a team environment to accomplish tasks and meet deadlines.
- Demonstrated ability to understand and follow oral and written instructions and documentation, write reports and procedures, and communicate effectively in a variety of situations.
- Demonstrated ability to learn and apply new technologies independently and in a timely manner using books, manuals, online research, and other resources.
- Demonstrated ability to develop effective training materials.
- Demonstrated ability to conduct effective in-person or virtual training/workshops.
- Working knowledge of HTML/CSS.
- Working knowledge of common Internet protocols and applications.
- Working knowledge of TCP/IP protocols and analysis.
- Ability to configure, administer, and manage systems and network hardware as related to information security.
- Ability to manage multiple projects.
- Ability to work a variable work schedule; and work outside normally scheduled work hours including day, night, weekend and/or holiday hours as directed.
Desirable Qualifications Pay Band B
- Prior cybersecurity experience in or with higher education.
- Experience with various industry-recognized cybersecurity frameworks.
- Experience with vulnerability scanning tools.
- Certifications related to the information security area (CISSP, GIAC/GSEC, CISM, etc.)
- Experience as an administrator of Active Directory environments.
Pay Band A
- Prior cybersecurity experience in or with higher education.
- Experience with vulnerability scanning tools.
- Certifications related to the information security area (CISSP, GIAC/GSEC, CISM, etc.)
To Apply: Click on the “Apply” button on the top right corner of the screen to complete an application and attach required documents.
Applicants must submit the following: (1) Cover Letter to the selection committee indicating what band you are applying for and your interest in the position and how the minimum and desirable qualifications are met (2) Resume (3) The names and contact information (telephone number and email addresses) of at least three (3) professional references (4) Copies of Educational Transcripts with confidential information redacted (i.e. social security number, date of birth, etc.). Only one application required to be considered for both levels, preference will be given to Pay Band B qualified applicants. Official transcripts are required upon hire. Employment may be contingent on verification of credentials and other background information, including the completion of a criminal history check.
Note: If you have not applied for a position before using NeoGov, you will need to create an account.
Inquiries: (808)956-9098, itsadmin@hawaii.edu
EEO/AA, Clery Act, ADA
The University of Hawai'i is an Equal Opportunity/Affirmative Action Institution and is committed to a policy of nondiscrimination on the basis of race, sex, gender identity and expression, age, religion, color, national origin, ancestry, citizenship, disability, genetic information, marital status, breastfeeding, income assignment for child support, arrest and court record (except as permissible under State law), sexual orientation, domestic or sexual violence victim status, national guard absence, or status as a covered veteran.
Job Tags
Holiday work, Permanent employment, Full time, Temporary work, Part time, Work experience placement, Local area, Remote job, Night shift,