VietFun For All

VietFun For All (
-   Recipes (Nấu Ăn) (
-   -   Information Technologies Security Officer City of Oceanside, San Diego (

VanLang76 08-23-2019 11:16 AM

Information Technologies Security Officer City of Oceanside, San Diego
Information Technologies Security Officer
City of Oceanside
Oceanside, CA
Over 1 month ago86,280–115,632 a yearFull-time
THE CITY OF OCEANSIDE IS AN EQUAL OPPORTUNITY EMPLOYER. The City of Oceanside is accepting applications for current and future vacancies for the position of Information Technologies Security Officer. There is currently one vacancy in the City Manager's Office - Information Technologies Division. This is a single position class characterized by its responsibility for leading, developing and implementing City-wide or large-scale department information security strategies, plans, programs policies and procedures designed to protect the integrity and security of City data resources, operations and other information assets, in accordance with City policies and industry standards. Work requires broad business acumen, strong conceptual thinking and planning skills, exceptional interpersonal and consultative management competencies and vigilance in monitoring and detecting risks and taking prompt, appropriate, decisive action to resolve problems. The ideal candidate will have a well-rounded technical background with demonstrated success in network operations for a city or county with experience in cyber security issues, and a desire to lead the cyber security strategy for the City of Oceanside. The Information Technologies Security Officer leads and manages development of information security strategies and plans to prevent the unauthorized use, release, modification, loss or destruction of data and other information assets; facilitates the involvement of key stakeholders in plan development processes designed to assess the business impacts of various security approaches and develop security plans that balance security needs with business operational requirements, stakeholders and team members; leads and participates in plan development tasks, including conducting risk assessments; evaluating security management options; developing procedures and protocols, including designating and training of primary and backup recovery teams, develops and implements comprehensive communications plans and tools. Conducts risk assessments to identify vulnerabilities and develop appropriate methods for avoiding or mitigating potential risk; analyzes, develops, recommends, plans, oversees and participates in implementation and monitors the effectiveness of the City's security architecture; develops, recommends, implements, monitors and enforces all information security programs, policies and procedures; advises on information security issues and works with City and departmental management, audit staff and others to assess and agree on practices and protocols to provide optimal levels of protection for the City's information assets and operating processes. Meets with departmental managers to facilitate and assist in managing implementation of business process changes, management of information assets, information technology changes and other issues involved in avoiding or minimizing potential risks to City information assets. Leads and works with staff to integrate advanced protection methodologies with the City's systems and network, hardware and software infrastructure; works with staff to secure development and production environments; ensures security patches and configuration changes are effected in a timely manner; ensures ongoing use of monitoring and detection techniques to verify that security measures are functional and enforced; coordinates the implementation of periodic, comprehensive system security audits. Develops appropriate security incident notification procedures for City and departmental management; coordinates investigations of security compromises with City management, outside auditors and consultants and appropriate law enforcement agencies when warranted by the nature of the intrusion or compromise. Conducts routine and periodic unannounced security inspections and audits systems administration processes to ensure sound control systems are in place for the granting of user access and privileges and to ensure the timely removal of access for employees leaving City employment. Develops and/or leads development of broad-scale testing plans and exercises to ensure organizational capability to implement business continuity plans in the event of a variety of emergencies; conducts audits of detailed plans and planning processes to ensure accountability for keeping plans up to date; regularly examines and updates plans and disaster scenarios. Conducts annual and other periodic information security management training for Information Technology and City staff. Provides comprehensive reports of all events, incidents and breaches to City management. Monitors trends and developments in information security technologies; consults with vendors and other sources on industry and product functionality and capabilities. Knowledge of: • Principles, practices, methods, tools and techniques of information technology security, including systems security products and methodologies, applicable to both the enterprise infrastructure and its applications and data management systems and to public access computer systems. • Network architectures and theory and principles of network design and integration, including topologies and protocols. • Operating system architecture, characteristics, commands and components applicable to City and departmental system platforms. • Principles, practices and methods of systems/networks and database administration and maintenance. • Business relationship management and internal consulting concepts and practices. • Principles, practices, methods and techniques applicable to long-range and strategic technology planning, particularly as they apply to information technology security issues. • City ordinances, codes, procedures and practices regarding areas of assigned information security responsibility. • Principles, practices, methods and techniques of business continuity planning and continuity management applicable to an IT service organization. • Principles and practices of supervision Ability to: • Develop conceptual frameworks and apply state-of-the-art approaches and technology to the development, management and administration of information security systems and protocols. • Perform business analysis and risk exposure/threat assessments and reach sound conclusions regarding information security and business continuity requirements. • Serve as an effective facilitator and consensus builder with multiple stakeholders of diverse views and needs. • Demonstrate leadership while participating in the evaluation and development of complex strategies and approaches that maximize return on investment. • Perform project management responsibilities, including developing logical and efficient project plans, establishing priorities, monitoring and managing task completion, anticipating and avoiding problems and working collaboratively and cooperatively with team members and user groups to ensure project accountability. • Understand, interpret, explain and apply City, state, and federal policy, law, regulation applicable to areas of responsibility. • Present proposals and recommendations clearly, logically and persuasively. • Represent the City and assigned department effectively in meetings on a variety of information security issues with key internal and external stakeholders including law enforcement agencies. • Prepare clear, concise and comprehensive correspondence, reports, studies and other written materials appropriate to both technical and non-technical audiences. • Exercise sound, expert independent judgment within general policy guidelines. • Exercise tact and diplomacy in dealing with sensitive, complex and confidential issues and situations. • Maintain the confidentiality of City-wide information assets. • Establish and maintain effective working relationships with all those encountered in the course of work. Experience and Training Experience: A minimum of five years of progressively responsible experience in information technologies cyber security including three years of lead or supervisory experience in a technology environment. Training: A Bachelor's degree from an accredited college or university in Computer Science, Business Administration, Public Administration or a closely related field. License/Certificates: • Possession of, or ability to obtain and maintain, an appropriate, valid California driver's license. Highly desirable certifications - one or more: • Certified Information Systems Security Professional (CISSP), • Certified Cisco Network Associate - Security (CCNA Security), • Certified Information Security Manager (CISM) or • Certified Ethical Hacker (CEH). The Ideal Candidate: The ideal candidate will have a well-rounded technical background with demonstrated success in network operations for a city or county with experience in cyber security issues, and a desire to lead the cyber security strategy for the City of Oceanside. Environmental Conditions: Office environment; exposure to computer screens. Physical Conditions: Essential functions may require maintaining physical condition necessary for walking, standing or sitting for prolonged periods of time; heavy to moderate lifting; extensive use of computer keyboard, extensive verbal and electronic communication with system users. Selection Process: All properly completed applications and supplemental questionnaires will be reviewed, and the most appropriately qualified individuals will be invited to continue in the selection process. The process may include any combination of a written exam, oral exam, and/or skills assessment to further evaluate job-related qualifications. Candidates who successfully complete the selection process will be placed on an eligible list for a period of six months. Note: Prospective employees will undergo and must successfully pass a thorough police background investigation which shall include a psychological evaluation, polygraph examination, and a medical examination - including a drug screen. Positions may require working some weekend and evening hours; may be required to adjust work schedule to meet Information Technology's needs. RESUMES ARE NOT ACCEPTED IN LIEU OF COMPLETED APPLICATION FORMS, BUT MAY BE ATTACHED. CANDIDATES WHO REQUIRE A REASONABLE ACCOMMODATION IN THE SELECTION PROCESS SHOULD STATE THEIR NEEDS IN WRITING WHEN SUBMITTING AN APPLICATION. THE PROVISIONS OF THIS BULLETIN DO NOT CONSTITUTE AN EXPRESSED OR IMPLIED CONTRACT. ANY PROVISION CONTAINED IN THIS BULLETIN MAY BE MODIFIED OR REVOKED WITHOUT NOTICE

All times are GMT -4. The time now is 05:15 AM.

Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.