University of Central Florida Class Specification Administrative and Professional. Information Security Officer



Similar documents
INFORMATION TECHNOLOGY ENGINEER V

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Sample Career Ladder/Lattice for Information Technology

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

SENIOR SYSTEMS ANALYST

INFORMATION SYSTEMS SPECIALIST

Vendor Audit Questionnaire

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

JOB DESCRIPTION CONTRACTUAL POSITION

Critical Controls for Cyber Security.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Appendix A-2 Generic Job Titles for respective categories

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Roles within ITIL V3. Contents

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

NOS for Network Support (903)

Client Security Risk Assessment Questionnaire

Supplier Security Assessment Questionnaire

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Symantec Residency and Managed Services

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

INFORMATION SYSTEMS ANALYST III

The Protection Mission a constant endeavor

SRA International Managed Information Systems Internal Audit Report

Bellevue University Cybersecurity Programs & Courses

Lot 1 Service Specification MANAGED SECURITY SERVICES

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

EXIN Cloud Computing Foundation

Introduction to Cyber Security / Information Security

Assistant Information Technology Specialist. X X X software related to database development and administration Computer platforms and

University of Central Florida Class Specification Administrative and Professional. IT ERP Business Analyst Senior

FUNCTIONAL AREA 12. Network Administration (NET)

II. Supports the department in implementing the strategy established by management.

IBX Business Network Platform Information Security Controls Document Classification [Public]

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Hengtian Information Security White Paper

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) Fax: (718)

Security Controls What Works. Southside Virginia Community College: Security Awareness

Commercial Practices in IA Testing Panel

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

Contents QUALIFICATIONS PACK - OCCUPATIONAL STANDARDS FOR TELECOM INDUSTRY. Introduction. Qualifications Pack- Telecom Network Security Technician

External Supplier Control Requirements

Information Resources Security Guidelines

R345, Information Technology Resource Security 1

BUSINESS SYSTEMS ANALYST I BUSINESS SYSTEMS ANALYST II

Report on CAP Cybersecurity November 5, 2015

General Dynamics One Source, LLC Alliant GS00Q09BGD0030 Labor Category Descriptions April

Firewall Administration and Management

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Better secure IT equipment and systems

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Cisco Advanced Services for Network Security

CLASSIFICATION SPECIFICATION FORM

Qulliq Energy Corporation Job Description

INFORMATION SYSTEMS SPECIALIST

Release: 1. ICTNWK607 Design and implement wireless network security

CHIS, Inc. Privacy General Guidelines

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Microsoft Technologies

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

DATABASE ANALYST I DATABASE ANALYST II

IT Sr. Systems Administrator

Systems Programmer/Analyst (12203) ( )

Monterey County ENTERPRISE RESOURCE PLANNING (ERP) BUSINESS ANALYST

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Security Policy for External Customers

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Information Technology Cluster

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

NETWORK ADMINISTRATOR

SECURITY THROUGH PROCESS MANAGEMENT

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

How To Be A Data Security Analyst

Attachment A. Identification of Risks/Cybersecurity Governance

Table of Contents. Introduction. Audience. At Course Completion

Internet Banking Internal Control Questionnaire

Transcription:

Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team lead over technical employees who monitor university system security and firewall vulnerabilities. Monitor and respond to university IT systems to detect security system risks and vulnerabilities. Administer the security incident response program. Ensure university firewalls, infrastructures, and data architectures are protected from unauthorized electronic access and intrusion. Detect and identify security and firewall system vulnerabilities. Enforce physical and electronic security standards for university information systems. Implement and maintain disaster recovery data systems. Bachelor's degree and six years of information technology

Network Security Specialist Senior Job Code: 2553 Responsible for the management, design, purchase, installation, configuration, and support of enterprise network security systems. Supervise the network security specialists who provide technical support to security devices connected to the enterprise network infrastructure. Responsible for all aspects of enterprise firewalls and other security devices that guard the enterprise network security systems. Provide complex skilled technical assistance in network planning, engineering, and architecture. Make recommendations for resources required to maintain and expand service levels. Plan large scale systems projects through vendor comparison and cost studies. Test and analyze all elements of the network. Bachelor's degree and four years of information technology

Network Security Specialist Job Code: 2554 Effective Date: 06/04/08 Provide technical support to security devices connected to the enterprise network infrastructure. Assist in the design, purchase, installation, configuration, and support of enterprise network security systems. Monitor and respond to technical control facility hardware and software problems. Assist in planning large scale systems projects through vendor comparison and cost studies. Investigate and resolve network security and network incidents. Analyze, configure, and maintain enterprise firewalls and other security devices for monitoring network activity. Bachelor's degree and one year of information technology

IT Security Analyst Senior Job Code: 2529 Effective Date: 6/19/09 Assess and identify security threats to enterprise systems and processes. Perform procedures to ensure the safety of Information Systems assets and to protect systems from unauthorized access or destruction. Develop IT security standards and procedures. Interface with users to evaluate their specific security and/or code change needs and requirements and implements procedures/processes to accommodate approved access/changes. Conducts evaluation of the level of security required. Perform monitoring activities and respond to security threats. Ensure that necessary computer applications are installed and maintained to prevent the unauthorized access of data of enterprise computer systems. Analyze and recommend the streamlining of business processes to reduce unauthorized system access. May supervise or direct computer investigations for security incidents. Bachelor's degree and two years of information technology

Data Security & Disaster Recovery Analyst Senior Job Code: 2536 Assist in the coordination and establishment of disaster recovery programs and business resumption planning across mainframe and client server platforms. Aid in the investigation, planning, documentation, implementation, and maintenance of disaster recovery plans. Train university end users in maintaining computer system access security. Bachelor's degree and two years of information technology