What are the responsibilities and job description for the IT SECURITY SUPERVISOR position at City of Miami?
RESTRICTED TO CITY OF MIAMI EMPLOYEES ONLY
Highly technical, specialized work in the research, development, implementation, and management of all the security components of the City of Miami’s Innovation and Technology Department.
An employee in this classification is responsible for, but not limited to: planning, managing, designing, and implementing security processes and measures which safeguard access to information technology assets. Work involves creating and implementing a security strategy, identifying security issues, developing security architecture solutions, researching, and deploying new security technologies, developing, and documenting security policies, performing security audits as needed, and responding to security incidents. This position will lead real-time proactive security monitoring, triaging, and investigating security events, conducting forensic analysis on systems to identify root causes, across multiple security solutions. An employee in this classification will also be responsible for Internet, extranet, and Intranet security, including cloud and on-prem network related security, firewalls, identity management, authentication and password controls, application security, security design and architecture, auditing, testing, and validating a sound backup and disaster recovery strategy and procedures. This position requires a strong theory background and operational experience in information systems security, security frameworks, risk assessment frameworks, and security processes across a broad organizational range. An employee of this class works independently and supervises the work of lower level professionals and technical staff members. This position reports to the Chief Information Security Officer (CISO) or his/her designee.
Develops, and implements computer security policies and procedures which meet the current and future needs of the City for the following areas, but not limited to: Internet, Extranet, Intranet, and Cloud Security.
Keeps all security systems up to date, including but not limited to: firewalls, intrusion detection systems, cryptography systems, VPN solutions, and endpoint security platforms.
Ensures that the existing security policies are enforced throughout the organization.
Develops communication and educational content to inform broad audiences about security related matters.
Follows project management standards to organize workload and assign required work.
Maintains project status across multiple initiatives and implement appropriate tracking mechanisms to ensure timely deliverables.
Protects data and information systems against unauthorized access, modification, or destruction.
Maintains situational awareness of latest cybersecurity threats, vulnerabilities, and mitigation strategies.
Analyzes malicious activity and security breaches to determine their root cause, weaknesses exploited, exploitation methods, and impact on systems; proposes and implements solutions to correct and improve.
Reviews external reports and data sources to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
Continuously improves the organization's security posture by implementing and maintaining security controls.
Participates in the implementation, testing and simulation of the Backup and Disaster Recovery plan.
Research, and evaluates security products and makes recommendations for their use.
Performs real-time proactive security monitoring, detection and response to security events and incidents across multiple security solutions, and performs investigations as needed.
Triage and conducts initial investigation of security events generated by detection mechanisms such as security information and event management (SIEM), intrusion detection/prevention systems (IDS/IPS), end point security, ticketing, and customer contact, including the use of advanced network and hosts forensic tools.
Conducts regular security checks on systems to identify vulnerabilities and recommends measures to mitigate and improve the organization security posture.
Performs risk assessments leveraging well known risk assessment frameworks.
Performs security reviews and periodic audits to identify security gaps, violations, and inefficiencies in the security architecture to make recommendations for inclusion in the risk mitigation strategy.
Identifies opportunities for process improvement, optimization, and automation.
Implements selected technologies and creates solutions leveraging multiple technologies.
Writes and reviews custom scripts, employs authorized utilities, and utilizes advanced security tools to identify and eliminate security threats.
Analyzes all relevant data sources to locate threats, threat behaviors, and devise methods to eliminate threats.
Writes and reviews incident response reports, including cyber defense trend analysis and reporting, for internal and external audiences.
Conducts application testing using authorized tools.
Configures and maintains data loss prevention solutions and performs data classification related tasks.
Uses authorized exploitation techniques and tools to identify vulnerabilities.
Conducts forensic analysis on systems to identify root cause of security issues and/or events.
Installs and configures IT security products.
Maintains up to date on security technology and assist in the integration of innovative security solutions.
Ensures that new installations of software and hardware comply with the existing security policy.
Compiles and generates statistical information concerning security issues.
Perform statistical analysis and correlation of events using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of existing controls and applied remediation.
Ensures that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
Analyzes network traffic for hostile and poor security practices.
Characterizes and analyzes network traffic to identify anomalous activity and potential threats to network resources, and documents and escalates incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
Meets with programming staff, operations staff, technical staff, departmental users, and customers on all security related issues.
Attends and participates in training and seminar programs.
Educates and trains IT personnel and City users on updated security awareness, policy, and standards.
Supervises the work of lower level professionals and technical staff members.
Communicates problems to management and follows through on each task assigned.
Performs other related work as required.
Bachelor’s degree in Management Information Systems, Computer Science, Information Technology, or a closely related field and thorough four (4) years operational experience in planning, managing, designing, and implementing security measures, as well as assessing security risks and implementing counter measures.
At least 1 year of the aforementioned experience must have included working with Endpoint Security solutions, Firewalls, Intrusion Prevention, Vulnerability management, Disaster Recovery, Data encryption, Certificate management, Identity Management, Security Auditing, Virtual Private Network (VPN),virtualization technologies, mobility management, email security, Single Sign-On (SSO), information security frameworks or Active Directory. Supervisory experience in any of the aforementioned security fields is desirable.
A candidate must have at least one (1) of the following professional security management certifications: Certified Information System Security Professional (CISSP), Systems Security Certified Practitioner (SSCP), Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Certified Risk and Information Systems Control (CRISC), or a Cybersecurity Practitioner Certification (CSX-P) is required at time of application and maintain it valid throughout employment in the classification.
OR
Equivalent combination of education and experience beyond a high school diploma or its equivalent and one (1) year of the required experience.
SPECIAL NOTE:
Applicants selected to fill the position may be subject to undergo and successfully pass a City of Miami Police Department background check depending on the location of the assignment.
ALL DOCUMENTS SUBMITTED MUST BE CLEAR, LEGIBLE, AND IN PROPER FORMAT.
THE FOLLOWING DOCUMENTS ARE REQUIRED AT TIME OF APPLICATION AND ARE ACCEPTABLE FORMS OF PROOF:
- Proof education in the form of Bachelor’s degree in Management Information Systems, Computer Science, Information Technology, or a closely related field from an accredited college or university. Foreign diplomas/degrees must be submitted with a credential evaluation report from an approved credential evaluation agency*.Translations of diploma/degrees are not accepted. If degree/diploma does not reflect the academic major on its face, transcripts indicating degree completion must be submitted. Audit/Academic reports are not accepted as substitutions for college transcripts. Translations of diploma/degrees are not accepted. If degree/diploma does not reflect the academic major on its face, transcripts indicating degree completion must be submitted. Audit/Academic reports are not accepted as substitutions for college transcripts.
- Proof of at least one (1) of the following certifications: Certified Information System Security Professional (CISSP), Systems Security Certified Practitioner (SSCP), Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Certified Risk and Information Systems Control (CRISC), or a Cybersecurity Practitioner Certification (CSX-P)
- To qualify under the equivalency clause, applicant must provide proof of education in one or more of the following applicable forms: copy of high school diploma, or equivalent, OR any higher accredited degree such as an Associate's, Bachelor's, Master's degree or higher.
*Approved Credential Evaluation Agencies:
Credential evaluation reports showing the United States equivalency for academic credentials earned in other countries may be provided by:
- An accredited four-year college or university in the United States, OR
- A current member of the National Association of Credential Evaluation Services (NACES), OR
- A current member of the Association of International Credential Evaluators (AICE), OR
- A recognized Professional Organization
Applicants, including City of Miami employees, must completely detail their work experience on the employment application or risk being disqualified. Resumes are not required and will not be reviewed in place of the employment application.
It is the applicant's responsibility to update their online profile with personal data, work experience, education, and certifications, when submitting application(s), failure to do so may result in disqualification.
Applicants must provide a valid email address in order to receive notification of eligibility.
FDVA Certification Forms: Please complete the applicable Veterans' Preference Certification Form(s). Form(s) must be uploaded with your employment application along with acceptable proof of veterans' preference.
Form VP1: VETERANS' PREFERENCE CERTIFICATE
Form VP2: CURRENT MEMBER OF THE RESERVE CERTIFICATION
FORM VP3: UNREMARRIED WIDOW or WIDOWER CERTIFICATE
RESTRICTED/NON-COMPETITIVE
Salary : $102,794