WichitaFallsRecruiter Since 2001
the smart solution for Wichita Falls jobs

Cybersecurity Operations Manager

Company: North Texas State Hospital - Wichita Falls Campus
Location: Wichita Falls
Posted on: June 12, 2021

Job Description:

This position leads the development of enterprise-wide cybersecurity architectures and solutions as well as researches, develops and recommends cybersecurity architectural policies and practices for cybersecurity initiatives from the definition phase through implementation. This position formulates the future state of security policies, practices, and requirements for HHSC. It requires critical thinking and analysis of best practices and solutions for the cybersecurity of the agency. Therefore, exposure to, and thorough knowledge of, emerging cybersecurity threats, vulnerabilities, and risks are fundamental to the role. Additionally, this position ensures adequate security solutions are in place throughout all HHSC IT systems and platforms to mitigate risks sufficiently while also meeting business objectives and regulatory requirements.

This position is responsible for architecting, engineering, implementing, integrating and operationalizing advanced security technologies for cybersecurity initiatives that support the HHS enterprise. This position enhances, and matures cybersecurity architecture and processes in line with business needs. This is accomplished by leveraging industry standards and best practices for the purposes of assessing the current ?as-is? architecture and proposing the desired ?to-be? architecture based on solid risk assessment and evaluation of available technology and controls. Additionally, this position must ensure that HHSC's cybersecurity architecture and processes comply with all statutory and regulatory requirements for information access, security, and privacy. This is a lead position of the cybersecurity department whose responsibilities also include monitoring intrusion prevention systems and acting as an Incident Responder should an event occur. Vulnerability management practices and procedures are used to assess new cyber threats and mitigate risk. The cyber threat landscape is monitored for potential issues with HHSC systems and infrastructure. This position shapes an effective technical IT cybersecurity risk program both near and long term.

Essential Job Functions:
Attends work on a regular and predictable schedule in accordance with agency leave policy and performs other duties as assigned.

1. Leads the Cybersecurity department to develop/improve the overall cybersecurity architecture and plans. (25%)

2. Assesses security threats and vulnerabilities using structured methodologies such as the NIST Cybersecurity Framework. (20%)

3. Refines security monitoring points to defend the cybersecurity architecture. (20%)

4. Responds to cybersecurity incidents which can strike with little forewarning and unfold in ways that no one can predict. (20%)

5. Engages across IT and the business to ensure an understanding of the importance of information security to protect HHSC's data and technology assets. (10%)

6. Other duties as assigned. (Note: For DSHS positions this includes but is not limited to actively participating and/or serving in a supporting role to meet the agency?s obligations for disaster response and/or recovery or Continuity of Operations (COOP) activation. Such participation may require an alternate shift pattern assignment and/or location.) (5%)

Knowledge Skills Abilities:
? Ability to help establish department goals, objectives, and strategies.
? Ability to estimate the financial impact of cybersecurity alternatives.
? Wide breadth of knowledge across security products, tools, and industry trends.
? Ability to create solutions using a pragmatic, risk-based approach.
? Ability to understand legal and regulatory requirements, business drivers, and priorities, and integrate these requirements into overall security design.
? Ability to quickly absorb new concepts and technologies and apply that knowledge to current efforts and plans.
? Thorough knowledge of existing standards, frameworks, models, and methods for developing and implementing security architectures.
? Strong deductive reasoning, critical thinking, problem solving, and prioritization skills.
? In-depth understanding of capabilities deployed in security infrastructures.
? Ability to lead the development and maintenance of tools, procedure, and documentation.
? Understanding of methodologies, architectures, and practices employed to design and implement information sharing environments for supporting agency and inter-agency sharing of cyber security information. .
? Ability to provide thought leadership to technical and managerial personnel including agency executives.
? Thorough knowledge of existing strategies, policies, laws, and regulations related to cybersecurity.
? Thorough knowledge of the security and privacy aspects of cloud computing solutions.
? Thorough knowledge of TCP/IP and networking concepts.
? Ability to prepare and maintain security operating procedures and associated documentation.
? Strong interpersonal and problem solving skills.
? Understanding of malware, emerging threats, attacks, and vulnerability management.
? Skilled in project management and project delivery.
? Strong oral and written communication skills including the ability to independently author a wide range of technical documents.
? Strong service mentality skills including the resolution of stakeholder escalations and incident management.
? Thorough knowledge of interrelationships between critical infrastructure protection and cyber security.
? Thorough knowledge in technical proficiency surrounding CSOC tools and their use by the cybersecurity staff.
? Ability to analyze work related problems, draw evidence-based conclusions, and devise innovative solutions.
? Ability to analyze large data sets and unstructured data for the purpose of identifying trends and anomalies indicative of malicious activity, as well as demonstrated capability to learn and develop new techniques.
? Ability to work in a fast-paced team environment.
? Ability to develop detailed process and procedure documentation.
? Ability to present complex solutions and methods to both technical and non-technical stakeholders.
? Ability to collaborate well with others to solve problems.

Registration or Licensure Requirements:
The preferred level of Professional status includes at least one, but preferably more: CISSP, CISA, CISM, CRISC, CCNP (R&S, Security and/or wifi), CCIE (R&S, Security and/or wifi), AWS Solutions Architect, VMWare certification (design or implementation), GLEG, GSEC, GCFW, GCIA, GCIH, GCWN, GCIM, G7799, GSNA, SNIA/SCSN-E, and/or MCSE-Security or similar certifications. A clear criminal background check is required for this position.

Initial Selection Criteria:
Minimum of 5-plus years of combined experience in information technology, security risk and compliance management, assessment, research and/or consulting. Must have experience working extensively with technologies such as IDS/IPS, SIEM, HIDS/HIPS, AV, and vulnerability scanning. Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field is strongly preferred. Education and experience may be substituted for one another.

Additional Information:
Req ID 484741

MOS Code:
Note: There may be no military occupation(s) that relate to the initial selection criteria and registration or licensure requirements for this position. All active duty military, reservists, guardsmen, and veterans are encouraged to apply if qualified to fill this position. For more information see the Texas State Auditor?s Military Crosswalk at http://www.hr.sao.state.tx.us/Compensation/JobDescriptions.aspx.

HHS agencies use E-Verify. You must bring your I-9 documentation with you on your first day of work.

- Click here to download the I-9 form.

In compliance with the Americans with Disabilities Act (ADA), HHS agencies will provide reasonable accommodation during the hiring and selection process for qualified individuals with a disability. If you need assistance completing the on-line application, contact the HHS Employee Service Center at 1-888-894-4747. If you are contacted for an interview and need accommodation to participate in the interview process, please notify the person scheduling the interview.

Keywords: North Texas State Hospital - Wichita Falls Campus, Wichita Falls , Cybersecurity Operations Manager, Other , Wichita Falls, Texas

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category

Log In or Create An Account

Get the latest Texas jobs by following @recnetTX on Twitter!

Wichita Falls RSS job feeds