Job Posting for Manager Information Technology Services 1 (Information Security) Ref #17321 at Information Technology Services, Office of
Bachelor’s degree* and five years of information technology experience, including three years of information security or information assurance experience.
Appropriate information security or information assurance experience may substitute for the bachelor’s degree on a year-for-year basis; an associate’s degree requires an additional two years of information technology, information security, or information assurance experience. Experience solely in information security or information assurance may substitute for the general information technology experience.
Bachelor's Degree with a concentration or major in Information Security, Cyber Security, Digital Forensics, Information Assurance, or a related field.
Certifications in one or more of the following:
o Computer Network Defense (e.g., GCIA, GCED, GDAT, GPPA, GCDA, GMON, GWEB, CND, ECIH, GCIH)
o Cyber Threat Intelligence (e.g., CTIA, GCTI, CCIP, CSTIR)
o Digital Forensics (e.g., ACE, GCFA, GCFE, GREM, GNFA)
o Information Security Management (e.g., GSLC, GSTRT, GCEIT, CISM, CCISO)
o Penetration Testing (e.g., GPEN, CEH, GAWN, GWAPT, LPT)
o Certified Information Systems Security Professional (CISSP)
4 years’ experience in technical writing
3 years’ experience in the following:
o leading a team in related work
o applying and implementing network and/or system security
o information security incident response
o cyber digital forensics
o log analysis (e.g., firewall logs, DNS logs, proxy logs, IPS/IDS logs)
o SIEM technologies to support in-depth investigations
o using computer security investigation tools (e.g. FTK).
2 years’ experience in penetration testing.
Possess a working knowledge of the following:
o computer networks, intrusion detection systems, routers, firewalls, operating systems, network vulnerability assessments, web application vulnerability assessments, computer programming and scripting
o network security solutions (e.g., intrusion detection/prevention systems, firewalls)
o system administration
o vulnerability management
o computer programming and scripting
o Information Security (CIA triad, Information Classification, Risk Management, Incident Response, Vulnerability Management, Security Architecture & Engineering)
o government security and privacy mandates/regulatory compliance (e.g., HIPAA, PCI, IRS Pub 1075, CJIS)
Excellent oral and written communication skills including the ability to clearly articulate information technology and information security concepts to a varied audience to facilitate wide understanding.
Demonstrated critical thinking, problem solving and analytical skills.
Under the direction of the senior team members within the Chief Information Security Office/Cyber Command Center/Cyber Incident Response Team (CIRT) Section, the position will manage and perform incident response and digital forensic activities as part of cyber incident investigations. The position is responsible for directing, supervising, and engaging in cyber incident response and digital forensic activities as a team lead and assisting with the management and support of the CIRT. The incumbent will ensure coordination of processes between all staff under their purview and will engage in activities to protect and defend New York State’s infrastructure. In addition, the position will act as a liaison to other stakeholders to ensure that systematic activities follow NYS policy and standard and are coordinated among required teams.
The position requires analytical expertise and experience related to cyber security threats and protective measures. The incumbent must demonstrate attention to detail and critical thinking. The incumbent must be able to communicate clearly with subordinate staff regarding work priorities and performance. The incumbent will have to work with other CIRT and IT teams and upper-level management to resolve technically complex and politically sensitive issues under pressure. The incumbent will be expected to be available during off-shift hours to manage response to cyber-attacks and intrusions and is expected to work without direct supervision.
Specific duties include, but are not limited to:
Serves as subject matter expert in cyber security incident response.
Direct, supervise, and perform in-depth analysis (e.g., logs analysis, packet capture analysis, malware reverse engineering) during cyber investigations and oversees related tasks for subordinate team members.
Coordinates response efforts with internal (e.g., HR, Legal) and external organizations (e.g., law enforcement, inspector general).
Ensures establishment of root cause and remediation recommendations.
Perform root cause validation to confirm risk and impact of compromise by modeling adversary attack methods against a defined system.
Selects and masters use of specialized computer investigation tools (e.g., Encase, FTK data), techniques, and procedures.
Oversees and participates in analysis of digital evidence including laptop, desktop, servers, phones etc. and production of forensic reports with documented findings.
Ensures the proper collection, seizure, and handling of digital or physical evidence while maintaining and documenting an appropriate chain of custody to maintain integrity.
Identifies elements discovered during investigations for their potential use as evidence in criminal or other investigations.
Testifies in court/administrative proceedings regarding analytical processes and findings.
Manage staff and resources dedicated to the team and section.
Monitor work progress and manages workload assignments of the team.
Perform all phases of maintenance and support of digital forensics lab infrastructure and manage related tasks for subordinate team members. This will include but not limited to evidence handling, tracking evidence inventory, configuring network equipment, updating software etc.
Ensure the development, maintenance, and adherence to written standard operating procedures and related processes.
Ensure the development, maintenance, and adherence to workflows to enhance productivity of the unit.
Oversee and participate in creation of written technical reports and executive summaries related to cyber security incidents and events.
Monitor external data sources to maintain currency of threat condition and potential impact on enterprise.
Researches and demonstrates emerging threats and vulnerabilities within the security lab to provide proactive defensive measures to technical teams for mitigation of risk.
Identifies and models new threat scenarios.
Provides training and guidance and acts as a mentor to subordinate team members.
Develop and maintain operational metrics related to quality, accuracy and timeliness of incident response efforts.
Develops and delivers presentations regarding cyber security threats and response and remediation efforts.
Performs the full range of administrative responsibilities, including performance evaluations, time sheet approval, etc.
Maintains an adequate level of current knowledge and proficiency in information security through annual Continuing Professional Education (CPE) credits directly related to information security.
Supports CISO project initiatives and all other projects as assigned.