Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities.
Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in action plan designs. Reviews current architectures and systems to ensure consistency and compliance with the organization’s guidelines, policies, and standards. Keeps abreast of the latest cyber threat information.
Job Title | Job Description | |
---|---|---|
1 | Data and Information Architect II | The Data and Information Architect II develops strategies for warehouse implementation, data acquisition and access, and data archiving and recovery. Designs and builds relational databases for data storage or processing. Being a Data and Information Architect II may evaluate new data sources for adherence to the organization's quality standards and ease of integration. Builds data models and defines the structure, attributes and nomenclature of data elements. In addition, Data and Information Architect II typically requires a bachelor's degree. Typically reports to a supervisor or manager. Being a Data and Information Architect II gains exposure to some of the complex tasks within the job function. Occasionally directed in several aspects of the work. Working as a Data and Information Architect II typically requires 2 to 4 years of related experience. |
2 | Information Systems Architect V | The Information Systems Architect V designs systems to consider functional requirements, scalability, and security. Responsible for the architectural design, development, and deployment of an organization's overall IT systems. Being an Information Systems Architect V researches, identifies, selects, and tests technology products required for solution delivery. Defines system solutions based on user needs, cost, and required integration with existing applications, systems, or platforms. In addition, Information Systems Architect V establishes, implements, and documents technology integrations or migration strategies. Requires a bachelor's degree. Typically reports to a manager. Being an Information Systems Architect V works autonomously. Goals are generally communicated in "solution" or project goal terms. May provide a leadership role for the work group through knowledge in the area of specialization. Works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge. Working as an Information Systems Architect V typically requires 10+ years of related experience. |
3 | Intermediate Network Engineer | The Intermediate Network Engineer troubleshoots the network issues with diverse scope. Installs, maintains and evaluates network systems and communications. Being an Intermediate Network Engineer must have extensive knowledge of Internet, computer, routers, switches, firewall, etc. Typically requires a bachelor's degree of computer science, or engineering or its equivalent. Assists network architecture design, feasibility and cost studies. In addition, Intermediate Network Engineer typically reports to a manager. Being an Intermediate Network Engineer gains exposure to some of the complex tasks within the job function. Occasionally directed in several aspects of the work. Working as an Intermediate Network Engineer typically requires 2 to 4 years of related experience. |
4 | Cyber Infrastructure Security Manager | The Cyber Infrastructure Security Manager researches and evaluates new or improved security measures to implement for Web systems' security. Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Being a Cyber Infrastructure Security Manager typically reports to a manager or head of a unit/department. Requires a bachelor's degree. The Cyber Infrastructure Security Manager typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Capable of resolving escalated issues arising from operations and requiring coordination with other departments. Working as a Cyber Infrastructure Security Manager typically requires 3+ years of managerial experience. |
5 | Database Engineer, Intermediate | The Database Engineer, Intermediate assists with the implementation and design of the databases. Assists in the planning and engineering of an organization's databases. Being a Database Engineer, Intermediate evaluates existing database design to determine necessary updates and integration requirements of new design, and to ensure final solutions meet organizational needs. Monitors the performance, scalability and security. In addition, Database Engineer, Intermediate requires comprehensive knowledge of database technologies, along with solid coding and computer system skills. Typically requires a bachelor's degree. Typically reports to a manager. Being a Database Engineer, Intermediate gains exposure to some of the complex tasks within the job function. Occasionally directed in several aspects of the work. Working as a Database Engineer, Intermediate typically requires 2 to 4 years of related experience. |
Skills | Proficiency Level |
---|---|
Risk Management | Level 2 |
Analytical Thinking | Level 3 |
Attention to Detail | Level 3 |