Manages a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities.
Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Manages the security integration plans to protect existing infrastructure and to incorporate future solutions. Reviews and implements action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Partners and collaborates with stakeholders to encourage the adoption of security-compatible software designs and best practices. Keeps abreast of the latest intelligence from law enforcement and other sources of cyber threat information.
| Job Title | Job Description | |
|---|---|---|
| 1 | Information Systems Architect V | The Information Systems Architect V designs systems to consider functional requirements, scalability, and security. Responsible for the architectural design, development, and deployment of an organization's overall IT systems. Being an Information Systems Architect V researches, identifies, selects, and tests technology products required for solution delivery. Defines system solutions based on user needs, cost, and required integration with existing applications, systems, or platforms. In addition, Information Systems Architect V establishes, implements, and documents technology integrations or migration strategies. Requires a bachelor's degree. Typically reports to a manager. Being an Information Systems Architect V works autonomously. Goals are generally communicated in "solution" or project goal terms. May provide a leadership role for the work group through knowledge in the area of specialization. Works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge. Working as an Information Systems Architect V typically requires 10+ years of related experience. |
| 2 | Cyber Infrastructure Security Manager | The Cyber Infrastructure Security Manager researches and evaluates new or improved security measures to implement for Web systems' security. Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Being a Cyber Infrastructure Security Manager typically reports to a manager or head of a unit/department. Requires a bachelor's degree. The Cyber Infrastructure Security Manager typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Capable of resolving escalated issues arising from operations and requiring coordination with other departments. Working as a Cyber Infrastructure Security Manager typically requires 3+ years of managerial experience. |
| 3 | Software Research and Design Architect IV | The Software Research and Design Architect IV analyzes software requirements and defines system components to ensure efficient and scalable software architecture. Responsible for the structural design and development of new software systems or extensive software revisions for external customers. Being a Software Research and Design Architect IV creates and maintains architecture documentation such as design specifications and diagrams to guide future maintenance and development. Designs and implements software solutions to consider business and technical needs and ensures compatibility with existing systems. In addition, Software Research and Design Architect IV works with non-technical stakeholders to analyze requirements and understand constraints, dependencies, and business needs. Has in-depth knowledge of software development processes and methodologies. Requires a bachelor's degree. Typically reports to a manager. Being a Software Research and Design Architect IV work is highly independent. May assume a team lead role for the work group. A specialist on complex technical and business matters. Working as a Software Research and Design Architect IV typically requires 7+ years of related experience. |
| 4 | Client/Server Analyst and Architect | The Client/Server Analyst and Architect analyzes client/server requirements to ensure the system meets performance needs. Provides expert judgment and analysis for the design, development and implementation of client/server systems. Being a Client/Server Analyst and Architect requires a bachelor's degree in area of specialty. Recommends technology purchases that will support and enhance the client/server system. In addition, Client/Server Analyst and Architect is familiar with relational databases and client-server concepts. Typically reports to a manager or head of a unit/department. Working as a Client/Server Analyst and Architect typically requires 7+ years of related experience. A specialist on complex technical and business matters. Work is highly independent. May assume a team lead role for the work group. |
| 5 | Cyber Security Systems Designer I | The Cyber Security Systems Designer I defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Being a Cyber Security Systems Designer I designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. In addition, Cyber Security Systems Designer I utilizes a variety of security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in designs. Partners with stakeholders to encourage the adoption of security-compatible software designs and best practices. Keeps abreast of the latest intelligence from law enforcement and other sources of cyber threat information. Typically requires a bachelor's degree in computer science or engineering or equivalent. May require security certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM). Typically reports to a manager or head of a unit/department. Being a Cyber Security Systems Designer I occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. Working as a Cyber Security Systems Designer I typically requires 2 -4 years of related experience. |
| Skills | Proficiency Level |
|---|---|
| Information Technology Trends | Level 3 |
| Budgeting | Level 3 |
| Goal Setting | Level 3 |