What are the responsibilities and job description for the Cyber Security Operation Lead position at Dash Technologies Inc.?
Short Description:
Alabama Department of Human Resources seeks an experienced cybersecurity professional to lead and maintain the agency-wide IT Security program. This role is critical in ensuring the protection of the organization's information.
Job Description:
The Cyber Security Engineer identifies threats and vulnerabilities in systems and software and then applies their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats, and all types of cybercrime.
PREFERRED QUALIFICATIONS:
- Bachelor’s degree in a relevant field.
- 7–10 years of experience in information security or a related field, including leadership roles.
- Hands-on experience in risk management, incident response, vulnerability assessment, and security architecture.
- Strong knowledge of infrastructure systems is a plus.
- Familiarity with NIST standards is a plus but not required.
- Relevant certifications in cybersecurity are a plus (e.g., CISSP, CISM, CISA).
- Familiarity with technologies such as Splunk, SolarWinds, and Azure Arc is desirable.
- Firewall knowledge is a plus.
Including but not limited to
1. Develop and Oversee Security Programs
- Create and maintain an agency-wide IT security program.
- Ensure alignment with applicable regulations and industry best practices.
- Running point on all incident response.
2. Policy and Compliance
- Develop and enforce security policies, procedures, and control techniques.
- Ensure compliance with directives from the Office of Information Technology, Internal Revenue Service (IRS), Social Security Administration (SSA), and agency-specific requirements.
3. Risk Management
- Assess risks to information systems and data.
- Implement cost-effective measures to reduce risks to acceptable levels.
4. Incident Response
- Detect, report, contain, and mitigate cybersecurity incidents.
- Coordinate incident response efforts with the Agency's Safeguards Coordinator and federal entities like the IRS and SSA.
5. Continuous Monitoring
- Oversee automated and continuous monitoring of systems for vulnerabilities and threats.
6. Strategic Integration
- Ensure security processes are integrated into strategic, budgetary, and operational planning.
7. Collaboration
- Work closely with the Agency CIO, senior deputies, and staff to enhance security measures.
- Participate in inter-agency councils, such as the OIT Security Council, to align security strategies.
- There will be 6 staff that will directly report to this resource (System Administrators and mainframe security personnel).