INFORMATION SECURITY OFFICER

Posting Details

Security Sensitive Position? Yes Hours of Work 8:00 AM - 5:00 PM M-F
Position Details

Posting Number TSU202326 Official TSU Title INFORMATION SECURITY OFFICER Grant Title N/A Job Description Summary / TWC Summary

Under general supervision serves as the Information Security Officer for Texas Southern University as prescribed by state policy. Plans, coordinates and implements security measures to safeguard information resources. Reviews violations of computer security procedures and coordinates with appropriate authorities to avoid repeat violations. Develops and coordinates the implementation and testing of plans to continue or restore data processing activities in case of disaster. Coordinates with users to establish priority activities according to the important of business. Serves as the institutions Information Security Officer responsible for determining enterprise information security policy and strategy. Oversees the development, implementation, and enforcement of information security standards and procedures. Ensures that all information systems are functional correctly regarding secure policy. In charge of IT risk evaluations, audits, and security incident investigation. Reports relevant information and data regarding information security to the state and oversight agencies.

Essential Duties Summary

• Develops, implements and maintains the university risk management and disaster recovery programs for Information Technology, including managing the periodic testing of the disaster recovery plan designed to protect against the potential effects of disaster.
• Identifies vulnerabilities that may cause inappropriate or accidental access, disclosure, modification or destruction of information; establishes security controls to eliminate or minimize their potential effects.
• Ensures the university critical or sensitive information resources are identified, all information resources are assigned ownership, and that the duties of owners are prescribed.
• Serves as the university’s internal and external point of contact for information security matters, and keeps management aware of legal and regulatory changes affecting information security, privacy and computer crime.
• Manages the development, implementation and testing of security controls and methods; directs efforts for including safeguards in the development or acquisition of automated information systems.
• Ensures user lists are current and auditable; oversees procedures for password control; reports to management on university’s security posture, including problem areas and recommended improvements.
• Ensures proper backup procedures are established and followed; establishes procedures to monitor and ensure compliance with established security and risk management policies and procedures.
• Serves as a liaison with the Texas Department of Information Resources and other relevant oversight agencies, and provides required reporting.
• Coordinates with Internal Audit to develop effective automated information systems relative to information security and risk management.
• Monitors information security controls and protocols and ensures adherence to regulatory and statutory requirements aligned with standardized security frameworks.
• Coordinates with programming and technical managers on matters related to the planning, development, implementation or modification of information security risk management policies and procedures.
• Establishes training programs to ensure that staff are educated and aware of their roles and responsibilities in regards to information security and risk management.
• Performs other job-related duties as assigned.

% FTE

100%

Hiring Range $84,429.00 - $105,536.00 Education

Bachelor’s degree (B.A. or B.S.) or higher in Information Technology, Business or closely related field.

Required Licensing/Certification

Certification as a Certified Information Security Service Professional ( CISSP ) is required. Certification(s) as follows: Certification Information Security Auditor ( CISA ); Certified information Security Manager ( CISM ); Cisco Certified Network Professional ( CCNP ); Cisco Certified Network Associate – Security ( CCNA ) preferred.

Knowledge, Skills, and Abilities

Knowledge of:
• Federal, State, Local, and County laws.
• Policies, procedures, and practices.
• Banner and other Oracle based ERP systems.
• Microsoft Office Professional or similar application.

Skill in:
• Detail oriented.
• Effective customer service.
• Problem-solving and decision-making.
• Multitasking and time management.
• Strong analytical.
• Job-related systems.
• Both verbal and written communication.

Ability to:
• Prepare detailed reports.
• Prepare accurate data.
• Use Banner or similar data base.
• Communicate effectively.

Work Experience

Seven (7) to nine (9) years of directly related experience.

Leadership/Supervisory Responsibilities

Leads work in similar jobs and/or provides leadership and direction for employees and student workers.

Work Complexity/Budget Authority

N/A

Independent Judgment/Decision Making/Problem Solving Skills

N/A

Personal/Organizational Contacts

N/A

Customer Service Relationships

N/A

Working/Environmental Conditions

Routine office environment.
Sitting or standing in one location much of the time.
Some stooping, lifting or carrying objects light weight may be required.
Use of video display terminal.

Desired start date Position End Date (if temporary)
UA EEO Statement

It is the policy of Texas Southern University to provide a work environment that is free from discrimination for all persons regardless of race, color, religion, sex, age, national origin, individuals with disability, sexual orientation, or protected veteran status in its programs, activities, admissions or employment policies. This policy of equal opportunity is strictly observed in all University employment-related activities such as advertising, recruiting, interviewing, testing, employment training, compensation, promotion, termination, and employment benefits. This policy expressly prohibits harassment and discrimination in employment based on race, color, religion, gender, gender identity, genetic history, national origin, individuals with disability, age, citizenship status, or protected veteran status. This policy shall be adhered to in accordance with the provisions of all applicable federal, state and local laws, including, but not limited to, Title VII of the Civil Rights Act.

Manual of Administrative Policies and Procedures

Close Date Open Until Filled (overrides close field) Yes Special Instructions to Applicants Open to all applicants. Posting Supplemental Questions

Required fields are indicated with an asterisk (*).

  1. * Do you have a Bachelor’s degree (B.A. or B.S.) or higher in Information Technology, Business or closely related field?
    • Yes
    • No
  2. * Do you have seven (7) to nine (9) years of directly related experience?
    • Yes
    • No
  3. * Do you have a Certification as a Certified Information Security Service Professional (CISSP)?
    • Yes
    • No
  4. * Do you have any of the following certifications? Certification Information Security Auditor (CISA); Certified information Security Manager (CISM); Cisco Certified Network Professional (CCNP); Cisco Certified Network Associate – Security (CCNA)
    • Yes
    • No
Applicant Documents
Required Documents
  1. Resume
  2. Cover Letter/Letter of Application
  3. Official Transcripts
Optional Documents
  1. Other Document
  2. Reference Letter 1
  3. Reference Letter 2
  4. Reference Letter 3


Similar jobs

Similar jobs