first_imgPosting Details Education Job Description Summary / TWC Summary Grant TitleN/A Security Sensitive Position?Yes Knowledge, Skills, and Abilities Required Licensing/Certification Official TSU TitleINFORMATION SECURITY OFFICER Desired start date Routine office environment.Sitting or standing in one location much of the time.Some stooping, lifting or carrying objects light weight may berequired.Use of video display terminal. Special Instructions to ApplicantsOpen to all applicants. * Do you have a Certification as a Certified InformationSecurity Service Professional (CISSP)?YesNo * Do you have a Bachelor’s degree (B.A. or B.S.) or higher inInformation Technology, Business or closely related field?YesNo Position End Date (if temporary) * Do you have seven (7) to nine (9) years of directly relatedexperience?YesNo UA EEO Statement Hours of Work8:00 AM – 5:00 PM M-F Certification as a Certified Information Security ServiceProfessional ( CISSP ) is required. Certification(s) as follows:Certification Information Security Auditor ( CISA ); Certifiedinformation Security Manager ( CISM ); Cisco Certified NetworkProfessional ( CCNP ); Cisco Certified Network Associate – Security( CCNA ) preferred. Position Details Open Until Filled (overrides close field)Yes Bachelor’s degree (B.A. or B.S.) or higher in InformationTechnology, Business or closely related field. Seven (7) to nine (9) years of directly related experience. Work Experience Close Date 100% Under general supervision serves as the Information SecurityOfficer for Texas Southern University as prescribed by statepolicy. Plans, coordinates and implements security measures tosafeguard information resources. Reviews violations of computersecurity procedures and coordinates with appropriate authorities toavoid repeat violations. Develops and coordinates theimplementation and testing of plans to continue or restore dataprocessing activities in case of disaster. Coordinates with usersto establish priority activities according to the important ofbusiness. Serves as the institutions Information Security Officerresponsible for determining enterprise information security policyand strategy. Oversees the development, implementation, andenforcement of information security standards and procedures.Ensures that all information systems are functional correctlyregarding secure policy. In charge of IT risk evaluations, audits,and security incident investigation. Reports relevant informationand data regarding information security to the state and oversightagencies. Knowledge of:• Federal, State, Local, and County laws.• Policies, procedures, and practices.• Banner and other Oracle based ERP systems.• Microsoft Office Professional or similar application.Skill in:• Detail oriented.• Effective customer service.• Problem-solving and decision-making.• Multitasking and time management.• Strong analytical.• Job-related systems.• Both verbal and written communication.Ability to:• Prepare detailed reports.• Prepare accurate data.• Use Banner or similar data base.• Communicate effectively. Hiring Range$84,429.00 – $105,536.00 • Develops, implements and maintains the university risk managementand disaster recovery programs for Information Technology,including managing the periodic testing of the disaster recoveryplan designed to protect against the potential effects ofdisaster.• Identifies vulnerabilities that may cause inappropriate oraccidental access, disclosure, modification or destruction ofinformation; establishes security controls to eliminate or minimizetheir potential effects.• Ensures the university critical or sensitive informationresources are identified, all information resources are assignedownership, and that the duties of owners are prescribed.• Serves as the university’s internal and external point of contactfor information security matters, and keeps management aware oflegal and regulatory changes affecting information security,privacy and computer crime.• Manages the development, implementation and testing of securitycontrols and methods; directs efforts for including safeguards inthe development or acquisition of automated informationsystems.• Ensures user lists are current and auditable; oversees proceduresfor password control; reports to management on university’ssecurity posture, including problem areas and recommendedimprovements.• Ensures proper backup procedures are established and followed;establishes procedures to monitor and ensure compliance withestablished security and risk management policies andprocedures.• Serves as a liaison with the Texas Department of InformationResources and other relevant oversight agencies, and providesrequired reporting.• Coordinates with Internal Audit to develop effective automatedinformation systems relative to information security and riskmanagement.• Monitors information security controls and protocols and ensuresadherence to regulatory and statutory requirements aligned withstandardized security frameworks.• Coordinates with programming and technical managers on mattersrelated to the planning, development, implementation ormodification of information security risk management policies andprocedures.• Establishes training programs to ensure that staff are educatedand aware of their roles and responsibilities in regards toinformation security and risk management.• Performs other job-related duties as assigned. It is the policy of Texas Southern University to provide a workenvironment that is free from discrimination for all personsregardless of race, color, religion, sex, age, national origin,individuals with disability, sexual orientation, or protectedveteran status in its programs, activities, admissions oremployment policies. This policy of equal opportunity is strictlyobserved in all University employment-related activities such asadvertising, recruiting, interviewing, testing, employmenttraining, compensation, promotion, termination, and employmentbenefits. This policy expressly prohibits harassment anddiscrimination in employment based on race, color, religion,gender, gender identity, genetic history, national origin,individuals with disability, age, citizenship status, or protectedveteran status. This policy shall be adhered to in accordance withthe provisions of all applicable federal, state and local laws,including, but not limited to, Title VII of the Civil RightsAct.Manual of Administrative Policies andProcedures % FTE Applicant DocumentsRequired DocumentsResumeCover Letter/Letter of ApplicationOfficial TranscriptsOptional DocumentsOther DocumentReference Letter 1Reference Letter 2Reference Letter 3 Working/Environmental Conditions Essential Duties Summary * Do you have any of the following certifications?Certification Information Security Auditor (CISA); Certifiedinformation Security Manager (CISM); Cisco Certified NetworkProfessional (CCNP); Cisco Certified Network Associate – Security(CCNA)YesNo Posting NumberTSU202326 Posting Supplemental QuestionsRequired fields are indicated with an asterisk (*).last_img read more