- Performs risk assessments and recommends security measures.
- Monitors security systems for possible intrusion.
- Interacts with end users concerning virus, spam, and any other information security issues.
- Reviews and creates audit reports on user and system activities.
- Tests security measures to reduce and mitigate risk.
- Actively probes the network for new threats and risks.
- Monitors security alerts on internet and determines whether reported threats could impact information or telecommunication systems.
- Provides technical consulting to other groups on security requirements. Implements and ensures technical security compliance solutions for NERC, PCI, FBI CJIS and other regulatory requirements.
- Creates and delivers security training materials and classes for asset owners, software developers and system administrators.
- Provides oversight regarding compliance with security regulations, standards and laws.
- Performs work by traveling independently or with a small team to various locations (substations, power plants, water systems, etc.) as scheduled.
Physical demands:
- Work involves frequent finger/hand manipulation in using a keyboard and mouse
Knowledge, skills and abilities::
- Knowledge of business continuity planning and disaster recovery
- knowledge of anti-virus and anti-spam technologies
- Knowledge of technology asset management
- Knowledge of technology hardware and software platforms and systems
- Skill in analytical and technical documentation
- Skill in verbal and written communication
- Skill in articulating complex, technical information to both technical and non-technical audiences
- Skill in analyzing significant volumes of detailed information and understanding the security implications
- Skill in understanding complex systems across diverse technical platforms
- Intermediate skill level in Microsoft office and software update tools
- Intermediate skill level in anti-virus, anti-spam, secure content, network security and web filtering software
- Intermediate skill level in security vulnerability scanning tools
- Ability to balance and manage competing high priority work demands
- Ability to build relationships and foster teamwork
- Ability to work in a team environment
- Ability to conduct sensitive security investigations and maintain confidentiality
Minimum qualifications:
Nine or more years of experience in information systems security. A degree(s) in information technology, computer science or relevant field may be substituted per LCRA guidelines for certain years of experience.
Work environment:
- Work hours are spent in an office environment
- Work involves weekends, holidays and non-standard hours
- Work involves providing 24/7/365 on-call support on a rotating basis
- Work involves traveling and lodging out of town
All your information will be kept confidential according to EEO guidelines.
Look for: Cynthia
Phone: 346 231 7545
Email: c.nicholas@computerfutures .com