Cyber Security Manager

State of North Carolina
3d

About The Position

Unleash your potential and make an impact! This is an INTERNAL POSTING open ONLY to current employees of the NC Department of Public Safety and eligible RIF candidates. Temporary employees are also eligible to apply. The IT Security and Compliance Specialist II is responsible for leadership and oversight of organization-wide cybersecurity and compliance efforts, ensuring alignment with industry standards and regulations. Responsibilities include developing and implementing advanced security measures and protocols, such as network control mechanisms and application access controls, to safeguard against unauthorized access and cyber threats. Additionally, the Specialist II will conduct comprehensive security scans on network systems, application systems, and other computer equipment. Strategic contributions will extend to the tactical development and implementation of risk management, business continuity planning, and disaster recovery plans. The incumbent will be instrumental in identifying, analyzing, and mitigating threats to internal IT systems and networks, leveraging advanced techniques and technologies. This role will involve driving the testing, implementation, deployment, maintenance, and review of infrastructure hardware and software to effectively manage network and security resources. Proactively monitors networks to detect and remediate unauthorized activities, responding swiftly to crises or urgent situations to mitigate potential threats as well as perform in-depth assessments of systems and networks, identifying deviations from acceptable configurations, agency policies, and regulatory requirements. Execute Defensive Cyberspace operations to support mission requirements as directed by senior leadership. Provide mentorship and guidance to junior team members, fostering their professional development and enhancing overall team capabilities. This is a full-time position (40 hours per week) with State Benefits, including paid vacation, paid sick leave, paid holidays, retirement, and health insurance. To view an example of total compensation, please click here NC OSHR: Total Compensation Calculator.

Requirements

  • Bachelor’s degree in computer science or a related IT field or closely related field from an appropriately accredited institution and two years of progressive experience in IT Security or closely related area; or Associate degree in computer science or a related IT field or closely related field from an appropriately accredited institution and three years of progressive experience in IT security or closely related area; or an equivalent combination of education and experience.

Nice To Haves

  • Experience with vulnerability databases like CVE, NVD, and exploit databases to keep up with the latest threats.
  • Experience in reverse engineering to analyze malware and the development of custom exploits.
  • Experience conducting complex penetration tests on networks, applications, and systems, identifying vulnerabilities and assessing their potential impact.

Responsibilities

  • Developing and implementing advanced security measures and protocols, such as network control mechanisms and application access controls, to safeguard against unauthorized access and cyber threats.
  • Conduct comprehensive security scans on network systems, application systems, and other computer equipment.
  • Tactical development and implementation of risk management, business continuity planning, and disaster recovery plans.
  • Identifying, analyzing, and mitigating threats to internal IT systems and networks, leveraging advanced techniques and technologies.
  • Driving the testing, implementation, deployment, maintenance, and review of infrastructure hardware and software to effectively manage network and security resources.
  • Proactively monitors networks to detect and remediate unauthorized activities, responding swiftly to crises or urgent situations to mitigate potential threats as well as perform in-depth assessments of systems and networks, identifying deviations from acceptable configurations, agency policies, and regulatory requirements.
  • Execute Defensive Cyberspace operations to support mission requirements as directed by senior leadership.
  • Provide mentorship and guidance to junior team members, fostering their professional development and enhancing overall team capabilities.

Benefits

  • paid vacation
  • paid sick leave
  • paid holidays
  • retirement
  • health insurance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service