INFORMATION SECURITY MANAGER - 72004188 1

State of Florida
2d$85,000 - $92,000Onsite

About The Position

This position functions as the Department of Management Services’ (DMS) Information Security Manager (ISM) and follows the security guidelines established in F. S. Section 282.318 and Rule 60GG-2 Florida Administrative Code. The ISM is responsible for: Managing daily cybersecurity operations in coordination with the Incident Responders, Application & Security Officer, Chief Information Officer, DMS Leadership, and other key mission partners. Overseeing the Department’s security awareness program. Establishing and maintaining an information security program that includes information security policies, procedures, standards, and guidelines. Managing the Department’s information security risk management process, including the comprehensive Risk Assessment required by Section 282.318, F.S. Coordinate and document remediation actions in response to identified risks, including but not limited to: audit findings, common vulnerabilities and exposures, security alerts and notifications, threat intelligence, risk assessments, security assessments, and penetration testing. Completing the Department’s strategic and operational cybersecurity plan in accordance with Rule 60GG-2 F.A.C. Administering the Department’s Incident Response Team operations, playbooks, and procedural documentation and a disaster recovery program that aligns with the Agency’s COOP Plan. Creating and maintaining the agency's security architecture design with a focus on increasing network and information system resilience. Conducting security assessments on new hardware and software solutions before these products are connected to DMS resources. Assist with the selection, acquisition, and deployment of new security solutions. This will require adherence to the DMS procurement process. Fulfilling all security and incident notification and reporting requirements in DMS policies, procedures, legal and statutory requirements.

Requirements

  • Demonstrated experience and leadership running cybersecurity operations and incident response at a large private, public, defense, or government organization.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Strong organization skills necessary to manage and coordinate across multiple teams with varying levels of technical and non-technical understanding of incident response activities.
  • A strong understanding of network and cloud security concepts.
  • Coordinate with other OIT and Division IT teams to ensure effective security protections are in place and foster teamwork and cooperation.
  • Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner.
  • Ability to collect and analyze security incident artifacts across several technology platforms and tools
  • Develop and publish security incident analysis reports.
  • Deep and wide knowledge of cybersecurity concepts, operations, and cybersecurity tools.
  • Expert knowledge of industry best practices and frameworks (e.g. NIST, MITRE ATT&CK)
  • Accountability, Communication, Empowerment, Flexibility, Integrity, Respect, and Teamwork
  • Experience with cloud security governance (Azure/AWS/GCP), identity management, and Zero Trust Architecture.
  • Experience managing security program metrics, dashboards, and reporting to agency leaders (or organizational leaders for private sector applicants).
  • Ability to oversee vendor risk and supply chain security evaluations.
  • Experience overseeing SOC operations, threat hunting teams, and security engineering teams.
  • Working knowledge of modern security tooling categories: SIEM, SOAR, EDR/XDR, CSPM, IAM governance, and vulnerability management platforms.
  • Experience managing secure SDLC principles and application security testing practices.
  • 5 years of experience with cybersecurity operations as part of an information security management team.
  • Minimum of 3 years in a management or team lead position, with a proven track record of supervising security analysts or technical staff.
  • At least 2 years of experience in a technical leadership role requiring direct communication, status updates, and presentation of security risks to Agency leadership or executive staff.
  • Experience in the design and maintenance of enterprise security architecture and the creation of comprehensive security documents, including policies, standards, and baselines.
  • Experience in developing and maintaining Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP).

Nice To Haves

  • The following certifications are preferred: CISSP, CISM, CCSP, GIAC, GSLC, CGCCC, or equivalent certifications.
  • Undergraduate degree in a relevant technology related field.

Responsibilities

  • Managing daily cybersecurity operations in coordination with the Incident Responders, Application & Security Officer, Chief Information Officer, DMS Leadership, and other key mission partners.
  • Overseeing the Department’s security awareness program.
  • Establishing and maintaining an information security program that includes information security policies, procedures, standards, and guidelines.
  • Managing the Department’s information security risk management process, including the comprehensive Risk Assessment required by Section 282.318, F.S.
  • Coordinate and document remediation actions in response to identified risks, including but not limited to: audit findings, common vulnerabilities and exposures, security alerts and notifications, threat intelligence, risk assessments, security assessments, and penetration testing.
  • Completing the Department’s strategic and operational cybersecurity plan in accordance with Rule 60GG-2 F.A.C.
  • Administering the Department’s Incident Response Team operations, playbooks, and procedural documentation and a disaster recovery program that aligns with the Agency’s COOP Plan.
  • Creating and maintaining the agency's security architecture design with a focus on increasing network and information system resilience.
  • Conducting security assessments on new hardware and software solutions before these products are connected to DMS resources.
  • Assist with the selection, acquisition, and deployment of new security solutions. This will require adherence to the DMS procurement process.
  • Fulfilling all security and incident notification and reporting requirements in DMS policies, procedures, legal and statutory requirements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service