|Preferred GIAC Certifications||GCIH, GSLC, GICSP, GSTRT|
|Salary||$104,707 - $166,400|
IT Security Architecture & Operation Manager is responsible for developing and implementing plans to improve organization IT and OT Security, managing Information Security Operations staff and services including Cyber Incident Response, and communicating IT and OT Security Program status and metrics to the Director of IT Cybersecurity. Ensure regulatory compliance including applicable NIST frameworks, PCI-DSS, AWIA, FERC, HIPAA, HB18-1128, and industry best practices and standards.
This position has formal supervisory responsibilities over other employees.
Essential Duties and Responsibilities
Apply knowledge of cybersecurity management frameworks such as NIST CSF, ISA/IEC 62443, and CIS Critical Security Controls to track program metrics.
Maintain knowledge of the latest IT and OT threats, vulnerabilities, exploits, and risks.
Design, implement, measure and improve Cyber Incident Response capability including establishing roles, tools and procedures for preparation, detection and analysis, containment, eradication and recovery.
Coordinate Cyber Incident Response planning, training, communication, situational exercises, tabletops and lessons learned, across the organization and with local, state and regional government organizations and strategic partners.
Create Secure Architecture guidelines utilizing established principles of minimization, separation of duty, least privilege, least access, audit logging, and continuous monitoring.
Assess, monitor, and report on system, software, service, and supply chain risk.
Serve as high-level technical expert in guiding teams in solving complex business or system problems.
Write IT Security policies, standards, and procedures under supervision of the Director of Cybersecurity.
Prepare System Security Plans, Information Security documentation and artifacts in support of Information Security audits – HIPAA, AWIA, FERC, PCI-DSS, NIST.
Determine Information Security Team service catalog and solutions support capability.
Develop and manage annual team budget including technology platforms, staffing, training and professional services.
Train, mentor, and coach personnel; identify areas of improvement and opportunity to grow and improve information security capability with both technical and non-technical skills.
Perform project initiation, planning, proposal development, vendor contract negotiations, contract administration, estimating, scheduling, forecasting, vendor management, project budget management.
Oversee the design, testing, implementation, and documentation to ensure production schedules and service levels are met.
Design and implement highly technical long-term strategic goals and short-term tactical plans that align with the business needs.
Perform related work as required.
Education and Experience
Bachelor’s Degree from an accredited college or university in Computer Science or a related field.
Minimum 8 years of related work experience and 4 years of progressive leadership experience preferred.
Any equivalent combination of certifications, education, or experience that provides the required skills, knowledge, and abilities for the position.
Licenses, Registration, and Certifications
GIAC Security Leadership Certification (GSLC), GIAC Strategic Planning, Policy and Leadership (GSTRT), GIAC Critical Controls Certification (GCCC), GIAC Certified Enterprise Defender (GCED), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) or other relevant certification preferred.
Must be able to possess and maintain a valid Class ‘R’ Colorado driver’s license and have a satisfactory driving record.
Must complete required HIPAA training within the first 6 months of hire.
Physical, Behavioral, and Environmental Exposures
See IT Security Architect & Operations Manager Job Analysis
Organization and staff management skills.
Problem solving and analysis.
Skill in determining how changes in conditions, operations, or the environment will affect network and system security.
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
Knowledge of network access, identity, and access management (e.g., public key infrastructure, OAuth, OpenID, SAML, SPML).
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of an organization's information classification program and procedures for information protection.
Knowledge of multi-level security systems and cross domain solutions.
Knowledge of Windows, Linux, Unix, MacOS, iOS and Android operating systems.
Knowledge of Cloud Computing architecture, access management and principles
Knowledge of Active Directory and Azure AD.
Denver Water is an Equal Opportunity Employer.