Salt River Pima-Maricopa Indian Community

Scottsdale, Arizona, United States

Senior It Cybersecurity Analyst

Posted over 1 month ago

Sorry, this job has expired.

Job Description

Definition

Under general supervision of the IT Director/CIO, assumes responsibility for the implementation and maintenance of security processes and technology improvements in support of the organization's Cyber security Strategic Plan. Works cohesively with the IT teams and divisions to conduct risk assessments, administer and audit security systems. As a member of the security team develops, implements and maintains security architecture design and maintains the technologies and processes that support continuous security improvements. This job class is treated as FLSA Exempt.

Essential Functions : Essential functions may vary among positions and may include the following tasks and other characteristics. This list of tasks is ILLUSTRATIVE ONLY and is not intended to be comprehensive listing of tasks performed by all positions in this classification.

Examples of Tasks

1. Mentoring, Supervision & Leadership: Mentors security team staff so they attain the technical skills and customer service skills along with experience necessary to perform independently and attain further career progression goals.
  • Ensures cross-functional training of staff to ensure that primary and secondary support personnel are properly trained to support division services.
  • Assists with the routine supervision of assigned staff. Prioritizes and coordinates staff workflow and provides training and assistance as needed.
  • Helps establish criteria for employee performance evaluations based on division and department goals and objectives.
  • Helps prioritize and coordinate staff workflow and provides training and assistance as needed.
  • Provides senior leadership to the Security Team staff and works closely with other IT divisions to establish and enforce IT standards. Evaluates and recommends best in class standards and processes.


2. Security Team Member: Participates as a key member of the security team in setting organizational security direction.
  • Contributes knowledge of security best practices and technical skills. Utilizes problem-solving techniques during security planning, implementation and incident response activities.
  • Assumes responsibility for protecting all confidential information discussed, documented or otherwise provided in the course of security events.


3. Network Security Support: Proactively audits and reviews the network and security infrastructure.
  • Ensures that scheduled maintenance, patching and performance is monitoring and managed.
  • Monitors LAN/WAN, network, security firewalls, routers and systems to ensure security standards are maintained.
  • Provides operational reporting that effectively communicates the security posture of the SRPMIC organization.
  • Provides technical input and assistance to troubleshoot security issues.


4. Security Risk Assessments: Develops and implements security, technology and assessments based on the organization's selected security framework.
  • Develops and maintains adopted security standards and industry best practices.
  • Works closely with internal stakeholders and security leadership to build and maintain an effective security program to protect the confidentiality, integrity and availability of IT assets to help mitigate overall organizational risks.


5. Investigation Support: Responds to security breaches or personnel investigation requests.
  • Ensures accurate data capture, chain of custody and reporting for an incident or investigation.
  • Provides leadership, consultation or technical support.
  • Maintains confidentiality and integrity of systems, data and security processes.


6. Vendor Management: Maintains relationships with vendors and consultants to ensure security standards and deliverables are met.
  • Manages security vendors to ensure Community projects and objectives are met.


7. Vendor Security Reviews: Implements and maintains the Vendor Security Review program and its processes.
  • Participates in and takes responsibility for individual vendor security reviews
  • Perform vendor security reviews as per defined processes and make risk determination on a vendor-by-vendor basis.
  • Conduct peer reviews of vendor security reviews prior to final report completion.
  • Provide leadership and consultation to IT peers as relates to completion and submittal of security review requests and vendor liaison through the review process.
  • Provide quarterly reporting and KPIs reflecting the overall health of the security review program.


8. Documentation : Establishes, maintains and enforces IT Department policies and procedures in collaboration with IT management team.
  • Recognizes and identifies potential areas where existing policies and procedures require change, or where new ones need to be developed.
  • Develops and implements security operational policies and procedures.


9. Project Coordinator and SME
  • Fulfills all duties as the Cyber Security subject matter expert in support of IT and external departmental projects.
  • Fulfills all duties as the Cyber Security subject matter expert in support of 3rd part audit engagements.
  • Leads Cyber Security team projects and initiatives to include security tool integrations, tool evaluations, and process improvements.


10. Audit and Compliance
  • Participates in audit reviews.
  • Participates and fulfils a lead role in security penetration activities and the coordination of mitigation and remediation efforts.


11. Other Duties as Assigned: Performs other job related tasks as assigned by the Cyber Security Manager, IT Assistant Director - Enterprise Architecture, or IT Director/CIO.

Knowledge, Skills, Abilities and Other Characteristics:
  • Ability to assess security vulnerabilities at the system and/or network level.
  • Ability to coordinate vulnerability mitigation efforts across multiple teams
  • Ability to asses social engineering risks related to electronic communications
  • Ability to asses and document risk related to third party system and/or software integrations
  • Ability to conduct/ support Information Assurance training to broad user base
  • Ability to manage and leverage security tools to reduce organizational risk
  • Ability to lead and coordinate team level projects and programs with little to no oversight
  • Ability to work independently and make well informed decisions based on experience and data gathering
  • Ability to serve as the go to cyber security authority in the absence of the Cyber Security Manager.

  • Knowledge of Firewall logs and the use of those logs for investigative practices
  • Knowledge of the Elastic Stack and the ability to leveraging multiple log sources to identify security risk and/or compromise
  • Knowledge of software and system vulnerabilities and mitigation practices
  • Knowledge of secure protocols and how, when, and where they should be implemented
  • Knowledge of Microsoft 365 Cloud security suites to include: 365 Defender, Purview/Compliance
  • Knowledge of two factor authentication and its integration types
  • Knowledge of industry data classification standards i.e.: HIPAA, PCI, PII, PHI and FERPA
  • Knowledge of CIS, NIST and FedRamp controls/standards.
  • Knowledge of firewall rules and audits

  • Skilled at providing outstanding internal and external customer service.
  • Skilled at interfacing at all staff levels and providing effective verbal and written communication.
  • Skilled at verbal & written communication.
  • Skilled at defining issues, analyzing and evaluating information, presenting recommendations and identifying alternative solutions.
  • Ability to work effectively across and within diverse teams.
  • Ability to effectively manage simultaneous security issues.
  • Ability to effectively manage network security related change and requirements gathering
  • Highly self-motivated and directed combined with extensive experience working in a collaborative, team-oriented environment.


Minimum Qualifications

  • Education: A Bachelor's degree from an accredited college or university in Information Security, Cyber Security or related discipline. Maybe accept a combination of 7 years direct cyber security experience and industry certifications in lieu of degree.

    • Experience:
    • Five (5) years' experience with the following:
    • Direct experience working within an IT/Cyber security role. Hands-on experience implementing network security, security monitoring, cloud security monitoring, or vulnerability management.
    • Direct experience supporting Microsoft 365 Cloud security
    • Direct experience with the Elastic log management platform
    • Direct experience supporting cyber security incident response
    • Direct experience managing and/or mitigating software and system vulnerabilities
    • Direct experience conducting security audits to include: access control and system configuration
    • Direct experience conducting security assessment on 3rd party integrations
    • Direct experience with secure remote access technologies
    • One of the following certifications is required:
    • CompTIA Security +
    • Systems Security Certified Practitioner (SSCP®)
    • Certified Information Systems Security Professional (CISSP)
    • Two of the following certifications is preferred:
    • Security +
    • Systems Security Certified Practitioner (SSCP®)
    • Certified Information Systems Security Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • SANS Global Information Assurance Certifications (GIAC)
    • Certified Ethical Hacker (CEH)
  • Equivalency: Any equivalent combination of education and/or experience that would allow the candidate to satisfactorily perform the duties of this position, will be considered.
  • Underfill Eligibility: An enrolled Community Member whom closely qualifies for the minimum qualifications for a position may be considered for employment under SRPMIC Policy 2-19, Underfill.


  • Special Requirements

    • May be required to work beyond normal work hours including nights, weekends and holidays.
    • May be required to complete and Salt River Police Department (SRPD) background investigation and polygraph examination.
    • May be required to receive and maintain a Salt River Pima-Maricopa Indian Community, Community Regulatory License, and State Certification (ADOG). All applicants applying for jobs will be subject to Pre-Employment Drug Test and extensive Fingerprint and Background Check. In addition, all employees providing services to a campus with children will be subject to the "Community Code of Ordinances", Chapter 11 "Minors", Article X. "Investigation of Persons Working with Children", random drug testing and completion of a background check every five (5) years.


    "SRPMIC is an Equal Opportunity/Affirmative Action Employer" Preference will be given to a qualified : Community Member Veteran, Community Member, Spouse of Community Member, qualified Native American, and then other qualified candidate.

    In order to obtain preference, the following is required: 1) Qualified Community Member Veteran (DD-214) will be required at the time of application submission 2) Qualified Community Member (must provide Tribal I.D at time of application submission),3) Spouse of a Community Member (Marriage License/certificate and spouse Tribal ID or CIB is required at time of application submission), and 4) Native American (Tribal ID or CIB required at time of application submission).

    Documents may be submitted by one of the following methods:

    1) attach to application

    2) fax (480) 362-5860

    3) mail or hand deliver to Human Resources.

    Documentation must be received by position closing date.

    The IHS/BIA Form-4432 is not accepted .

    Your Tribal ID/CIB must be submitted to HR-Recruitment-Two Waters.
    cc231bdf600b9caa3beaeba79fd205ef