We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

IT SECURITY PROGRAM SPECIALIST - 02182025-65487

State of Tennessee
United States, Tennessee, Nashville
Feb 19, 2025

Job Information

State of Tennessee Job Information
Opening Date/Time 02/18/2025 12:00AM Central Time
Closing Date/Time 02/24/2025 11:59PM Central Time
Salary (Monthly) $5,591.00 - $7,253.00
Salary (Annually) $67,092.00 - $87,036.00
Job Type Full-Time
City, State Location Nashville, TN
Department Finance and Administration

LOCATION OF (1) POSITION(S) TO BE FILLED: DEPARTMENT OF FINANCE & ADMINISTRATION, STRATEGIC TECHNOLOGY SOLUTIONS DIVISION, DAVIDSON COUNTY

This position requires CJIS & FTI fingerprints. This position also requires a criminal background check. Therefore, you may be required to provide information about your criminal history to be considered for this position.

This position is designed as hybrid.

Qualifications

Education and Experience: Graduation from an accredited college or university with a bachelor's degree in one of the following: Information Systems, Computer Science, Information Assurance & Cybersecurity, Information Technology Management, Business Management & Information Systems, Computer & Network Security or Business Administration and experience equivalent to one year of business continuity, disaster recovery, risk management or information security risk analysis and mitigation work.

Substitution of Education for Experience: Qualifying experience in business continuity, disaster recovery, risk management or information security risk analysis and mitigation work may substitute for the required education, on a year-for-year basis, to a maximum of four years.

Necessary Special Qualifications: None

Examination Method: Education and Experience, 100%, for Preferred Service positions.

Overview

Summary: Under general supervision, is responsible for security program evaluation and consultative work of average to considerable difficulty; performs related work as required.

Distinguishing Features: This is the working-level classification in the Security Program series. An employee in this class is responsible for performing enterprise security functions within a specialized program area. This class differs from Security Program Coordinator in that an incumbent of the latter performs advanced-level work or functions as the lead in a security program area.

Responsibilities

1. Assists in developing, modifying, updating and publishing statewide, multi-agency or enterprise application disaster recovery or Continuity of Operations plan(s) to ensure that critical and essential business processes are able to be recovered during a disaster event, emergency or extended outage: gathers business requirements to help identify systems to include in recovery plans; follows-up after the plan has been created to ensure that all staff understand their specific roles and responsibilities.

2. Assists in disaster recovery and business continuity test(s) for statewide, multi-agency, and enterprise applications to ensure that there are sufficient recovery procedures and failover processes in place to successfully restore the affected applications: tests succession plans in the event that key members of the organization are unavailable during a statewide disaster event, emergency or extended outage to ensure continuity of authority, decision-making, and communications; executes activities according to the activated plan(s) to ensure that the processes and documented steps are sufficient to restore affected systems; conducts post-test interviews with test participants to discuss the goals of the test and gather lessons learned during the exercise; compiles "lessons learned" report and timelines to assist with future tests or plans.

3. Assists in the planning and development of statewide risk assessment for business, technology and application solutions to recommend measures to control or reduce risk: identifies the most probable threats to the enterprise, determines related vulnerabilities, develops mitigation strategies and makes recommendations to lower the probability of occurrence.

4. Assists upper management in key component areas within the security program area: policy, procedures and standards, security audits and the configuration of enterprise system resources; assists in developing and implementing new solutions to meet evolving security needs.

5. Analyzes and monitors security systems and reports to determine areas of vulnerability in security across the enterprise: reviews data, system configurations, applications and code to identify security vulnerabilities or sources of security breaches; monitors internal applications, designs and processes to identify potential issues; performs correlation analysis to identify trends and weaknesses in state systems.

6. Identifies and analyzes security data from internal and external resources to determine security needs and program goals.

7. Promotes security awareness through training and effective communication to ensure that all users understand the importance of security program areas: trains users in how to mitigate risk at both the enterprise and agency level; communicates security status, threats or changes that may affect access to the network.

Competencies (KSA's)

Competencies:

  1. Action Oriented
  2. Customer Focus
  3. Dealing with Ambiguity
  4. Drive for Results
  5. Functional/Technical Competency
  6. Integrity and Trust
  7. Intellectual Horsepower
  8. Learning on the Fly
  9. Perseverance
  10. Priority Setting
  11. Problem Solving
  12. Self-Development
  13. Technical Learning
  14. Time Management
  15. Written Communications

Knowledge:

  1. Administration and Management
  2. Computers and Electronics
  3. Education and Training
  4. Engineering and Technology
  5. Knowledge of Computers and Electronics
  6. Knowledge of Operating Systems
  7. Knowledge of Policy Standards
  8. Knowledge of Regulatory and Statutory Requirements
  9. Knowledge of Security best Practices
  10. Law and Government

Skills:

  1. Active learning
  2. Active listening
  3. Complex problem solving
  4. Coordination
  5. Critical Thinking
  6. Installation
  7. Learning Strategies
  8. Quality Control Analysis
  9. Service Oriented
  10. Systems Analysis
  11. Systems Evaluation
  12. Technical Learning
  13. Technology Design
  14. Time Management
  15. Troubleshooting

Abilities:

  1. Deductive Reasoning
  2. Flexibility
  3. Fluency of Ideas
  4. Inductive Reasoning
  5. Information Ordering
  6. Memorization
  7. Oral Comprehension
  8. Perceptual Speed
  9. Problem Sensitivity
  10. Selective Attention
  11. Speed of Closure
  12. Stress Tolerance
  13. Time Sharing
  14. Visualization
  15. Written Expression

Tools & Equipment

  1. Adoble PDF software
  2. Everbridge
  3. Laptop
  4. MS Office
  5. Printer
  6. Scanner
  7. ServiceNow
  8. Sharepoint
Applied = 0

(web-7d594f9859-2nzb9)