A Day in the Life:
The essential functions of this role are as follows:
Direct efforts for inclusion of information security safeguards during developmental stages of new automated and manual information systems.
Provide guidance and direction for the physical protection of information systems assets to other function units.
Provide reports to management regarding effectiveness of information security and makes recommendations for the adoption of new procedures.
Determine appropriate policy and standards of information and physical security safeguards for the protection of assets and confidentiality of information, such as access authority to, or to dial into, state and visitor policy at data center.
Direct the development, testing and implementation of information security management software programs that will monitor the integrity of sensitive application programs, computer operating systems, telecommunications network and computer hardware.
Manage the development, implementation and testing of appropriate security plans and control techniques necessary to protect against errors and omissions, fraudulent access, espionage, sabotage, natural disaster, fire utility failures and related situations in all areas where information technology equipment, communication network and/or personnel are located.
Conduct security lectures and training programs.
Perform periodic audits to assure security policies and standards are being followed and recommends enhancements where necessary.
Manage the development of procedures for detecting, reporting and investigating breaches in security, and along with Indiana State Police, directs the investigation of security breaches.
Maintain a continuing review of existing and proposed state and federal legislation and regulatory laws pertaining to information system security and privacy and keeps management informed of changes.
Recruit, select, onboard, and train employees to ensure role responsibilities and expectations are clearly understood while providing opportunities to continue professional development.
Set expectations, measure progress, provide ongoing feedback, and evaluate the performance of employees. Ensure work adheres to quality standards, deadlines, and proper procedures.
The job profile is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Other duties, responsibilities and activities may change or be assigned at any time with or without notice.
What You'll Need for Success:
You must meet the following requirements to be considered for employment:
Broad knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy.
Broad knowledge of computer programming/languages and the operating system, mainframe/PC Local Area Network, dial-in access control techniques and on-line teleprocessing program.
Ability to develop and maintain information security standards.
Ability to understand and apply complex computer logic to work.
Ability to work effectively with a wide range of information technologists, including technical support, applications development, end users and management.
Ability to communicate effectively.
Ability to delegate work, set clear direction, and manage workflow.
Ability to effectively give feedback, provide guidance or corrective action, coach, and develop employee skillsets.