Director Information Security Architecture and Engineering - 525691
Alabama, Tuscaloosa
Full Time Senior-level / Expert USD 101K - 142K
Pay Grade/Pay Range: Minimum: $101,900 - Midpoint: $142,700 (Salaried E15)
Department/Organization: 200721 - Enterprise Technology
Normal Work Schedule: Monday - Friday 8:00am to 4:45pm
Note to Applicants: Position is eligible for hybrid work subject to University policy.
Job Summary: The Director of Information Security Architecture and Engineering leads architecture and engineering efforts for the University’s information security program. Manages and trains a team of information security personnel and provides technical leadership, direction, and expertise. Manages information security tools and technology. Works directly with the Chief Information Security Officer (CISO) to plan and direct information security engineering strategy. Provides vision and direction of the information security engineering program. Manages and matures information security architecture and technology practices for the University. Advises the CISO and other leadership on information security matters. Provides guidance to infrastructure, device management, data, networking, cloud, and application development and support teams. Monitors industry trends and developments, staying up to date with latest information security technologies and practices.
Additional Department Summary: Oversees the following information security practices for the University: forensics, vulnerability management, attack surface management, network security, endpoint security, and others. Troubleshoots issues with information security tools.
Required Minimum Qualifications: Master's degree and six (6) years of information security experience; OR bachelor's degree and eight (8) years of information security experience.
Additional Required Department Minimum Qualifications: Must be a Certified Information Systems Security Professional (CISSP). Must have one or more Global Information Assurance Certification (GIAC) certification(s).
Skills and Knowledge: Deep understanding of information security risk and compliance frameworks. Aptitude for solving problems. Self-motivated and resourceful. Ability to manage highly complex assignments and systems. Ability to effectively communicate verbally and in writing with customers and leadership. Ability to work with customer groups and users of varying degrees of technical ability and understanding. Ability to manage, lead, and support a team of technical staff who support a wide range of processes and technologies. Ability to understand team members’ strengths and weaknesses and leverage all available resources to implement and maintain tools and processes. Effective time management skills. Ability to work on and manage multiple projects simultaneously.
Preferred Qualifications: Familiarity with higher education business processes and UA departments and processes.
Background Investigation Statement: Prior to hiring, the final candidate(s) must successfully pass a pre-employment background investigation and information obtained from social media and other internet sources. A prior conviction reported as a result of the background investigation DOES NOT automatically disqualify a candidate from consideration for this position. A candidate with a prior conviction or negative behavioral red flags will receive an individualized review of the prior conviction or negative behavioral red flags before a hiring decision is made.
Equal Employment Opportunity: The University of Alabama is an Equal Employment/Equal Educational Opportunity Institution. All qualified applicants will receive consideration for employment or volunteer status without regard to race, color, religion, national origin, sex, sexual orientation, gender identity, gender expression, pregnancy, age, genetic or family medical history information, disability, protected veteran status, or any other legally protected basis, and will not be discriminated against because of their protected status. Applicants and employees of this institution are protected under Federal law from discrimination on several bases. Follow the link below to find out more. "EEO is the Law" Poster
Tags: CISO CISSP Cloud Compliance Endpoint security Forensics GIAC Network security Strategy Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.