Cyber Security Engineer (Systems Reliability Division)

Tampa, FL, United States

Apply now Apply later

Job Overview

Responsible for the performance of highly complex cyber security functions related to the design, installation, maintenance, auditing, investigation, and assessment of software applications, networks, and the County’s enterprise level information systems. Responsible for proactively identifying and implementing security measures to prevent emerging vulnerabilities, utilizing a diverse array of tools and methodologies. Incumbent will use sound judgement to assess risk, conduct audits, collect and review data, collaborate with other technology divisions, and write reports to advise leadership.

Salary

$82,804 - $145,080

Ideal Candidate

This advanced level SCADA physical and cyber security position will be responsible for the protected access and overall integrity of the SCADA network, to include controlled data Integration, user and device security configurations, access control lists, encryption pass coding and data port security. Develops and maintains documentation of existing SCADA infrastructure including hardware, applications, protocols, communication links and system disaster recovery strategies. Evaluates and applies security updates, patches to all SCADA servers and workstations in accordance with ISA standards. Works with Network and Applications Engineering groups to troubleshoot and resolve issues associated with failures to maintain maximum system security and facilitates continuous improvement of SCADA system integrity and the SCADA environment. Assist with the secure integration of SCADA data to other areas of the business. Build and maintain automated data imports/exports and reports processes. Administers for the Department any operational or security policies associated with the network using firewalls, policy and rule initiation as well as authentication software. Develops and administers Departmental security policies to users related to the use of the SCADA network.

This position will provide Departmental wide highly technical and specialized computer and network security oversight associated with the Public Utilities Departments Supervisory Control and Data Acquisition System (SCADA). SCADA serves as the backbone to the Departments Water, Wastewater, Reclaimed Water and Pump Station computerized control systems. Due to continuous technological advancements, systems integration standardization hardware/software compatibility assessments, programming, multi-disciplinary diagnostics, troubleshooting, debugging, coding and process control program development are all vital to ensuring the preservation and protection of SCADA communication for 24-hour operations regulatory compliance and the protection of public health and the environment. The sophistication and continued expansion of multiple local area networks, a large cellular telemetry network and an independent wide area network makes it more vulnerable to cyber-attacks, incidental software or hardware corruption and occasional user misuses from both outside and inside influences. This position will provide the needed focus towards making the network more secure following guidelines for automation and information systems; provided by ICS and ISA standards for automation and systems information.

Minimum Qualifications 

  • Bachelor’s degree from an accredited college or university with a major in information security or another similar technology field; AND
  • Three years of experience in information security system administration and risk assessment within an enterprise environment, encompassing third-party risk, risk analysis, risk mitigation, and residual risk management.
  • Three years of experience leveraging industry-leading cybersecurity tools (SIEM, EDR, vulnerability scanning, and web application security) for comprehensive threat detection and mitigation. 

OR

  • An equivalent combination of education (not less than a high school diploma/GED), training and experience that would reasonably be expected to provide the job-related competencies noted above.

Core Competencies 

  • Customer Commitment - Proactively seeks to understand the needs of the customers and provide the highest standards of service.
  • Dedication to Professionalism and Integrity - Demonstrates and promotes fair, honest, professional and ethical behaviors that establishes trust throughout the organization and with the public we serve.
  • Organizational Excellence - Takes ownership for excellence through one's personal effectiveness and dedication to the continuous improvement of our operations.
  • Success through Teamwork - Collaborates and builds partnerships through trust and the open exchange of diverse ideas and perspectives to achieve organizational goals.

Duties and Responsibilities 

Note: The following duties are illustrative and not exhaustive. The omission of specific statements of duties does not exclude them from the position if the work is similar, related, or a logical assignment to the position. Depending on assigned area of responsibility, incumbents in the position may perform one or more of the activities described below:

  • Conduct thorough assessments of software applications, networks, and systems to identify security vulnerabilities and weaknesses.
  • Utilize various tools and methodologies to perform vulnerability scanning, penetration testing, and code review.
  • Collaborate with cross-functional teams to prioritize and mitigate vulnerabilities based on their potential impact and risk.
  • Provide detailed reports outlining vulnerabilities, including their potential impact and recommendations for remediation.
  • Work closely with developers and system administrators to verify implementation of security patches, fixes, and improvements.
  • Participate in designing and implementing security measures to prevent future vulnerabilities.
  • Stay updated with the latest security threats, attack vectors, and industry best practices to identify and address emerging vulnerabilities proactively.
  • Assist in incident response activities, analyzing security incidents to determine the root cause and providing recommendations for prevention.
  • Use frameworks such as MITRE ATT&CK to map adversary tactics and techniques and design hunting scenarios based on threat actor behavior.
  • Collaborate with incident response teams to validate incidents, identify root causes, and assist with post-mortem analysis.
  • Other related duties as assigned.

Job Specifications 

Critical Thinking:

  • Exceptional critical thinking and situational awareness skills to identify systemic security issues through vulnerability and configuration data analysis.

Decision Making: 

  • Demonstrates high personal integrity and the ability to handle confidential matters with sound judgment and professionalism.

Communication:

  • Proficient communication skills to effectively collaborate with both technical and non-technical stakeholders. Provide detailed reports outlining vulnerabilities, including their potential impact and recommendations for remediation.

Strategic Planning: 

  • Stay updated with the latest security threats, attack vectors, and industry best practices to identify and address emerging vulnerabilities proactively.

Managerial/

Operational Skills: 

  • Work closely with developers and system administrators to verify implementation of security patches, fixes, and improvements. Participate in designing and implementing security measures to prevent future vulnerabilities.

Leadership:

  • Capable of serving as a Cyber Security Subject Matter Expert (SME) for externally managed technology projects from various departments.

Analytical Ability: 

  • Excellent critical thinking and situational awareness skills to identify systemic security issues through vulnerability and configuration data analysis.

Managing 

Complexity: 

  • Extensive knowledge of cybersecurity best practices, including familiarity with CIS Critical Controls, NIST Cybersecurity Framework (CSF), MITRE ATT&CK Framework. Utilize various tools and methodologies to perform vulnerability scanning, penetration testing, and code review.

Other: 

  • Hands-on experience in incident response and recovery, utilizing MITRE and security best-practice assessment methodologies.

Physical Requirements 

  • Speaking, vision, hearing, sitting, and standing. Use of office machinery such as PCs, Smart Phones, Tablets, and multi-function devices.

Work Category 

  • Sedentary Work - Exerting up to 10 pounds of force occasionally, and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Emergency Management Responsibilities 

In the event of an emergency or disaster, an employee may be required to respond promptly to duties and responsibilities as assigned by the employee’s department, the County’s Office of Emergency Management, or County Administration. Such assignments may be for before, during or after the emergency/disaster.

Apply now Apply later
Job stats:  0  0  0

Tags: Application security Audits Automation Compliance EDR Encryption Firewalls ICS Incident response MITRE ATT&CK Network security NIST Pentesting Risk analysis Risk assessment Risk management SCADA SIEM Threat detection Vulnerabilities

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.