Job Summary:
The Information Security Administrator is responsible for managing the University’s information security by managing application security, monitoring network security, responding to security incidents and providing security awareness training.
Duties & Essential Job Functions:
1. Monitors information security by reviewing industry security advisories, compliance with regulatory requirements, performing risk assessments and auditing systems, monitoring data security.
2. Manages and maintaining information security by performing forensic investigations, incident management, developing tools, designing and architecting network and application security, managing network devices and application security.
3. Promotes information security awareness by maintaining security website, presenting security topics to groups, training department users on system security.
4. Performs other related duties as assigned.
Required Education & Experience:
• Bachelor’s Degree in computer related field or equivalent in experience.
Preferred Education & Experience:
• None
Required Licensure/Certification/Specialized Training:
• None required, Information Technology certifications desirable.
• Level 2 None required, Ability to acquire Security certifications
• Level 3 One or more approved Security certifications.
• Level 4 One or more approved Security Professional certifications. (CISSP, CISM, GSEC etc.)
Preferred Licensure, Certification, and/or Specialized Training:
• None
Knowledge, Skills & Abilities:
• Knowledge of Local Area Networks, TCP/IP protocols, Windows or Mac client and server operating systems, Enterprise Applications.
• Knowledge in enterprise change control methodology and documentation processes, ability to work independently as well as within a team to fulfill project goals.
• Knowledge of network security devices (firewall, IDS/IPS, etc.), manage application security; develop, implement, and maintain a comprehensive information security education program; ability to audit and report on individual system security, awareness of data security models, monitoring industry security advisories.
• Knowledge of multiple operating systems (Unix, Linux, etc.), authentication protocols and methods (NTLM, Kerberos, etc.), encryption algorithms, and forensic and incident management techniques.
• Knowledge of forensic and incident management techniques, basic understanding of compliance and regulatory issues.
• Ability to interpret and recommend changes to security policy, ability to audit, design, architect, implement large-scale security, ability to supervise and train other information security engineers.
• Ability to audit, design, and architect network security and application security, to perform security risk assessment of IT solutions, to develop or customize security tools.
TCU Core Competencies:
University Core Competencies definitions may be found on the Human Resources website and in the staff performance management system.
Physical Requirements (With or Without Accommodations):
• Visual acuity to read information from computer screens, forms and other printed materials and information.
• Able to speak (enunciate) clearly in conversation and general communication.
• Hearing ability for verbal communication/conversation/responses via telephone, telephone systems, and face-to-face interactions.
• Manual dexterity for typing, writing, standing and reaching, flexibility, body movement for bending, crouching, walking, kneeling and prolonged sitting.
• Lifting and moving objects and equipment up to 10 lbs.
Work Environment:
• Work is indoors and sedentary and is subject to schedule changes and/or variable work hours.
• This role is an on campus, in-person position.
• There are no harmful environmental conditions present for this job.
• The noise level in this work environment is usually moderate.
AA/EEO Statement:
As an AA/EEO employer, TCU recruits, hires, and promotes qualified persons in all job classifications without regard to age, race, color, religion, sex, sexual orientation, gender, gender identity, gender expression, national origin, ethnic origin, disability, genetic information, covered veteran status, or any other basis protected by law.