Employment Type : Full-Time
To provide support to the University’s complex information technology computing environment through research, testing and evaluating computer security products and procedures to provide the campus with a reliable and secure computing environment. Responsible for working with a team to implement a robust information security program, specifically, coordinating, implementing, and monitoring the Information Security environment, investigating suspected violations of Information Security policies, and providing other security related services. Oversees the daily operations of security systems and procedures by the Security Operations Team. This position relates to the department objective by providing the information security needed to support the high quality and reliability of the services offered by ITS. Demonstrated knowledge of security tools and computing technologies. Working knowledge of database, communications, storage, operating systems, software applications and tools such as scripting and log administration. Understanding of network setup, configurations and management. Demonstrated Systems Administration skills in multiple operating systems, to include Windows and LINUX. None None Considerable experience with information technology security system support across a complex enterprise information technology environment. Considerable supervisory experience. Extensive experience establishing and maintaining a secured computing environment across a complex enterprise. This position is designated as sensitive. A fingerprint-based criminal history check will be required of the final candidate. 40-hour work week Monday-Friday; Some evenings and weekends; rotating on call. #COVAcyberjobs It is the policy of Old Dominion University to provide equal employment, educational and social opportunities for all persons, without regard to race (or traits historically associated with race including hair texture, hair type, and protective hairstyles such as braids, locks, and twists), color, religion, sex or gender (including pregnancy, childbirth, or related medical conditions), national origin, gender identity or expression, age, veteran status, disability, political affiliation, sexual orientation or genetic information. Minorities, women, veterans and individuals with disabilities are encouraged to apply. If you are an individual with a disability and require reasonable accommodation, please contact the Office of Institutional Equity & Diversity at (757) 683-3141. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or © consistent with contractor’s legal duty to furnish information.
Working knowledge of firewall, logging, security event and incident management (SEIM), intrusion detection/prevention, vulnerability scanning, patching technologies, endpoint protection, email protections, and other IT security tools and practices. Working knowledge of Computer Security forensics and investigations. In some cases these knowledge, skills and abilities can be acquired through the completion of a bachelor’s degree in a related field or equivalent experience.
Demonstrated effective supervisory skills.
Working knowledge of directory systems, such as LDAP and Active Directory. Working knowledge of authentication systems and multi-factor authentication. Working knowledge of encryption and public key infrastructure (PKI) technologies. Very strong interpersonal and communication skills (oral and written).
GIAC and/or CISSP Certification.
Demonstrated skill in risk analysis and continuity planning. Understanding of scripting for automation, data mining, reporting, metrics and alerts
Bachelor’s Degree in Computer Science (or related discipline) or an equivalent combination of education, training or experience.
Job Open To General Public
Open Date 01/18/2021
Close Date
Open Until Filled Yes
Special Instructions Summary
Criminal Background Check The final candidate is required to complete a criminal history check.
College Home Page odu\its
Department Home Page
Equity Statement
Reasonable Accommodation Request
Pay Transparency Nondiscrimination Provision