Focus is on quality control within the IT infrastructure. This includes designing, building and defending scalable, secure, and robust systems; working on operational data center systems and networks; helping the organization understand advanced cyber threats; and helping to create strategies to protect those networks. Those strategies generally include monitoring and protecting sensitive data and systems from intrusions.
Typical Essential Duties
This is the fourth of six levels in the Information Technology series. Incumbents coordinate and implement the maintenance, use and enhancement of software or hardware systems critical to the operation of the College. Responsibilities may include analyzing system capabilities and implementing process and procedure changes to better utilize software or hardware; coordinating with software vendors regarding software support and system enhancements; coordinating projects involving the implementation of new software or hardware, or system changes; and training end users.
Requirements:
Education:
Bachelor’s degree in a related field to assigned area.
Completion of information technology certifications and specialized industry training (ISC2, SANS, Microsoft, Cisco, etc.) is preferred.
Experience:
Five (5) years of information technology experience in at least one of the eight ISC2 CBK domains. Solid and current understanding of network security vulnerabilities and counter measures.
* An equivalent combination of education and experience sufficient to successfully perform the essential duties of the job may be acceptable in lieu of those requirements listed above.
Knowledge:
Skills:
Physical:
License:
None
Responsibilities:
These duties are a representative sample; position assignments may vary. |
Potential Frequency |
|
---|---|---|
1. |
Monitor IT infrastructure security and performance trends, implement best security practices; |
Daily 20% |
2. |
Conduct IT infrastructure vulnerability assessments and compliance auditing; Manage the configuration of the security information and event management system and IPS/IDS/SIEM; |
Daily 30% |
3. |
Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats; |
Daily 20% |
4. |
Develop and update information technology procedures and network documentation; Participate in design review, generate technical diagrams, create test plans and procedures; |
Daily 10% |
5. |
Investigate security breaches and develop strategies to respond to and recover from a security breach. |
Daily 20% |
6. |
Performs other duties of a similar nature or level. |
As Required |
The Board of Trustees of St. Petersburg College affirms its equal opportunity policy in accordance with the provisions of the Florida Educational Equity Act and all other relevant state and federal laws, rules and regulations. The college will not discriminate on the basis of race, color, ethnicity, religion, sex, age, national origin, marital status, pregnancy, sexual orientation, gender identity, genetic information, or against any qualified individual with disabilities in its employment practices or in the admission and treatment of students. Recognizing that sexual harassment constitutes discrimination on the basis of sex and violates this Rule, the college will not tolerate such conduct. Should you experience such behavior, please contact Dr. Devona Pierre, Executive Director, Organizational Culture and Engagement/Title IX Coordinator at 727-341-3261; by mail at P.O. Box 13489, St. Petersburg, FL 33733-3489; or by email at eaeo_director@spcollege.edu.
St. Petersburg College
P.O. Box 13489
St. Petersburg FL 33733-3489
Having technical difficulties? Contact us
St. Petersburg College is committed to equal access/equal opportunity in its programs, activities, and employment.
For additional information visit www.spcollege.edu/eaeo/.
St. Petersburg College is an Equal Opportunity Employer.
Privacy Policy
| Social Security Number usage
| Site Disclaimer
| Crime Reports
| Campus Safety
| Emergency Preparedness