Enterprise Information Security Manager ID - 12081

Summary

 


Organization Summary

FCDC provides cost-effective, business-driven, collaborative, and secure IT services and solutions to public service agencies throughout Ohio’s most dynamic county. Our goals are simple but expansive: to be the most trusted enterprise technology service provider for Franklin County and a national leader in digital government services. Every day, the FCDC team empowers local government departments, agencies, teams, and nonprofits to deliver top-notch services to residents and businesses in central Ohio, and we take pride in the work they accomplish with our support.


Job Summary


The Enterprise Information Security Manager, reporting to the Chief Information Security Officer, is responsible for designing, implementing, and overseeing the Franklin County Data Network (FCDN) information security program and framework. This individual possesses vast experience in information security practices, secure network architecture, Internet Protocol (IP), firewalls, encryption, intrusion detection systems, web filtering, authentication, and authorization methodologies. The Manager of Information Security will assist the CISO with preserving the confidentiality, integrity, availability, and non-repudiation of County information resources by developing, deploying, and embedding information security architecture, policies, and standards. The Manager of Information Security must demonstrate practical communication skills and the ability to train others on security policies and practices. They must be able to manage staff, contractors, and services, providing technical direction as necessary. 


The Security Manager’s primary focus is work management and product ownership for the assigned individuals and security capabilities. As a secondary focus, the Security Manager will closely collaborate with the CISO in developing the Information Security Strategy and vision. In the absence of the CISO, the Security Manager may assume responsibility for leading all of Information Security.  


Employees new to FCDC or promoted into new positions must complete a 180-day probationary period, and all employees must adhere to current Employee Handbook policies.

 

Essential Duties and Responsibilities

 

To perform this job successfully, candidates must be able to perform each essential duty and fulfill each responsibility satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform basic functions. The essential duties and responsibilities include:


  • Perform complex IT architecture projects with competency to preserve the confidentiality, integrity, availability, and non-repudiation of the FCDN.
  • Assist in developing Security strategy, policy, and roadmaps for Franklin County Technology services, software, hardware, and other physical resources (e.g., cloud, client, collaboration, virtualization, network, server, data center, etc.)
  • Responsible for the development, deployment, and embedding of information security architecture, policies, and standards 
  • Collaborate with Enterprise IT and Infrastructure engineers and Enterprise Architects on planning, developing, and supporting core technologies like Azure Active Directory, local and cloud storage and sharing, collaboration, endpoint delivery and security, email systems, and more.
  • Coordinate the documentation, distribution, and enforcement of FCDN security policies, standards, and procedures, collaborating with key IT staff to develop and implement communication strategies for all cyber security policies and procedures.
  • Create and maintain cyber risk management methodologies. 
  • Develop effective security risk and control metrics. 
  • Responsible for leading the execution of day-to-day security operations and engineering teams.
  • Regularly collaborate with the directors/managers in enterprise IT, government experience, and partner experience management to ensure cohesion of planning, implementation, and communication strategies.  
  • Keep abreast of the latest security legislation, regulations, advisories, alerts, and FCDN vulnerabilities. 
  • Serve as the FCDN security audit and governance lead. Prepare and submit required reports to internal and/or external stakeholders, ensuring that systems, software, networks, and information are evaluated for security compliance. 
  • Lead and develop Enterprise Information Security team members, in collaboration with HR, using quarterly review frameworks, 1:1 meetings, modeling of professional development behaviors, utilization of training budgets, and encouragement of cross-training opportunities
  • Manages direct staff functions, including activity tracking, time reporting, and performance appraisals.
  • Lead the vulnerability management program for the external and internal networks, servers, PCs, applications, and endpoint devices.  
  • Lead the incident response program to address, control, and manage information security incidents, events, or security breaches. 
  • Act as backup coordinator and communicator for Enterprise Information Security during major incidents at any time
  • Participating in Information Security annual strategy development, budgeting, and resource planning.


Security Capabilities

Responsible for the effective use of the following security capabilities:


  • Intrusion detection and prevention tools
  • Vulnerability Management Solution
  • Firewall systems
  • Web and content filtering tools
  • Log correlation engines
  • Endpoint and Server Detection and Response Capabilities
  • Endpoint and Server Patch Management Solution
  • Mobile Device Management (MDM) tools
  • Microsoft 365 Security Capabilities


SUPERVISORY RESPONSIBILITIES 

The Enterprise Information Security Manager directly supervises assigned team members within Information Security. In the absence of the CISO, the Security Manager may also provide the CIO with broader temporary leadership of Information Security and guidance. The Security Manager will provide the following forms of staff supervision, development, and leadership:

  • Set and maintain high expectations for teams and individuals in terms of work quality and quantity
  • Develop staff skills via ongoing assessment and utilization of training resources
  • Ensure managers are developing their team members in line with FCDC standards
  • Actively participate in employee and contractor hiring activities for Information Security
  • Collaborate with HR as needed when taking employee disciplinary actions as outlined in FCDC policy
  • Demonstrate FCDC values and promote the vision and mission of the organization with staff
  • Heavily encourage cross-team collaboration within Information Security and across FCDC
  • Develop individual and team project management capacity internally and promote collaboration with Enterprise Delivery Services and Partner Experience Teams

 

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...