• No results found

This document includes information about the role for which you are applying and the information you will need to provide with the application.

N/A
N/A
Protected

Academic year: 2021

Share "This document includes information about the role for which you are applying and the information you will need to provide with the application."

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Further Particulars

This document includes information about the role for which you are applying and the information you will need to provide with the application.

1. Role details

Vacancy reference: 7770

Job title: Security Specialist Reports to: Head of IT Security

Salary: Up to £49,539

Terms and conditions: Academic Related and Support Staff

Grade: 7

Duration of post: Permanent

Working hours: Full time (37 hours per week)

Due to the nature of the role you will be included within the ‘On call’ rota and may need to be contacted in relation to an Information Security incident out of hours.

Location: Walton Hall, Milton Keynes Closing date: 12pm 19 January 2012

Type of application form accepted: Short version application form (with CV) Number of referees required: 3

(2)

2. Summary of duties

Main Purpose of the Post

Working within a technical team to maintain the confidentiality, availability and integrity of the Open University’s information and information systems. This will primarily be achieved through identification and mitigation of risk through security systems management and technical risk analysis / remediation.

 To take responsibility for the operational support of specific security technologies, products and services within The Open University to ensure that they satisfy the organisation’s security needs economically, efficiently and effectively

 To provide a focal point within The Open University for information security expertise  To take responsibility for the delivery of a quality security service

 Operate as a security design authority for both security solutions and business initiatives

 Analysis and appropriate mitigation of risk. Description of Duties of the Post:

 Responsible for operational support of technical security systems, including: installation, configuration, tuning, coverage, support and maintenance  Completion of technical risk analysis (ISO27001/5)

 To establish and maintain security technical standards, procedures and guidelines in conjunction with relevant technical teams

 To provide IT teams with security-focused technical support, training and

consultancy to ensure compliance with security standards, policies and legislation.  Facilitate a process of continuous improvement in the delivery of security services to

the Open University

 To have extensive security knowledge to provide technical expert consultancy to project teams in their use of the technology or product

 Liaise with external bodies and organisations to keep abreast of emerging trends, technologies and legislation that have an impact on Information Security to maintain technical expert status

 To assist in the development of The Open University security technical strategy.  Evaluate products and related technologies that mitigate risk and recommend and

plan their introduction into The Open University infrastructure services.

 Become familiar with related technical areas such as communications, database management etc., to enable effective liaison with other technical groups and the coherent adoption of new technologies

 Working with our security partners (penetration testing, support, upgrades etc)  Working to protect information and the intellectual property of the Open University

(3)

3. Person specification

KNOWLEDGE AND EXPERIENCE

The jobholder must have a thorough understanding of the IT security marketplace and must be aware of significant technical developments and directions.

Strong interpersonal skills are essential, as the jobholder must be able to operate effectively at all levels within and outside of The Open University.

Minimum of 10 years’ experience in the IT marketplace, of which 4 years must be as a security practitioner.

COMPLEXITY AND CREATIVITY

Information security is an extremely dynamic arena requiring constant updating of knowledge in both trends and the threat landscape. Technical design decisions are crucial to the security of The Open University, the flexibility of the resulting system and the re-usability of the technical solution in future systems. These require the jobholder to critically examine all current and future requirements for the technology or product and to balance the often-conflicting requirements of usability and security.

The jobholder will be expected to be a key provider of creative solutions to business problems, acting as a catalyst for ideas and encouraging innovation in the security of Open University products, services and solutions.

JUDGEMENTS AND DECISIONS

The jobholder must be able to make judgements on technical issues involving hardware, software and financial considerations as well as general business issues. The jobholder will make purchase recommendations for strategic technologies and products which will be used throughout The Open University’s services, technologies and products which will represent significant capital investment for The Open University and which will play a key role in The Open University’s ability to deliver effective, secure, appropriate and cost-effective solutions. OPERATIONAL RESPONSIBILITY

The jobholder is indirectly responsible for the efficient utilisation of many of The Open University infrastructure services’ computer systems, as technical decisions made can affect operational effectiveness. Poor strategic and technical decisions can also adversely affect our ability to respond effectively to business demands for new computer systems.

CONTACTS AND COMMUNICATION

The job involves developing and maintaining a close and continuing working relationship with all levels of staff and academics within The Open University, particularly with Infrastructure and project teams.

ADDITIONAL INFORMATION Knowledge

 An excellent understanding of best practice within Information Security and risk management including standards such as ISO/IEC 27001

 An understanding of legislation and regulations that impact information Security, e.g. Data Protection Act, Freedom of Information Act, PCIDSS.

(4)

organisational challenges to addressing these threats.

 An understanding of Application Security threats and countermeasures.

 A good practical knowledge of security technologies and wider business solutions including Firewalls, IDS/IPS, Identity and access management, SIEM, remote working and cloud technologies.

Skills

 A self-starter with the ability to lead and drive change through an organisation.  Excellent communication skills, both written and verbal. Ability to build strong

relationships and influence decisions with internal and external stakeholders.  A good understanding of project management methodology and how to implement

security within them.

 Good analytical skills and the ability to challenge the norm.

 An ability to think and plan strategically and systematically while recognising the need to deliver to the business requirements.

 The ability to be pragmatic while balancing the needs of the University against security.  The ability to cut through organisational and political barriers to achieve the overall

goal.

Qualifications

 An appropriate degree, equivalent qualification or experience.  One or more of the following qualifications are highly desirable.

o Certified Information Systems Security Professional (CISSP) o Certified Information systems Auditor (CISA)

o MSc Information Security

4. Role specific requirements e.g. Shift working

Due to the nature of the role you will be included within the ‘On call’ rota and may need to be contacted in relation to an Information Security incident out of hours.

5. About the unit/department

INFORMATION ABOUT INFORMATION TECHNOLOGY (IT)

Information Technology provides and supports all central University IT services and is

responsible for the institution's Technical Infrastructure. In addition to this service and support provision, it develops systems to support the business requirements of the organisation.

Information Technology comprises six sections – Curriculum Planning, Finance and HR, Sales & Marketing, Learner Services, CRM & Business Intelligence, Assessment, Qualification and Research, System Architecture and Business Process Consultancy.

The system development function in Information Technology is responsible for the development and maintenance of the University's key operational applications. The main systems support Student and Customer Administration, Course Development and Production, Finance and Staff. Teams of Analysts and Developers are responsible for developing and

(5)

maintaining systems for particular business areas. There are also specialised teams responsible for Data Administration, Transaction Processing and communication facilities, including for printing and emailing.

While much of the software is developed in-house, there are a number of packages. These include applications from the Siebel Customer Relationship Management suite, EMC Documentum’s Content Management as well as Finance Ledger, Payroll and Stock Control packages. In-house developed software includes transactional websites to provide self service facilities for students and staff; information websites; decision support; workflow and student and staff records management.

The Higher Education sector in England will undergo dramatic change in the next three years as institutions adjust to serious reductions in state funding for teaching and as students bear more of the cost of their education. As well as these cost drivers, the entry of more private providers to the sector and the increasing consumer power of high fee-paying students will put a premium on service delivery and cost efficiency. In turn, this will throw emphasis on the development of robust, efficient, enterprise-scale IT systems to increase efficiency and customer choice.

6. How to obtain more information about the role or application process

If you would like to discuss the particulars of this role before making an application please contact James Hall, Head of IT Security - james.hall@open.ac.uk

If you have any questions regarding the application process please contact Glyn Bailey on 01908 653285 or email glyn.bailey@open.ac.uk

7. The application process and where to send completed applications

Please ensure that your application, including covering letter and CV, reaches the University by: 12pm 19 January 2012

E-mail your application to: IT-Recruitment@open.ac.uk Or post to: Mrs G Bailey / Recruitment Coordinator Department/Unit: Information Technology

Address: Berrill Level 1 Walton Hall Milton Keynes Post Code: MK7 6AA

8. Selection process and date of interview

The interview panel will be chaired by James Hall, Head of IT Security. The other members of the interview panel will be are to be confirmed. Interviews dates are to be arranged.

We will let you know as soon as possible after the closing date whether you have been shortlisted for interview. Further details on the selection process will also be sent to shortlisted candidates.

References

Related documents

When a compatible medication is added to the Glucose Intravenous Infusion, the solution must be administered immediately.. Those additives known to be incompatible should not

35 Female labor participation may generate many intra-household effects: time allocation effects (e.g., both parents working have less time to allocate to child care or domestic

– Making a payment to a third party while knowing that all or a portion of the payment will ultimately go to a government official. •

Algoritma pencocokan yang digunakan pada tugas akhir ini adalah Phase only Correlation (POC), yaitu algoritma yang mencocokkan fasa dari dua buah citra dengan melihat nilai

 Controlling and monitoring user access to the database  Monitoring and optimizing the performance of the database  Planning for backup and recovery of database

The Open University’s success in creating, developing and evaluating innovative curriculum for over 40 years, to become one of the largest distance teaching universities in the

from the Blues Brothers Movie Think Big Band Arranged by Philippe Marillia Vocal (Aretha) Aretha F ranklin Ted White Think f.. Think Think Think you think think

[r]