TIME% | | GOALS AND WORKER ACTIVITIES |
50% | A. | Coordination of the account provisioning, de-provisioning, projects and maintenance for DOC platforms and applications. |
| A1. | Utilize security rules to grant / revoke access to applications, servers, group folders, etc. |
| A2. | Coordinate activities within the account management staff to provide timely response to customer requests. |
| A3. | Create and maintain security rules, ensuring that they enforce security standards and policies. |
| A4. | Coordinate and handles projects relating to or involving account management functions. |
| A5. | Create Email accounts, distribution lists and group mailboxes. |
| A6. | Inform all customers of security procedures for applications, requests and services offered by account management. |
| A7. | Identify customer problem areas where additional education / training is needed. |
| A8. | Coordinate account management activities as needed across other agencies. |
| A9. | Recommend and provide updates to procedural documentation. |
| A10. | Provide timely resolution for customer access issues and formal requests. |
| A11. | Participate in system / application integration planning, testing and troubleshooting of access issues. |
| A12. | Work closely with project teams to determine application, server, folder, group and individual user access to systems. |
| | |
15% | B. | Assist in the adherence and implementation of policies, standards and procedures for all areas of IT Security. |
| B1. | Implement the standards and training requirements for IT Security administration. |
| B2. | Coordinate the implementation of department-wide policies, procedures and standards for applications and platforms and ensure agency-wide standardization. |
| B3. | Supports the implementation of department-wide Security Awareness training program. - Support functions. |
| B4. | Act as liaison to resolve security-related issues with other agencies in a timely manner. |
| B5. | Assess and recommend updates to security policies, procedures and standards. |
| B6. | Supply information required in LAB and DOJ audits as required. |
| B7. | Recommend automation techniques to eliminate manual procedures. |
| B8. | Provides support of Cybersecurity activities Creates, improves, and maintains policies, procedures and standards. |
| | |
15% | C. | Monitoring, auditing and analysis of security systems. |
| C1. | Provide advice to management on implementing and monitoring Security systems. |
| C2. | Provide advice to BTM in the design and implementation of policies and procedures to provide an acceptable level of Security systems. |
| C3. | Identify threats or serious issues regarding user access that may be caused by added new software and systems. |
| C4. | Perform audits of security on access. |
| C5. | Security Risk mitigation Identify potential security risks to the organization and provides recommendations to management. |
| C6. | Working with management to reduce and mitigate risk to the organization. |
| | |
10% | D. | Performance of other job-related activities and special assignments. |
| D1. | Identify areas that need improvement and work with sections supervisor to lay down the ground work to implement these improvements. |
| D2. | Audit access to numerous applications used by the DOC to ensure users are not over provisioned. |
| D3. | Update staff development plans as changes occur and work with management on career objectives. |
| D4. | Attend presentations, conferences and seminars as directed. |
| D5. | Identify training needs and request approval to attend. |
| D6. | Perform other duties as assigned. |
| | |
10% | E. | Assist IS Technical Services Consultant/Admins and/or Specialist with their responsibilities. |
| E1. | Coordinate Security for internal systems i.e. (WICS, DEVSECOPS, Email systems) |
| E2. | Perform Audits on EMR access as well as adding security rights through back EMR systems. |
| E4. | Perform other duties as assigned. |
| | |