"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • IT Security Specialist L1- Department…

    CUNY (New York, NY)



    Apply Now

    IT Security Specialist L1- Department of Instructional Computing and Information Technology (ICIT)

    GENERAL DUTIES

    This position encompasses professional and responsible technical consultative and/or administrative work. Under administrative direction of a university IT manager, with broad latitude of independent action or decision, serves as subject matter expert on IT security, identity, and access infrastructure; provides IT security architectural guidance; designs security solutions; conducts IT risk assessments and recommended mitigating solutions.

     

    There are three (3) Assignment Levels within this classification. All personnel perform related work. Assignment Levels 2 and 3 may supervise staff. This specification describes typical assignments; related duties may be assigned as needed.

     

    To view the complete job description, go tohttp://www.cuny.edu/about/administration/offices/hr/classified-civil-service/ccsjobs/and view the Job Description for **IT Security Specialist.**

    CONTRACT TITLE

    IT Security Specialist

    FLSA

    Non-exempt

    CAMPUS SPECIFIC INFORMATION

    This position reports to the IT Academic Technology Director.

    Assignment Level I

    • Monitors industry developments through multiple sources; consults with vendors.

    • Ensures compliance with university security policies and standards.

    • Oversees security testing plan including routine penetration testing, security controls assessments, and third party cybersecurity engagements.

    • Recommends updates and improvements to university security policies and standards.

    • Identifies probable system exposure, compromise, problems, or design flaws and escalates issues to upper management to limit serious performance impact.

    • Defines, manages, and monitors data security, confidentiality, integrity, and availability.

    • Sets up, overs, and maintains security devices, as well as creates guidelines for identifying, reporting, and addressing computer security incidents (e.g., Security Device Management and Incident Response).

    • Monitors developments regarding various IT architectural platforms, including hardware, software and network communication components, operating systems, LDAP, server networking, basic load-balancing, DNS, certificate management, and HTTPS.

    • Reviews and analyzes design documentation to ensure appropriate security controls are in place.

    • Collaborates with application development, network, server, database, and storage teams regarding IT security aspects of new technologies, services, and system requirements.

    • Plans, defines and maintains policies, standards, configurations, and operating procedures and guidelines regarding IT security, identity, and access management in a moderate environment.

    • Analyzes, designs, implements, tests, troubleshoots, integrates, documents, and configures moderate IT security infrastructure in coordination with others, to maximize performance and capacity.

    • Plans, initiates and applies new moderate security infrastructure architecture or design changes.

    • Provides security design assistance on moderately complex new products and internally developed projects.

    • Assists in the development and review of moderately complex technical specifications for the procurement of various IT security systems and services, including the evaluation of vendor submissions solicited via bids, requests for information and proposals.

    • Participates as a team member in planning, designing, implementing, and maintaining highly secure application architecture solutions that includes network devices, servers, storage, cloud, and virtualization technologies.

    • Participates as a team member in planning, designing, implementing, and maintaining identity and access management services that include directory services, identity integrators/connectors, authentication services, web single sign-on and federation services, role and group management and delegated administration services.

    • Serves as subject matter resource regarding security design of applications, networks, servers, storage and virtualization, directory services, identity connectors, authentication, web single sign-on and federation, and application servers providing delegated administration, role management, and web services.

    • Performs, manages and documents structured security assessment plans of moderately complex applications and infrastructure.

    MINIMUM QUALIFICATIONS

    1.** A baccalaureate degree in computer science, engineering or a related field from an accredited college or university **and** five (5) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions; **or

    2.** A baccalaureate degree from an accredited college or university **and** six (6) years of satisfactory full-time experience as described in “1” above; **or

    3.** A high school diploma or its educational equivalent **and** ten (10) years of satisfactory full-time experience as described in “1” above; **or

    **4.** Education and/or experience which is equivalent to "1," "2" or "3" above. The following may substitute for some of the required experience required in "1," "2" or "3" above, as follows:

    College education (undergraduate credits) may substitute for up to four (4) years of the required experience in "3" above on the following basis:

     
     
     

    **D.** 120 or more semester credits substitute for 4 years of experience.

    Graduate credits in information technology, computer science or a related field may substitute for up to two (2) years of experience in "1" or "2" above on the following basis:

     

    **B.** 30 or more graduate credits substitute for 2 years of required experience.

    Each of the following certifications may substitute for one (1) year of the required experience in "1," "2" or "3" above:

     
     
     
     
     
     

    **G.** Certified Cloud Security Professional (CCSP) issued by ISC2.

     

    However, all candidates must have a high school diploma or its educational equivalent and at least three (3) years of experience as described in “1” above.

    Assignment Level II or III** **:

    **Level II:** After meeting the Qualification Requirements above, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level II.

    **Level III:** After meeting the Qualification Requirements above and the Level II requirements, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level III (for a total of 4 years of experience above the Qualification Requirements).

    **English Language Proficiency** **:** Demonstrated English language proficiency, including ability to speak, read, write, and understand English well enough to meet minimally acceptable performance standards set for job duties.

    **Motor Vehicle Driver License** **:** A Motor Vehicle Driver license, valid in New York State, may be required for some, but not all positions.

    **Note:** CUNY considers full-time work to be at least 35 hours per week. Part-time experience of at least 20 hours per week may be prorated by half and credited instead of,but not in addition to, full-time experience during the same period (e.g., two months of related work experience at 20-34 hours per week equates to one month of full-time related work experience.) Part-time experience of fewer than 20 hours per week **cannot** be credited at all.

    OTHER QUALIFICATIONS

    • One or more of the following certifications: CISA, CISM, CISSP, CEH

    COMPENSATION

    $104,304

    BENEFITS

    CUNY offers a comprehensive benefits package to employees and eligible dependents based on job title and classification. Employees are also offered pension and Tax-Deferred Savings Plans. Part-time employees must meet a weekly or semester work hour criteria to be eligible for health benefits. Health benefits are also extended to retirees who meet the eligibility criteria.

    HOW TO APPLY

    Applications must be submitted online by accessing the CUNY portal on City University of New York job website www.cuny.edu/employment or https://cuny.jobs/ and following the CUNYFIRST job system instructions. To search for this vacancy, click on search job listings, select more options to search for cuny jobs and enter the job opening id number.

     

    Click on the "apply now" button and follow the application instructions. Current users of the site should access their established accounts; new users should follow the instructions to set up an account.

     

    Please have your documents available to attach into the application before you begin. Please note that the required material must be uploaded as one document under cv/ resume (do not upload individual files for a cover letter, references, etc.). The document must be in .doc, .docx, .pdf, .rtf, or text format- and name of file should not exceed ten (10) characters - also do not use symbols (such as accents (e, e, (a, i or 6), ii, i.i, "i, -, \_or¿¿)).

     

    Incomplete applications will not be considered.

    Please include:

    • Cover letter and/or statement of scholarly interests

    • Curriculum vitae/ resume

    • Names and contact information of 3 references

     

    Upload all documents as one single file-- pdf format preferred.

    CLOSING DATE

    The committee will begin reviewing complete applications on Sept. 1, 2025. The search will remain open, and screening and review of applications will be ongoing-- until the position is filled. Applications submitted after the deadline will only be considered if the position(s) remain open after initial round.

    JOB SEARCH CATEGORY

    CUNY Job Posting: Information Technology/Technical

    EQUAL EMPLOYMENT OPPORTUNITY

    CUNY encourages people with disabilities, minorities, veterans and women to apply. At CUNY, Italian Americans are also included among our protected groups. Applicants and employees will not be discriminated against on the basis of any legally protected category, including sexual orientation or gender identity. EEO/AA/Vet/Disability Employer.

     

    Job ID

     

    30825

     

    Location

     

    Hunter College

     


    Apply Now



Recent Searches

  • Cashier Food Service Worker (Kentucky)
[X] Clear History

Recent Jobs

  • IT Security Specialist L1- Department of Instructional Computing and Information Technology (Icit)
    CUNY (New York, NY)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org