Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Position Summary
This is advanced professional-level information technology (IT) work performing network application and cybersecurity administration including developing, testing, implementing, monitoring access, and performing security assessments for network authorization, systems operations, software applications, and physical security to protect against unauthorized use and maintain a secure technology environment for the County and it’s covered entities data and computing infrastructure.
This position has a commitment to secure sensitive data, and advanced technical and operational expertise and problem-solving abilities.
This position also performs responsible technical and analytical work to elicit, analyze, specify, and validate the business needs of stakeholders within County Departments.
Essential Functions
- Develops and implement security frameworks. Builds menus and authorizations for users based on security and roles as appropriate and applicable.
- Develops and documents security authorization, administration plans, policies, and procedures.
- Identify, track, and remediate identified vulnerabilities
- Configures and monitors system, application, or network security
- Ensures the integrity and confidentiality of sensitive data.
- Work with FDLE, FBI and other agencies in regard to CJIS, FALCON, and other necessary requirements.This includes the associated audits and work product necessary.
- Execute and manage the periodic account, application, device and vulnerability scanning and review to ensure settings meet security standards and provide separation of duties.
- Monitors systems security, including log file reviews and auditing, investigates anomalies and appropriately escalates violations of the security process.
- Performs research and develops/recommends solutions to address gaps in the security framework.
- Monitor impacts to security due to changes in local, state and federal regulations and works with management to adopt required policy changes.
- Conducts routine security reviews to ensure application and/or information security policies and best practices are in place and followed.
- Develops and delivers security policies and awareness programs and provides role-based security education.
- Stay current with industry and professional standards through continuing education opportunities.
- Evaluates, analyzes, designs, implements, and documents departmental business processes to facilitate automation and/or re-engineering the automation of these business processes
- Creates and deploys feedback mechanisms for end-users and analyzes results.
- Participates in the design, development, and delivery of software applications training programs and individual classes with Innovation Technology staff and department heads.
- Conducts research into software application products and services in support of development and purchasing efforts: and provides support for the testing of new and existing software applications under development or consideration for purchase.
- Evaluates documented resolutions and analyzes trends for ways to prevent repeated future problems: records, tracks, and documents the problem-solving process, including all successful and unsuccessful decisions made, and actions taken, through to final resolution; test fixes and performs post-resolution follow-ups.
- Provides on-call after-hours support on an as-needed basis or in support of a project.
- Performs related work as assigned or required.
- In the event of an emergency, all employees are considered essential personnel and shall be required to perform alternate duties.
- Bachelor's Degree in Computer Science, Business Administration, or directly related field.
- Three (3) years progressively responsible experience in IT which includes two (2) years of experience in IT security architecture, design or analytics and IT business process engineering.
- Must possess a valid state of Florida driver’s license.
- CompTIA+ Security Plus, GSEC, CISSP, or equivalent preferred. Must be able to obtain one of the above certifications within 12 months of employment.
- Any equivalent combination of related training, education and experience may be substituted on a year for year basis.
Flagler County, Florida is an Equal Opportunity Employer. In compliance with the Americans with Disabilities Act, Flagler County, Florida will provide reasonable accommodations to qualified individuals with disabilities and encourages both prospective and current employees to discuss potential accommodations with the employer.Knowledge, Skills and Abilities
- Thorough understanding of compliance frameworks such as PCI, HIPAA
- Ability to apply information security concepts, protocols, and industry best practices.
- Ability to think analytically, creatively and independently
- Experience working with County departments to aid in the development or implementation of security strategies and solutions.
- Experience with logging methods and security event terminology
- Thorough knowledge of security systems and tools.
- In-depth understanding of security controls and mechanisms and in their implementation.
- Experience working with internal and external audit groups to ensure compliance with appropriate regulations and data protection directives.
- Advanced problem solving and analytical skills
- Ability to train security concepts to all areas of the business
- Ability to work effectively with technical, functional, and business colleagues.
- Excellent verbal and written communications and customer service skills.
- This position will be subject to additional security clearances as mandated by the Florida Department of Law Enforcement (FDLE) due to access to law enforcement facilities and/or electronic data.
Physical Demand: Light
- 20 lbs. maximum lifting.
- Some lifting, carrying, pushing, and pulling.
- Some walking or standing may be required.
- Good eyesight for production or safety of self and others.
- Position requires good hand dexterity for operating equipment; ability to ear, comprehend and respond to patrons, co-workers, and supervisors both orally and in writing.
- Subject to working in adverse weather conditions.
Key Skills
Ranked by relevanceReady to apply?
Join Flagler County Government and take your career to the next level!
Application takes less than 5 minutes