Cybersecurity Specialist

Not Interested
Bookmark
Report This Job

profile Job Location:

Wildomar, CA - USA

profile Monthly Salary: Not Disclosed
Posted on: 2 hours ago
Vacancies: 1 Vacancy

Job Summary

  • Maintain a comprehensive cybersecurity program. Develop a formal Cyber Security Plan and update it regularly to address new threats. This includes layering defenses (firewall AV email security MFA etc.) enforcing security policies City-wide and keeping security architecture cooperation with the Risk Management team ensure cooperation with insurers requirements (e.g. annual security audits). Overall serve as the Citys subject-matter expert on cybersecurity keeping City leadership informed of risks mitigation strategies and incidents.
  • Develop procedures for responding to IT security incidents or the event of a suspected cyber incident (malware outbreak data breach etc.) execute the Incident Response Plan: isolate affected systems eradicate threats recover data from backups and restore services safely.
  • Investigate the root cause and implement measures to prevent recurrence. Coordinate with law enforcement or risk management as necessary. Provide post-incident reports and user communications.
  • Conduct regular (minimum annual) cybersecurity awareness training for City employees. Educate staff on safe computing practices: how to recognize phishing emails use strong passwords handle sensitive data and report potential security incidents. As part of this run periodic simulated phishing exercises to test and reinforce employee vigilance. Provide training modules covering social engineering general cyber hygiene and department-specific security procedures. Track participation to ensure all users complete required training
  • Deploy and manage enterprise-grade anti-malware and anti-virus solutions on all City computers servers and email systems. Maintain up-to-date virus definitions and ensure scans are running regularly. Monitor dashboards for any virus detections or quarantines and respond to neutralize any malware found. This includes protecting against ransomware and spyware. Also keep spam filtering and email threat prevention systems active (blocking phishing emails infected attachments etc.).
  • Ensure compliance with relevant standards (e.g. CJIS PCI-DSS HIPAA).
  • Utilize DNS or web content filtering systems to block access to malicious or inappropriate websites from the City network. Monitor web traffic for signs of malware callbacks or data exfiltration. Manage DNS security services that prevent users from visiting known dangerous domains.
  • Tune web filters to balance security with business needs (e.g. allowing required research sites while denying categories like malware phishing etc.).
  • Proactively assess the Citys IT environment for vulnerabilities and ensure compliance with relevant security standards and best practices. Perform periodic vulnerability scans of networks and systems (using tools or managed services) and promptly remediate any findings. Ensure the City meets any mandated security frameworks. This includes implementing controls for data encryption secure configurations and access controls as required.
  • Implement a rigorous patch management program. Apply security patches and software updates to servers PCs network devices and applications on a timely schedule-often weekly after hours for critical updates. Ensure operating systems (Windows Linux) and third-party software (browsers PDF readers etc.) are kept current to eliminate known vulnerabilities. Coordinate with City departments to schedule patches to minimize disruption (e.g. deploy after Business Hours 7:00 AM 6:00 PM). Maintain a log of applied patches and verify systems are fully updated.
  • Contractor shall notify the City of any confirmed cybersecurity incident within one (1) hour of detection followed by a written incident report within hours and a final root-cause and remediation report within 10 business days.
Maintain a comprehensive cybersecurity program. Develop a formal Cyber Security Plan and update it regularly to address new threats. This includes layering defenses (firewall AV email security MFA etc.) enforcing security policies City-wide and keeping security architecture cooperation with ...
View more view more