Info Security Specialist
Listed on 2025-12-12
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Title: Info Security Specialist
Employee Classification:Other Professionals
Institution:System Office
Department: Information Technology
Campus
Location:
Tennessee Board of Regents System Office
The Information Security Specialist provides security-focused support to users and leads key security initiatives for the T Central Office and T institutions, while operating under the direct guidance of the Chief Information Security Officer (CISO).
This role is responsible for incident monitoring, collecting metrics, generating detailed security reports, and conducting security-related audits as needed. The specialist manages the operation and maintenance of security infrastructure, evaluates, recommends, and implements approved new technologies and innovations, addresses and resolves reported information security issues.
Additional responsibilities include incident management, risk assessment, implementation and oversight of security controls, delivery of awareness training, development and enforcement of security policies and compliance measures, and maintaining IT security architecture, policies, and standards.
This position may have the opportunity to work remote within the state of Tennessee but with periodic visits to the T System Office (Nashville, TN) at the employee’s expense, and potential travel to Tennessee T colleges may be necessary.
Job Duties- 25% - Oversees security operations, security engineering, and compliance of information systems and services across the enterprise; develops, delivers and manages IT Security standards, best practices and architecture information that supports IT Security operations, engineering, and compliance across the enterprise; conducts studies within and outside the organization to ensure compliance with standards and conformity with industry security norms; consults with members of T community regarding security best practices and compliance;
maintains awareness of how IT security services and systems affect the organization's security posture and exposure; weighs business needs against security concerns and articulates any issues to constituents and senior leadership; holds responsibility for the troubleshooting and resolution of reported information security issues; recognize and respond to information security incidents; analyze network traffic for anomalous activity and investigate as appropriate;
identify and understand potential threats and vulnerabilities and recommend mitigations; perform digital forensics as part of incident response and in response to other community needs; author and edit incident reports; perform periodic security-focused risk assessments and audits of systems and tools; develop, implement, and refine solutions for security monitoring, detection, and response on T community systems; perform high-level analysis of complex and disparate computing systems, networks and data architectures to identify, rectify and prevent technical and information security vulnerabilities;
scanning for vulnerabilities, evaluating scope and exposure, working with system and service owners to patch, isolate, or otherwise mitigate critical vulnerabilities; developing exposure metrics, detecting trends, and assisting the team in developing controls or defensive measures; use forensic, incident response, and process expertise to respond to and investigate system, service, or network attacks and breaches; applies IT security concepts to execute complex security controls to prevent hackers from infiltrating campus information or jeopardizing web-based programs for the campus;
researches, analyzes and addresses attempted efforts to compromise security protocols and measures; evaluate and test systems and applications for security vulnerabilities; maintain, use and/or operate complex security systems; administer, test or review complex security configurations to control access to systems; apply IT security concepts to use applicable encryption methods; gather, analyze, and summarize information and reporting to management regarding the negative impact on the campus caused by theft, destruction, alteration or denial of access of information;
applies it security concepts to select appropriate response to serious security incidents;
- (Essential) - 25% - Maintains the Information Systems Security Program (ISP) for the T Central Office and works with T institutions on related security issues with regard to the ISSP; promotes T information systems reliability and accessibility, while protecting and defending against unauthorized access to systems, networks, and data; lead the planning, design, development, integration, testing, documentation, training, implementation and maintenance of T IT security systems and products;
provide leadership through strong working relationships and collaboration across the T community to develop strategic goals for information security compliance and risk mediation; coordinates the Incident Response function of the T IT Security…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).