Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Security Engineer (Systems Reliability Division) image - Rise Careers
Job details

Cyber Security Engineer (Systems Reliability Division)

Job Overview

Responsible for the performance of highly complex cyber security functions related to the design, installation, maintenance, auditing, investigation, and assessment of software applications, networks, and the County’s enterprise level information systems. Responsible for proactively identifying and implementing security measures to prevent emerging vulnerabilities, utilizing a diverse array of tools and methodologies. Incumbent will use sound judgement to assess risk, conduct audits, collect and review data, collaborate with other technology divisions, and write reports to advise leadership.

Salary

$82,804 - $145,080

Ideal Candidate

This advanced level SCADA physical and cyber security position will be responsible for the protected access and overall integrity of the SCADA network, to include controlled data Integration, user and device security configurations, access control lists, encryption pass coding and data port security. Develops and maintains documentation of existing SCADA infrastructure including hardware, applications, protocols, communication links and system disaster recovery strategies. Evaluates and applies security updates, patches to all SCADA servers and workstations in accordance with ISA standards. Works with Network and Applications Engineering groups to troubleshoot and resolve issues associated with failures to maintain maximum system security and facilitates continuous improvement of SCADA system integrity and the SCADA environment. Assist with the secure integration of SCADA data to other areas of the business. Build and maintain automated data imports/exports and reports processes. Administers for the Department any operational or security policies associated with the network using firewalls, policy and rule initiation as well as authentication software. Develops and administers Departmental security policies to users related to the use of the SCADA network.

This position will provide Departmental wide highly technical and specialized computer and network security oversight associated with the Public Utilities Departments Supervisory Control and Data Acquisition System (SCADA). SCADA serves as the backbone to the Departments Water, Wastewater, Reclaimed Water and Pump Station computerized control systems. Due to continuous technological advancements, systems integration standardization hardware/software compatibility assessments, programming, multi-disciplinary diagnostics, troubleshooting, debugging, coding and process control program development are all vital to ensuring the preservation and protection of SCADA communication for 24-hour operations regulatory compliance and the protection of public health and the environment. The sophistication and continued expansion of multiple local area networks, a large cellular telemetry network and an independent wide area network makes it more vulnerable to cyber-attacks, incidental software or hardware corruption and occasional user misuses from both outside and inside influences. This position will provide the needed focus towards making the network more secure following guidelines for automation and information systems; provided by ICS and ISA standards for automation and systems information.

Minimum Qualifications 

  • Bachelor’s degree from an accredited college or university with a major in information security or another similar technology field; AND
  • Three years of experience in information security system administration and risk assessment within an enterprise environment, encompassing third-party risk, risk analysis, risk mitigation, and residual risk management.
  • Three years of experience leveraging industry-leading cybersecurity tools (SIEM, EDR, vulnerability scanning, and web application security) for comprehensive threat detection and mitigation. 

OR

  • An equivalent combination of education (not less than a high school diploma/GED), training and experience that would reasonably be expected to provide the job-related competencies noted above.

Core Competencies 

  • Customer Commitment - Proactively seeks to understand the needs of the customers and provide the highest standards of service.
  • Dedication to Professionalism and Integrity - Demonstrates and promotes fair, honest, professional and ethical behaviors that establishes trust throughout the organization and with the public we serve.
  • Organizational Excellence - Takes ownership for excellence through one's personal effectiveness and dedication to the continuous improvement of our operations.
  • Success through Teamwork - Collaborates and builds partnerships through trust and the open exchange of diverse ideas and perspectives to achieve organizational goals.

Duties and Responsibilities 

Note: The following duties are illustrative and not exhaustive. The omission of specific statements of duties does not exclude them from the position if the work is similar, related, or a logical assignment to the position. Depending on assigned area of responsibility, incumbents in the position may perform one or more of the activities described below:

  • Conduct thorough assessments of software applications, networks, and systems to identify security vulnerabilities and weaknesses.
  • Utilize various tools and methodologies to perform vulnerability scanning, penetration testing, and code review.
  • Collaborate with cross-functional teams to prioritize and mitigate vulnerabilities based on their potential impact and risk.
  • Provide detailed reports outlining vulnerabilities, including their potential impact and recommendations for remediation.
  • Work closely with developers and system administrators to verify implementation of security patches, fixes, and improvements.
  • Participate in designing and implementing security measures to prevent future vulnerabilities.
  • Stay updated with the latest security threats, attack vectors, and industry best practices to identify and address emerging vulnerabilities proactively.
  • Assist in incident response activities, analyzing security incidents to determine the root cause and providing recommendations for prevention.
  • Use frameworks such as MITRE ATT&CK to map adversary tactics and techniques and design hunting scenarios based on threat actor behavior.
  • Collaborate with incident response teams to validate incidents, identify root causes, and assist with post-mortem analysis.
  • Other related duties as assigned.

Job Specifications 

Critical Thinking:

  • Exceptional critical thinking and situational awareness skills to identify systemic security issues through vulnerability and configuration data analysis.

Decision Making: 

  • Demonstrates high personal integrity and the ability to handle confidential matters with sound judgment and professionalism.

Communication:

  • Proficient communication skills to effectively collaborate with both technical and non-technical stakeholders. Provide detailed reports outlining vulnerabilities, including their potential impact and recommendations for remediation.

Strategic Planning: 

  • Stay updated with the latest security threats, attack vectors, and industry best practices to identify and address emerging vulnerabilities proactively.

Managerial/

Operational Skills: 

  • Work closely with developers and system administrators to verify implementation of security patches, fixes, and improvements. Participate in designing and implementing security measures to prevent future vulnerabilities.

Leadership:

  • Capable of serving as a Cyber Security Subject Matter Expert (SME) for externally managed technology projects from various departments.

Analytical Ability: 

  • Excellent critical thinking and situational awareness skills to identify systemic security issues through vulnerability and configuration data analysis.

Managing 

Complexity: 

  • Extensive knowledge of cybersecurity best practices, including familiarity with CIS Critical Controls, NIST Cybersecurity Framework (CSF), MITRE ATT&CK Framework. Utilize various tools and methodologies to perform vulnerability scanning, penetration testing, and code review.

Other: 

  • Hands-on experience in incident response and recovery, utilizing MITRE and security best-practice assessment methodologies.

Physical Requirements 

  • Speaking, vision, hearing, sitting, and standing. Use of office machinery such as PCs, Smart Phones, Tablets, and multi-function devices.

Work Category 

  • Sedentary Work - Exerting up to 10 pounds of force occasionally, and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Emergency Management Responsibilities 

In the event of an emergency or disaster, an employee may be required to respond promptly to duties and responsibilities as assigned by the employee’s department, the County’s Office of Emergency Management, or County Administration. Such assignments may be for before, during or after the emergency/disaster.

Average salary estimate

$113942 / YEARLY (est.)
min
max
$82804K
$145080K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Security Engineer (Systems Reliability Division), BOCC Career Site

Are you passionate about safeguarding information systems and enjoy tackling challenges head-on? We are seeking a talented Cyber Security Engineer to join our Systems Reliability Division in beautiful Tampa, Florida. In this vital role at our organization, you'll be at the forefront of designing, installing, and maintaining security measures for software applications, networks, and our enterprise-level information systems. Your mission will be clear: proactively identify and mitigate vulnerabilities while leveraging a range of tools and methodologies that make a real difference. You’ll collaborate with cross-functional teams, crafting reports that inform leadership on risk assessments, historical data, and the continuous improvement of our SCADA network's integrity. Your expertise in security updates, penetration testing, and vulnerability scans will play a crucial role in protecting our systems from external and internal threats. If you have a knack for critical thinking, a firm grasp of security best practices, and love working as part of a dedicated team, we're eager to meet you! Join us in our commitment to protecting our community's resources while working in an innovative environment where your skills can shine. Plus, with a competitive salary range from $82,804 to $145,080, you won't want to miss out on this opportunity.

Frequently Asked Questions (FAQs) for Cyber Security Engineer (Systems Reliability Division) Role at BOCC Career Site
What are the main responsibilities of a Cyber Security Engineer in the Systems Reliability Division?

As a Cyber Security Engineer in our Systems Reliability Division, you will be responsible for conducting thorough assessments of software applications and networks to identify vulnerabilities. You'll employ various security tools, engage in vulnerability scanning, penetration testing, and code reviews. Additionally, your role involves collaborating closely with cross-functional teams to prioritize vulnerabilities, report findings, and recommend remediation steps to enhance our systems' security.

Join Rise to see the full answer
What qualifications do I need to become a Cyber Security Engineer at this organization?

To qualify for the Cyber Security Engineer role, you should have a Bachelor's degree in information security or a related technology field, coupled with at least three years of experience in information security system administration and risk assessment. Proficiency in industry-leading cybersecurity tools and methodologies, along with a strong foundation in risk analysis and mitigation practices, is crucial.

Join Rise to see the full answer
What skills are essential for success as a Cyber Security Engineer in the Systems Reliability Division?

Successful Cyber Security Engineers at our company exhibit strong critical thinking, problem-solving capabilities, and attention to detail. They also possess excellent communication skills to effectively convey complex security concepts to both technical and non-technical stakeholders. A solid understanding of cybersecurity frameworks, compliance standards, and familiarity with tools used for vulnerability scanning and incident response is also essential.

Join Rise to see the full answer
How does collaboration play a role in the Cyber Security Engineer position?

Collaboration is key for a Cyber Security Engineer in our Systems Reliability Division. You'll coordinate with various internal teams, including network engineers, developers, and management, to address security vulnerabilities, implement policies, and foster a security-oriented culture across the organization. By working together, we ensure the integrity and security of our SCADA network are maintained effectively.

Join Rise to see the full answer
What makes this Cyber Security Engineer position unique within the organization?

What sets our Cyber Security Engineer role apart is its core focus on SCADA systems critical to our public utility operations. You'll directly impact the reliability and security of services like water and wastewater management. Additionally, this position provides opportunities for continuous learning and development as you adapt to advancements in technology and cyber threats.

Join Rise to see the full answer
Common Interview Questions for Cyber Security Engineer (Systems Reliability Division)
What experience do you have with vulnerability scanning tools?

In your answer, highlight specific tools you’ve used, such as SIEM or EDR platforms. Discuss how you have implemented these tools in past roles, the types of vulnerabilities you identified, and any successful remediation efforts you contributed to that enhanced system security.

Join Rise to see the full answer
Can you explain how you approach risk assessment?

Describe your systematic approach to risk assessment, focusing on identifying vulnerabilities, analyzing potential impacts, and prioritizing them based on risk levels. Mention methodologies you use, and share examples of past assessments you've conducted and the outcomes achieved.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats?

Mention the resources you regularly consult, such as industry publications, cybersecurity blogs, webinars, and professional networks. Discuss any relevant certifications you are pursuing or attending conferences and how you apply this knowledge to enhance your work.

Join Rise to see the full answer
Describe a time you identified a significant security vulnerability.

Use the STAR (Situation, Task, Action, Result) method to structure your response. Detail the vulnerabilities discovered, the steps you took to address them, and how it contributed to overall security enhancements within the organization.

Join Rise to see the full answer
How would you handle a security breach event?

Outline your incident response protocol, emphasizing the importance of quickly identifying the breach, assessing its impact, containing the situation, and verifying restoration efforts. Discuss the significance of documentation and post-incident analysis.

Join Rise to see the full answer
What experience do you have with SCADA systems?

If applicable, share specific experiences you have related to SCADA systems, addressing any direct involvement with security measures or integrations. Highlight how your experience can help you safeguard critical infrastructure and share your understanding of SCADA complexities.

Join Rise to see the full answer
What is your experience with designing security policies?

Discuss your involvement in crafting security policies, detailing your research, stakeholder collaborations, and how you’ve evaluated the effectiveness of existing policies to enact improvements. Provide examples of policies you've designed and the outcomes it achieved.

Join Rise to see the full answer
How do you test the effectiveness of security measures?

Talk about methodologies you follow for testing, such as penetration testing and code reviews. Include tools and frameworks you commonly use and how often you recommend reviews or updates based on changing threat actors.

Join Rise to see the full answer
How do you collaborate with development teams on security concerns?

Explain your communication strategies with development teams, emphasizing the importance of integrating security throughout the development life cycle. Give examples of how you’ve contributed to secure coding practices and vulnerability remediations.

Join Rise to see the full answer
How do you prioritize multiple security tasks?

Discuss your prioritization framework, whether it’s based on potential impact, time sensitivity, or resources available. Give specific examples of how you successfully managed competing priorities in previous roles.

Join Rise to see the full answer
Similar Jobs

We are seeking a Project Manager with experience in Grants Management and Project Management for the Grants and Criminal Justice Unit.

BOCC Career Site Hybrid Tampa, Florida, United States
Posted 14 days ago
Photo of the Rise User
Today Remote No location specified
Posted 9 days ago

Join Today as a Technology Director to drive innovation and deliver impactful digital solutions.

Photo of the Rise User
City of Philadelphia Hybrid 1234 Market St, Philadelphia, PA 19107, USA
Posted 9 days ago

Step into a pivotal leadership role as the Chief Technology Officer for the City of Philadelphia, driving innovation and strategic technology initiatives.

Photo of the Rise User

Join UMMS as a Senior Program Manager to lead IT initiatives and enhance healthcare delivery through effective project management.

Photo of the Rise User

Join DecisionPoint Corporation as an IPv6 Cloud Architect to lead cloud computing strategies for USCIS.

Posted 6 days ago

Join Ignite IT as a Cloud Systems/Services Architect and lead innovative cloud solutions for important missions in American Government.

Photo of the Rise User

Join Eurofins Scientific as a Cybersecurity Testing Engineer and play a pivotal role in ensuring the safety of cutting-edge IoT technologies.

Photo of the Rise User
CGI Hybrid US, Washington DC, Washington DC
Posted 10 days ago

Join CGI Federal as a Technical DevOps Lead to guide and implement DevSecOps processes for federal applications.

Photo of the Rise User

Join Kimley-Horn as an IT Intern in Dallas to support and learn from seasoned IT professionals in a dynamic environment.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 4, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
37 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
Someone from OH, Dayton just viewed Inventory Control Analyst II at Aretum
Photo of the Rise User
Someone from OH, Dayton just viewed Business Analyst (Supply Chain project) at Nagarro
Photo of the Rise User
Someone from OH, Dayton just viewed Sr. Logistics Analyst at Innio
Photo of the Rise User
47 people applied to Cyber Crime Analyst at TEKsystems
Photo of the Rise User
36 people applied to IT Intern at USAA
Photo of the Rise User
Someone from OH, Cincinnati just viewed Forensic Nurse Examiner-Prn Shift Varies at TriHealth
Photo of the Rise User
Someone from OH, New Albany just viewed Junior Buyer at CSC Generation
Photo of the Rise User
Someone from OH, Columbus just viewed Financial Administrator Intern at Finalsite
F
Someone from OH, Columbus just viewed Part Time Support Lead at Five Below
Photo of the Rise User
Someone from OH, North Olmsted just viewed Art Director - Creative- KY at Photon
Photo of the Rise User
Someone from OH, Cleveland just viewed Account Executive, Army SOF/COCOMs at Pure Storage
Photo of the Rise User
Someone from OH, Kent just viewed IT Compliance Analyst I at Fidelity National Financial
Photo of the Rise User
Someone from OH, Dayton just viewed Music Production / Creative Intern at Landor
Photo of the Rise User
Someone from OH, Cleveland just viewed Double Remote Assistant (Central US) at Zirtual
S
Someone from OH, Cincinnati just viewed Product Manager - Remote at Substance
Photo of the Rise User
Someone from OH, Mason just viewed IT General Controls Tester at ING