Tampa Electric Company
Tampa Electric
Irving Oil
CPS Energy
Florida Power & Light
Brownsville Public Utilities Board (BPUB)
Siemens Energy
Entergy
Centrus Energy Corp.
Southern Company
Southern Company
Southern Company
Pattern Energy
Constellation
Constellation Energy
Tampa Electric Company
Oxy
Occidental
Ampirical
New York Power Authority
Be the light to help us keep our customers connected. If you are interested in a career and not just a position, Tampa Electric is the place to be! Tampa Electric offers competitive pay, a comprehensive benefits package and opportunities for growth and development in a friendly and professional work environment. We embrace diversity and the inclusion of all. We believe our differences, unique perspectives and talents are our strengths and integral to the success of our company.
We’re honored to serve approximately 780,000 customers across West Central Florida and safely provide them with clean, affordable and reliable electricity. We’ve been doing it for more than 100 years, and there’s so much more ahead.
Join our team of energy experts as we build on that legacy through innovation, continued solar investments, cost-effective and sustainable energy solutions all while keeping top-notch customer service at the center of all we do.
Title: Enterprise Cyber Security Solution Architect Company: Tampa Electric Company Location: Ybor Data Center
State and City: Florida - Ybor City
Shift: 8 Hr. X 5 DaysTITLE: Enterprise Cyber Security Solution Architect
PERFORMANCE COACH: Manager Cyber Protection
COMPANY: Tampa Electric DEPARTMENT: Information SecurityPOSITION CONCEPT
The Enterprise Cyber Security Solution Architect focuses on implementing safeguards to ensure the delivery of critical infrastructure services and to limit the impact of potential cybersecurity events. Responsible for implementing a robust defense against cyberattacks and ensures the confidentiality, integrity, and availability of an organization’s assets. Developing and managing the organization’s protection mechanisms to safeguard its critical assets. Responsible for designing and implementing technologies and processes for the following cybersecurity controls: Identity and Access Management (IAM), Data Protection, Application Security, and Infrastructure Security. Collaborates with other teams such as Technology, Legal, and business to identify and reduce cyber risks and positions the company to comply to laws, regulations, and company policies. Helps the organization protect assets from evolving cyber threats, stay in compliance with regulatory mandates, and foster a cyber risk aware culture. Serves as a solution orientated problem-solver with demonstrated knowledge of information security best practices. Ensures the integrity of the company’s information resources at the network, operating system, and application levels.
PRIMARY DUTIES AND RESPONSIBILITIES
1. IAM: Designs, implements, and manages an organization’s privileged access management (PAM), identity governance and administration (IGA), and other IAM systems to ensure secure and controlled access to resources with a focus on protecting data by managing user identities, credentials, and permissions, and ensuring compliance with relevant security standards and regulations. Responsible for continuous improvement and robust support for IAM toolsets and IGA processes. Provide overall direction, guidance, definition, and integration of operational processes of new and existing team members, contractor, and other enterprise identities and associated access. 30%
2. Data Protection: Designs, implements, and manages data loss prevention (DLP) strategies and technologies to protect sensitive data from unauthorized access, use, or disclosure. Additionally, designs the file integrity monitoring (FIM) architecture, including the choice of FIM tools, agents, monitoring protocols, and baseline creation. Responsible for the deployment and configuration of the FIM solution across the organization’s infrastructure with the intent of protecting critical files and directories from unauthorized modifications. 30%
3. Application Security: Responsible for the design and implementation of secure applications which include creating secure reference architectures, patterns, and coding guidelines. Collaborate closely with developers to integrate security into the software development lifecycle (SDLC). Educate team members on secure coding practices and other security policies. Develop and maintain security policies and procedures that ensure the organization’s applications are secure and compliant with industry standards and regulatory requirements. 20%
4. Infrastructure Security: Responsible for ensuring the security of various aspects of the infrastructure, including network security, system security, and application security. Collaborate closely with owners of security controls such as firewalls, intrusion detection systems, VPNs, etc. to ensure security policies and standards are followed and consistently enforced throughout the organization. Identify and mitigate security vulnerabilities, develop and enforce security policies, and respond to security incidents. 20%
RELATIONSHIPS
Key Internal: Will engage multiple Information Technology (IT) groups and business units. Interactive engagement will require communication with individual contributors, middle management, and executive management.
Key External: Will engage external contacts including vendors, contractors, regulatory agencies, industry associations, and other utility partners.
QUALIFICATIONS
Education
Required: Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems or other IT or Engineering related field.Preferred: Master’s Degree in Cybersecurity, Computer Science, Information Systems or other IT or Engineering related field.
Licenses/Certifications Required: From the list of certification vendors, two related Information Security professional certification or ability to obtain via self-study within one year of hire date (ex: (ISC)2, GIAC, ISACA, CompTIA, e-Council, etc.).
Preferred: ITIL v3 and three or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CEH, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).
Related Experience Required: 8 years of related Cyber Security or IT experience (Information Systems Audit or Assessor role, Information Security role, systems management, systems administration, information systems security, system certification, risk analysis) with a focus on DLP and/or FIM solutions and security controls.
May consider a degree in lieu of experience. An Associates degree in Computer Science, Information Systems or other IT related discipline and 6 years of experience or a Bachelors in Computer Science, Information Systems or other IT related discipline and 3 years of experience.
Competitive Salary 401k Savings plan w/ company matching Pension plan Paid time off Paid Holiday time Medical, Prescription Drug, & Dental Coverage Tuition Assistance Program Employee Assistance Program Wellness Programs On-site Fitness Centers Bonus Plan and more!