Department SummaryThe UCLA Information Security Office enables UCLA's goals by providing leadership assuring the confidentiality, integrity, and availability of its information resources. The Information Security Office enables efficient incident response planning and notification procedures. In addition, the office aims to implement risk assessment strategies to identify vulnerabilities and threats to departmental information resources and enterprise systems. This includes executing a comprehensive UCLA IT security plan, which involves proposing, delivering, and enforcing administrative, technical, and physical security measures to tackle identified risks based on their sensitivity or criticality.Position SummaryThe UCLA Office of Information Security has established a program to collaborate with the campus community and organizations to implement information security best practices, technologies, and initiatives that modernize and elevate our information security programs that protect our institution.The Unit Information Security Specialist (UISS) will collaborate with assigned organizations and the Unit Information Security Manager to contribute to the analysis of organizational information security needs, supporting processes and practices that conform with campus security standards, and to provide support with the implementation of technologies and services that protect institutional data. Additionally, the Unit Information Security Specialist will engage with departmental technical and security staff members to ensure effective collaboration regarding policies, initiatives and procedures that are implemented within assigned organizations. The Unit Information Security Specialist will collaborate with departmental and IT Services team members to coordinate the delivery of services and capabilities that align with security programs and policies. This team member will advance the University's mission by delivering exceptional security service comprehensively and consistently across faculty, staff, and students. This role will execute UCLA's vision while modeling UCLA's culture and values.Salary & Compensation*UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit to discover benefits that start on day one, and to calculate the total compensation value with benefits.Qualifications
- Three years experience working in one or more of the following fields: cybersecurity, information technology, computer science, computer information systems, etc. (Required)
- Experience working in a project-based environment using leading project management practices including schedule management, status reporting, and communication of project risks and issues. (Required)
- Experience participating in activities to advance an inclusive environment that values equity, diversity, inclusion and belonging. (Required)
- Five years experience working in one or more of the following fields: cybersecurity, information technology, computer science, computer information systems, etc. (Preferred)
- Understanding and working knowledge of Information Security fundamentals and proven experience using IT systems and tools. (Required)
- Understanding of the relationship between threat, vulnerability, and information value in the context of Information Security risk management. (Required)
- Ability to coordinate closely with other Information Security teams to effectively address security breaches or incidents. (Required)
- Demonstrated interpersonal skills, enabling productive collaboration with both technical and non-technical personnel at various levels across the University. (Required)
- Strong written and verbal communication skills and is able to communicate technical information and ideas to a diverse community of colleagues and stakeholders. (Required)
- Able to establish and advance positive working relationships and a strong rapport with team members, stakeholders, and customers. (Required)
- Strong organizational skills and ability to balance competing priorities and support concurrent projects. (Required)
- Strong demonstrated problem-solving skills; scopes solutions based on knowledge of available resources and timelines. Able to ask questions, gather information, evaluate options, and make decisions with integrity. (Required)
- Thinks creatively and proposes innovative ideas, including the incorporation of new technologies or processes. Is able to work with agility in a fast-paced environment. (Required)
- Demonstrated understanding of privacy and security regulations and best practices, including federal and state laws, policies, and standards relevant to higher education. Knowledge of data classification and ability to educate on data classification requirements. (Preferred)
- Understanding of user lifecycle access activities, as well as identity and access management controls. (Preferred)Education, Licenses, Certifications & Personal Affiliations
- Bachelor's Degree in one or more of the following fields: cybersecurity, information technology, computer science, engineering or equivalent experience/training. (Required)
- One or more of the following: CISSP, CISA, Security+, CEH, CISM, or equivalent certification (Preferred)Special Conditions for Employment
- This is a two year contract appointment. This position is eligible for a hybrid work arrangement that includes regular visits to campus as needed (for those who work remotely, travel/lodging expenses are not eligible for reimbursement).The anticipated pay range for this position is $110,000-$120,000, annually; salary is dependent upon the skills and experience of the selected finalist.NOTE: This position REQUIRES that a RESUME and COVER LETTER be submitted in addition to the application. Please have these two files ready to upload when applying.
- Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation.
- Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment.Schedule8:00 A.M. to 5:00 P.M. PT, Monday through Friday and/or variable based upon operational needs.Union/Policy Covered99-Policy CoveredComplete Position Description #J-18808-Ljbffr