• Mgr, Power Operations Cybersecurity

    Location TX-Austin
    # Positions
    1
  • General Overview

    Preferred candidates will have the following experience:

    • Management experience in information security, data compliance, and risk management

    • Experience in the energy or public utility sectors
    • Experience in information process coordination
    • Demonstrated understanding of all aspects of risk management, data compliance, information and security strategy, technologies and tools
    • Demonstrated experience developing and producing security and compliance metrics which are meaningful and actionable for management
    • Applicable risk management, governance and/or compliance industry qualifications (CRISC, CISA, CISM, CISSP) Experience building effective relationships with internal and external stakeholders in the IT and other business areas of a significant organization
    • Solid understanding of IT systems, applications, networks, and databases

     

    Manages and directs overall activities of assigned areas within the information security department. Focuses on particular functional areas such as enterprise cyber technology management, security operations or governance, risk and compliance. Ensures the implementation, enhancement, monitoring and enforcement of the information security policies and NIST framework.

     

    • Provides leadership and direction to staff. Hires, trains, assigns work, evaluates and manages performance evaluations to subordinate staff in compliance with policies and handles all aspects of staff supervision.
    • For all staff directly reporting to this position, develops strategic and operating plans, goals, objectives, priorities and procedures that are in alignment with the strategic goals and objectives of the LCRA.
    • Coordinates the development and implementation of information security policies, standards, procedures, and other control processes that meet the business needs.
    • Provides consultation services to IT and OT resources to ensure the appropriate security controls are implemented and maintained
    • Recommends methods to mitigate security risks
    • Develops, reviews, and submits monthly security metrics
    • Promotes and champions cybersecurity projects and initiatives.

     

    Enterprise Cyber Technology responsibilities:

     

    Provides strategic direction to the cybersecurity of LCRA’s critical operational technology infrastructure. Manages various safeguards to support the organizations compliance applicable with legal, regulatory, and security frameworks for the safeguarding of critical infrastructure and proprietary data. Works with cross functional partners balancing innovation, security, compliance, and cost all while enhancing security comprehension throughout the operational technology environments. Oversees the continuous monitoring, assessment, and patching of IT/OT assets and supporting configuration across multiple facilities and locations. Coordinates vulnerability scans as necessary to continually strengthen enterprise technology against intrusions. Drives compliance and documentation of information security requirements and NERC-CIP standards. Serves as a subject matter expert to LCRA IT and the Office of the Chief of Information Security in applying risk-based security frameworks and prioritizing technology investments. Manages a team of direct reports to execute the Enterprise Cyber Technology Program mission.

    • Identifies and implements best practices and emerging technologies in support of the enterprise technology environments and all SCADA/control systems.
    • Provides a unique mixture of business and technology expertise to develop risk-focused security strategic plans that define how security can create value for the business areas. Work alongside business leaders to define holistic strategies that combine business objectives with security opportunities to drive operational reliability.
    • Identifies security issues within the OT environment and develops strategies to address identified issues.
    • Provides technical leadership within the industrial controls system environment and SCADA environments supporting critical infrastructure.
    • Defines and implements processes, initiatives, and technologies consistent with the LCRA’s enterprise risk management posture and information security objectives.
    • Oversees the continuous monitoring, assessments, and patching of OT assets and supporting configuration across multiple facilities and locations.
    • Coordinates vulnerability scans as necessary to continually strengthen enterprise technology against intrusions.
    • Leads development and continuous assessment of OT cybersecurity policies, strategies, and supporting architecture
    • Works with vendors, if applicable, to deploy hardware/software solutions, system upgrades and asset management strategies that align with cybersecurity best practices essential to the utility industry.
    • Works closely with ISO resources to coordinate security activities and ensure compliance standards and security framework are aligned and implemented in accordance with the ISO security policies.
    • Provides leadership and training to a team of IT/OT System Administrator operating throughout various facilities and locations.
    • Acts as a liaison between ISO and IT on the behalf of OT.
    • Maintains reliable, up-to-date information from the government and across the industry regarding identification of new threats and vulnerabilities.
    • Leads development and continuous assessment of IT/OT cybersecurity policies, strategies, and supporting architecture.
    • Understands how the business plan and operations are impacted by all new and existing information security technologies, and regulatory changes.
    • Ensure implementation of security configuration standards within the OT environment.
    • Provides expertise and recommendations related to the security posture of the organization in relation to security threats and best practices.

     

    Security Operations responsibilities:

     

    Provides leadership to the information security operations group. Ensure that the organization's staff, policies, processes, practices, and technologies monitor ongoing operations and actively hunt for and detect adversaries, and report instances of suspicious and unauthorized events as expeditiously as possible. Minimizes the impact of cybersecurity incidents and ensures technologies are rapidly deployed to return assets to normal operations as soon as possible.

    • Responsible for information security engineering and technical security controls.
    • Responsible for managing operations of security systems such as; SIEM, IDS/IPS, endpoint security tools, web and email security systems.
    • Responsible for ensuring that tools and/or technologies are implemented to reduce risk.
    • Responsible for maintaining NERC CIP regulatory compliance of technical security systems.
    • Leads cybersecurity incident response and management activities.
    • Facilitates cybersecurity incident response exercises and events.
    • Provides expertise and leads digital forensics investigations
    • Serves as the primary interface between ISO and IT related to operational matters.
    • Provides expertise and leads threat monitoring.
    • Identifies current and potential threats to information systems.
    • Works closely with ISO and IT staff to mitigate and manage threats.
    • Identifies trends and provides recommendations for potential solutions and operational improvements.

     

    Governance, Risk and Compliance responsibilities:

     

    Works closely with leadership from the Office of the CISO and other leadership and management team members to build and maintain a strong security governance, risk and compliance program. This position will focus on all aspects of security risk management and data. Responsible for building a risk-based framework in accordance with NIST 800-53 and mapping that framework to other regulatory requirements of the organization such as PCI, NERC-CIP and any others that may be required. In addition, the role will be responsible for LCRA’s overall compliance with security policy, security standards, and the overall risk-based security framework including reporting of said compliance. Works closely with key business units such as IT, Legal, Audit, Generation, Transmission, Telecom, and Senior Management. Serves as key point of contact for senior executive management and will be available to report at senior executive level on matters within their purview; particularly compliance, data security, risk management and overall security governance. Responsible for determining and establishing the approach by which Security Risk Management team (SRM) will manage and govern risk and compliance, which includes the design, collation, review, analysis, distribution and communication of the framework.

     

    • Leads the execution of vulnerability management, information security, and data compliance corporate initiatives across all the business units.
    • Responsible for performing vulnerability assessments.
    • Develops action plans, schedules, budgets, status reports and metrics to improve the status of vulnerability management, information security, and data compliance at LCRA.
    • Promotes data compliance standards, policies and procedures; ensure that these artifacts are disseminated, understood and implemented across the business.
    • Ensures that appropriate follow-up is conducted for security violations
    • Responsible for the development of required corrective action plans relating to data compliance issues.
    • Researches and evaluates new compliance requirements and ensure they are incorporated into LCRA’s security policy framework.
    • Defines and implements a risk-based approach to identifying, monitoring, measuring and reporting various types of security risk and compliance issues.
    • Identifies and prioritizes risk management, information security, and compliance risks and recommend mitigating controls.
    • Leads security and risk assessments of internal business units and external vendors and service providers.
    • Develops and updates the Enterprise Security Policies and supporting documentation.
    • Responsible for cyber vulnerability assessments in accordance with NERC CIP regulatory requirements
    • Provides governance for the identification, validation and remediation of information technology controls required by Payment Cardholder Information Data Security Standards (PCI DSS), Personally Identifiable Information (PII), and other regulatory compliance frameworks. Ensures successful audits of these compliance programs.

     

    This general overview only includes essential functions of the job and does not imply that these are the only duties to be performed by the employee occupying this position. Employees will be required to follow any other job-related instruction and to perform any other job-related duties requested by supervisor or management.

     

     

    Minimum Qualifications

    Twelve or more years of experience in information security, audit management, and/or development and implementation of operational strategies, governance strategies and internal controls, including experience serving as an interface between functional areas and leading security and regulatory changes. A degree(s) in computer science, information systems, information technology, engineering, business or relevant field may be substituted per LCRA guidelines for certain years of experience.

    Preferred Qualifications

    • Management experience in information security, data compliance, and risk management

    • Experience in the energy or public utility sectors
    • Experience in information process coordination
    • Demonstrated understanding of all aspects of risk management, data compliance, information and security strategy, technologies and tools
    • Demonstrated experience developing and producing security and compliance metrics which are meaningful and actionable for management
    • Applicable risk management, governance and/or compliance industry qualifications (CRISC, CISA, CISM, CISSP) Experience building effective relationships with internal and external stakeholders in the IT and other business areas of a significant organization
    • Solid understanding of IT systems, applications, networks, and databases

     

    Options

    <p style="margin: 0px;">Our apologies, as the Share function is not&nbsp;functioning properly at this moment. Please refresh the page and try again later. Thank you.</p>
    Share on your newsfeed