At University Information Technology Services (UITS) we ensure a workplace that encourages growth, flexibility, and creativity, as well as a culture that champions inclusion, diversity, and overall employee well-being through programs supported university wide. Our core values define who we are, how we act and what we aspire to, which helps us to make amazing things happen in each neighborhood, community, and county we touch. As an Equal Opportunity Employer, we believe in each person's potential, and we'll help you reach yours.
Performs advanced examination of complicated and disparate technical and data architectures by applying highly specialized training and experiences to identify and rectify technical and information security vulnerabilities.
Provide technical guidance on matters of security, systems administration, and emerging threats while making educated judgments as to risk versus benefit and cost of protections.
Steers and participates in university technology projects, applying experience and providing tactical and strategic input that could have a direct impact on important technology decisions made at the highest levels of the university.
This role includes incident response duties such as participating in or heading computer emergency response teams, threat hunting, and exercising limited unilateral authority to remove high-risk technology components from service.
In order to provide a very high level of technical security and practical consulting, you will have the opportunity to gain and maintain a significant depth of knowledge in many dynamic technology areas.
May liaise with technical staff in units throughout the university and communicate about threats with technical staff at IU and your peers throughout higher education.
Designs, develops, and implements advanced information security software and systems to address security exposures and potential threats; evaluates, recommends, and implements vended security software.
Acts as point of escalation for response to information security incidents; may provide leadership for information security emergency response teams and/or for other information security projects.
Provides advanced level of information security technical and practical consulting; makes recommendations on appropriate strategic security actions; performs digital forensic investigations as appropriate.
Develops and implements advanced solutions to address complicated information security vulnerabilities and threats; partners with information security analysts to ensure exposures and risks are avoided and/or addressed.
Documents solutions and may write reports and/or papers as needed.
Researches and stays abreast of current higher education information security environment and trends; stays up-to-date on information security engineering best practices, tools, and approaches; disseminates information to team members and junior peers to promote best practices as appropriate.
Collaborates and participates in committees to share and improve information security practices across the university.
Often provides guidance and support to junior peers.
Bachelor's degree (preferably in Computer Science or a related field).
5 years of information security or related experience.
6 years of advanced systems analysis/, programming, and/or system administration experience.
2 years of experience in development, administration, and maintenance of security systems and software.
2 years of computer security/abuse incident response and investigation experience.
Combinations of related education and experience may be considered.
Proficient communication skills.
Maintains a high degree of professionalism.
Demonstrated time management and priority setting skills.
Demonstrates a high commitment to quality.
Possesses flexibility to work in a fast paced, dynamic environment.
Seeks to acquire knowledge in area of specialty.
Highly thorough and dependable.
Demonstrates a high level of accuracy, even under pressure.
Possesses a high degree of initiative.
Ability to influence internal and/or external constituents.
Creativity in identifying complex problems and finding solutions quickly and accurately.
Attention to detail in communicating technical issues and implementing solutions.
Mental discipline in conducting lengthy investigations.
Ability to change priorities as incidents and threats develop or evolve.
Demonstrated ability to apply security tools in small- and large-scale vulnerability assessments (vulnerability scanners, password cracking tools, etc.).
Demonstrated in-depth knowledge of Microsoft Windows or Unix-like operating systems.
Extensive working knowledge of the IP protocol suite, specifically relating to TCP and UDP protocol behavior and interdependencies with the applications suite (DNS, SMTP, HTTP, SSL/SSH, etc.).
A demonstrated knowledge of packet capture tools (tcpdump/Wireshark), NetFlow, firewalls, and router ACLs.
Extensive working knowledge of operating systems and the utilities used in system administration, system and kernel customization, security analysis tools, system logging, and security incident diagnosis.
A demonstrated ability to program in C, Perl, Python, or other widely-used, general purpose language.
A demonstrated ability to apply security tools in small- and large-scale vulnerability assessments (vulnerability scanners, password cracking tools, etc.).
A demonstrated ability to clearly and effectively document the areas of primary responsibility.
A demonstrated knowledge of intrusion detection and prevention systems is desired, especially Suricata and/or Zeek.
Experience deploying services in a cloud environment and/or architecting cloud deployments.
Experience in a university-based technology environment.
Working Conditions / Demands
This role requires the ability to effectively communicate and to operate a computer and other standard office productivity equipment. The position involves sedentary work as well as periods of time moving around an office environment and the campus. The person in this role must be able to perform the essential functions with or without an accommodation.
Bloomington, Indiana or Indianapolis, Indiana
This position has the potential for a remote work arrangement.
Due to the COVID-19 pandemic, there may be differences in the working conditions as advertised in our standard job postings (e.g., the ability to travel from one campus to another, etc.). If you are invited for an interview, please discuss your questions or concerns regarding the working conditions at that time.
This posting is scheduled to close at 11:59 pm EST on the advertised Close Date. This posting may be closed at any time at the discretion of the University, but will remain open for a minimum of 5 business days. To guarantee full consideration, please submit your application within 5 business days of the Posted Date.
If you wish to include a cover letter, you may include it with your resume when uploading attachments.
New employees will be provided with information regarding Indiana University's COVID-19 vaccine policy, which includes the opportunity to request an exemption. To learn more, view our COVID-19 vaccine information page .
Equal Employment Opportunity
Indiana University is an equal employment and affirmative action employer and a provider of ADA services. All qualified applicants will receive consideration for employment without regard to age, ethnicity, color, race, religion, sex, sexual orientation, gender identity or expression, genetic information, marital status, national origin, disability status or protected veteran status. Indiana University does not discriminate on the basis of sex in its educational programs and activities, including employment and admission, as required by Title IX. Questions or complaints regarding Title IX may be referred to the U.S. Department of Education Office for Civil Rights or the university Title IX Coordinator. See Indiana University's Notice of Non-Discrimination here which includes contact information .
Campus Safety and Security
The Annual Security and Fire Safety Report, containing policy statements, crime and fire statistics for all Indiana University campuses, is available online . You may also request a physical copy by emailing IU Public Safety at firstname.lastname@example.org or by visiting IUPD.
About Indiana University Purdue University Indianpolis - IUPUI
Founded in 1820, Indiana University is the state’s public university system, comprised of two core campuses—IU-Bloomington and IUPUI—and six regional campuses located throughout the state. Combined, the total student population is more than 114,000 undergraduate, graduate and professional school students. IU is one of the largest employers in the state, with over 20,000 faculty and staff. Indiana University is an equal employment and affirmative action employer and a provider of ADA services. Diversity and inclusion remains a core commitment to IU’s mission to cultivate an educational environment that supports equal access, participation and representation on all of its campuses and that provides educational and career opportunities for all.