Apply Now Clicking "Apply Now" opens the link in a new window.

How to Apply

A cover letter is required for consideration for this position and should be attached as the first page of your resume. The cover letter should address your specific interest in the position and outline skills and experience that directly relate to this position.

Responsibilities*

Performs and/or manages risk assessments and vulnerability scans on University assets. Maintains compliance with the University of Michigan security program. Evaluates risk assessment findings and recommends options for remediation of any discovered threats.  Works with appropriate staff to implement remediation of threats/vulnerabilities. 

Works with both commercial vendor products and open source software to create comprehensive security toolsets. Participates in the evaluation of proposed systems, applications, and network software to determine security or data integrity implications. Makes detailed recommendations based on technical knowledge of system architectures. Interfaces with campus community to understand their security needs and implements procedures to accommodate them.

Serves as a technical resource for other unit staff. Assist in project management by helping to develop implementation plans and timelines, providing status reports, exchanging relevant information with management and technical teams, and meeting timelines established.

Develop global security policies, procedures, standards, guidelines and systems for the management of data systems, firewalls and remote access for the university network.  Ensure the University is compliant with applicable laws and regulations.

Attends training, seminars, and security conferences. Keeps abreast of the state of the art in security hardware and software.

Represents The University of Michigan – Flint Campus at University security meetings.

Required Qualifications*

Department Qualifications:

Bachelor’s degree in Computer Science or Computer Engineering or related field; consideration may be given to applicants nearing completion of degree who have additional significant relevant job experience and training.

3+ years of professional experience in cybersecurity.  Applicants with less experience will be considered at an associate level underfill.

Demonstrated proficiency working with multiple operating systems including Linux and Windows.

Demonstrated knowledge of IP networking, networking protocols and an understanding of security related technologies including encryption, VPN, firewalls, proxy services, vulnerability scanners, IDS/IPS, risk assessment methodologies, regulations such as HIPAA, FERPA, GLBA, PCI-DSS, ISO 27001:2013.

Demonstrated knowledge of  information, computer, and communications security principles.  Experience in communicating and documenting adherence to established security procedures.

Experience programming/scripting.

Must be able to develop and give presentations to senior level management.

Experience coordinating and completing multiple tasks within established and changing deadlines. 

Must be able to work independently and proactively and possess an ability to contribute and collaborate effectively as a member of a highly-functioning and productive team. 

 Excellent organizational, analytical, and independent problem solving skills. 

 Demonstrated excellent oral and written communication skills necessary to interact effectively with colleagues and University personnel with users of varying technological skill levels.

Demonstrated good work habits, dependability, punctuality, flexibility, and attendance.

Demonstrated willingness to learn and comprehend additional technical skills.

Experience performing detailed risk assessments against computer assets and developing/executing remediation plans.

Applicants with less experience or qualifications may be considered at an associate level underfill.

Desired Qualifications*

Certification from nationally recognized information security training organizations such as the SANS-GIAC , ISC2, mile2, etc.

 

Experience using Nessus, Splunk, Next Gen Firewalls, packet analysis tools such as tcpdump.

Background Screening

The University of Michigan conducts background checks on all job candidates upon acceptance of a contingent offer and may use a third party administrator to conduct background checks.  Background checks are performed in compliance with the Fair Credit Reporting Act.

U-M EEO/AA Statement

The University of Michigan is an equal opportunity/affirmative action employer.