Employment Opportunity

Information Technology Cyber Security Manager

State Court Administrator's Office, Minnesota Judicial Center, St. Paul, Minnesota

Salary: $80,262.72 - $124,340.40 Annually

Final Filing Date: Continuous

The Information Technology Division of the State Court Administrator's Office is seeking a Managerial level security engineer or architect to assume an advanced technical role within the Minnesota Judicial Branch to ensure that information and assets are adequately protected against internal/external threats.

This position operates within one or more of the following security domain areas: system access, telecommunications and network security, security management practices, application and system development security, cryptography, security architecture and models, operational security, security related incidents, incident management, legal investigations, and/or computer forensics systems.

You will work as part of the Information Technology team. Work includes defining the scope of the security program; designing and developing network and host-based security policies in accordance with standards, policies, regulations and state and federal laws; providing real-time network intrusion response; auditing and performing network security evaluations; calculating risks to the branch and recommending remediation actions; developing and coordinating internal and external consensus for managing an organizational forensic program; and analyzing and communicating security information to staff regarding specific threats and vulnerabilities.

This position will be responsible for leading the work of one or more security analysts and will provide work direction to others within the Information Technology Division.

Duties and Requirements Click to read more


  • Develop short and long term staffing resourcing plans
  • Work with ITD and HR to recruit, interview, select, and hire staff
  • Provide oversight and direction to employees in the cyber security unit in accordance with the policies and procedures, approve timesheets and leave requests, assign resources to organizational projects and work efforts
  • Coach, mentor and develop staff, including overseeing new employee onboarding, performance evaluations, development plans and career goals
  • Communicate concisely and regularly with other managers, directors, organizational leadership, stakeholders, and vendors
  • Create clear goals and expectations for the cyber security unit
  • Participate in industry training to remain current in any cyber security related expertise, including any new or updates to certifications
  • Participate in establishing a cyber security budget including recommendations, purchase, and implementation for tools and appliances used to maintain strong security within the focus areas of the program
  • Serve as high-level technical subject matter resource and provide functional expertise in multiple areas of the cyber security domain areas
  • Research the security implications of proposed initiatives and potential risk mitigation options
  • Create and participate in the deployment and implementation of the appropriate security controls
  • Monitor the effectiveness of the controls in achieving objectives and communicate findings to management through presentations, status reports and meetings
  • Develop and maintain internal and external relationships critical to supporting Cyber Security Incident Response (CSIR) activities.
  • Advise the organization as a subject matter expert on Cyber Security Incident Response.
  • Develop and maintain incident response strategy and the ITD Cyber Security Incident Response (CSIR) Plan.
  • Develop and deliver table-top exercises for the organizational incident response team. Table-top exercises assess the effectiveness of cyber incident response capabilities across people, processes, and technology. Define table-top exercise objectives, roadmap, and coordinate efforts across MJB.
  • Provide strategic leadership and assist in short and long term strategic objectives for the Cyber Security Program
  • Specify strategic security plans for network and telecommunications in accordance with established policy in order to meet organizational security goals.
  • Conduct risk management assessments; providing assistance in the identification, prioritization and remediation of information systems vulnerabilities to diverse users.
  • Participate in the deployment and implementation of the appropriate security controls.
  • Develop network and telecommunications security operations and maintenance standard operating procedures.
  • Develop effective network domain security controls in accordance with enterprise, network and host-based policies.
  • Develop network security and telecommunication performance reports, audit processes, guidelines, and procedures.
  • Coordinate and build internal and external consensus for developing and managing an organizational digital forensic program.
  • Establish a digital forensic team composed of IT professionals and incident handlers.
  • Maintain current knowledge of forensic tools and processes.


  • Excellent analytical and problem solving skills and the ability to deal with complex projects and tasks.
  • Ability to communicate effectively both orally and in writing with a wide range of technical and business partners regarding complex network and telecommunications technology and to translate that into terms understandable to non-technical employees.
  • Strong interpersonal skills with emphasis on customer service, conflict management, and teamwork.
  • Experience working in a team-oriented, collaborative environment.
  • Ability to plan, organize, and performs work within deadlines with minimal supervision.
  • Skill in leading projects or teams of professional and technical staff.
  • Ability to absorb new concepts and adapt quickly to change.
  • Possession of a Bachelor's degree in computer sciences, management information systems or related field.
  • Minimum of 8 years' experience in cyber security, networking and infrastructure architecture. Experience with firewalls, intrusion detection, assessment tools, encryption, computer forensics, certificate authority, web, and security related application development.
  • CEH – Certified Ethical Hacker
  • Successful candidate will be subject to a criminal background check.
  • 2 years management or supervisory experience in IT, networking or cyber security
  • Certification in any; CISM – Certified Information Security Manager, GSEC: SANS GIAC Security Essentials, CISSP: Certified Information Systems Security Professional , CISM: Certified Information Security Manager
  • Working knowledge of: ITIL and COBIT; FISMA and CIPSEA
  • Experience with security event correlation tools

Do you have the Education Required? See available on-line and campus-based degree programs now!

How to apply: Apply online

Posted: December 26, 2016

NOTE: The is not responsible for typographical errors or omissions in employment notices on this web site. Often, employers change final filing dates, change duties and/or requirements, or close employment openings without notice. If you are interested in a job posted on this site be sure to contact the employer to see if changes in the filing date or job announcement have been made. Employers can also provide more information about open positions that does not appear in the announcements on these pages.