{"21537916":{"jobPath":"/jobs/21537916/physical-security-systems-administrator","source":"naylor","job":"21537916","jobTitle":"Physical Security Systems Administrator"},"21541381":{"jobPath":"/jobs/21541381/security-officer-intermittent","source":"naylor","job":"21541381","jobTitle":"Security Officer-Intermittent"},"21542077":{"jobPath":"/jobs/21542077/it-business-relationship-manager","source":"naylor","job":"21542077","jobTitle":"IT Business Relationship Manager"},"21541881":{"jobPath":"/jobs/21541881/property-security-officer","source":"naylor","job":"21541881","jobTitle":"Property Security Officer"},"21541993":{"jobPath":"/jobs/21541993/director-of-it-security-risk-management","source":"naylor","job":"21541993","jobTitle":"Director of IT Security & Risk Management"},"21538794":{"jobPath":"/jobs/21538794/risk-management-claims-specialist","source":"naylor","job":"21538794","jobTitle":"Risk Management Claims Specialist"},"21536770":{"jobPath":"/jobs/21536770/information-security-compliance-analyst-iii-526822","source":"naylor","job":"21536770","jobTitle":"Information Security Compliance Analyst III - 526822"},"21538672":{"jobPath":"/jobs/21538672/risk-and-insurance-manager","source":"naylor","job":"21538672","jobTitle":"Risk and Insurance Manager"},"21541217":{"jobPath":"/jobs/21541217/audio-visual-and-it-support-technician-temporary","source":"naylor","job":"21541217","jobTitle":"Audio Visual and IT Support Technician - Temporary"},"21542109":{"jobPath":"/jobs/21542109/risk-business-analyst","source":"naylor","job":"21542109","jobTitle":"Risk & Business Analyst"},"21538755":{"jobPath":"/jobs/21538755/it-analyst","source":"naylor","job":"21538755","jobTitle":"IT Analyst "},"21536676":{"jobPath":"/jobs/21536676/information-security-analyst-i","source":"naylor","job":"21536676","jobTitle":"Information Security Analyst I"},"21539569":{"jobPath":"/jobs/21539569/it-project-manager","source":"naylor","job":"21539569","jobTitle":"IT Project Manager"},"21539028":{"jobPath":"/jobs/21539028/full-time-lecturer-for-cybersecurity-intelligence-management-program","source":"naylor","job":"21539028","jobTitle":"Full-Time Lecturer for Cybersecurity Intelligence Management Program"},"21537300":{"jobPath":"/jobs/21537300/privacy-manager","source":"naylor","job":"21537300","jobTitle":"Privacy Manager"},"21537907":{"jobPath":"/jobs/21537907/temporary-security-monitors","source":"naylor","job":"21537907","jobTitle":"Temporary Security Monitors"},"21538060":{"jobPath":"/jobs/21538060/administrative-support-coordinator-administrative-support-coordinator-i-information-technology-services-temporary","source":"naylor","job":"21538060","jobTitle":"Administrative Support Coordinator (Administrative Support Coordinator I) - Information Technology Services - Temporary"},"21538088":{"jobPath":"/jobs/21538088/senior-clinical-risk-manager","source":"naylor","job":"21538088","jobTitle":"Senior Clinical Risk Manager"},"21539573":{"jobPath":"/jobs/21539573/it-sr-project-administrator","source":"naylor","job":"21539573","jobTitle":"IT Sr. Project Administrator"},"21538089":{"jobPath":"/jobs/21538089/clinical-risk-manager","source":"naylor","job":"21538089","jobTitle":"Clinical Risk Manager"},"21539571":{"jobPath":"/jobs/21539571/enterprise-it-architect","source":"naylor","job":"21539571","jobTitle":"Enterprise IT Architect"},"21538061":{"jobPath":"/jobs/21538061/administrative-support-coordinator-administrative-support-coordinator-i-information-technology-services-temporary","source":"naylor","job":"21538061","jobTitle":"Administrative Support Coordinator (Administrative Support Coordinator I) - Information Technology Services - Temporary"},"21536588":{"jobPath":"/jobs/21536588/project-managers-designers-who-want-to-love-what-they-do-and-who-they-do-it-with","source":"naylor","job":"21536588","jobTitle":"Project Managers & Designers Who Want to Love What They Do and Who They Do It With"},"21536645":{"jobPath":"/jobs/21536645/campus-security-assistant-hourly","source":"naylor","job":"21536645","jobTitle":"Campus Security Assistant (Hourly)"},"21537217":{"jobPath":"/jobs/21537217/physical-security-project-manager","source":"naylor","job":"21537217","jobTitle":"Physical Security Project Manager"}}
This position encompasses professional and responsible technical consultative and/or administrative work. Under administrative direction of a university IT manager, with broad latitude of independent action or decision, serves as subject matter expert on IT security, identity, and access infrastructure; provides IT security architectural guidance; designs security solutions; conducts IT risk assessments and recommended mitigating solutions.
There are three (3) Assignment Levels within this classification. All personnel perform related work. Assignment Levels 2 and 3 may supervise staff. This specification describes typical assignments; related duties may be assigned as needed.
Assignment Level I
Monitors industry developments through multiple sources; consults with vendors.
Ensures compliance with university security policies and standards.
Oversees security testing plan including routine penetration testing, security controls assessments, and third-party cybersecurity engagements.
Recommends updates and improvements to university security policies and standards.
Identifies probable system exposure, compromise, problems, or design flaws and escalates issues to upper management to limit serious performance impact.
Defines, manages, and monitors data security, confidentiality, integrity, and availability.
Sets up, overs, and maintains security devices, as well as creates guidelines for identifying, reporting, and addressing computer security incidents (e.g., Security Device Management and Incident Response).
Monitors developments regarding various IT architectural platforms, including hardware, software and network communication components, operating systems, LDAP, server networking, basic load-balancing, DNS, certificate management, and HTTPS.
Reviews and analyzes design documentation to ensure appropriate security controls are in place.
Collaborates with application development, network, server, database, and storage teams regarding IT security aspects of new technologies, services, and system requirements.
Plans, defines and maintains policies, standards, configurations, and operating procedures and guidelines regarding IT security, identity, and access management in a moderate environment.
IT Security Specialist (05603) 2 of 6 Analyzes, designs, implements, tests, troubleshoots, integrates, documents, and configures moderate IT security infrastructure in coordination with others, to maximize performance and capacity. Plans, initiates and applies new moderate security infrastructure architecture or design changes.
Provides security design assistance on moderately complex new products and internally developed projects.
Assists in the development and review of moderately complex technical specifications for the procurement of various IT security systems and services, including the evaluation of vendor submissions solicited via bids, requests for information and proposals.
Participates as a team member in planning, designing, implementing, and maintaining highly secure application architecture solutions that includes network devices, servers, storage, cloud, and virtualization technologies. Participates as a team member in planning, designing, implementing, and maintaining identity and access management services that include directory services, identity integrators/connectors, authentication services, web single sign-on and federation services, role and group management and delegated administration services.
Serves as subject matter resource regarding security design of applications, networks, servers, storage and virtualization, directory services, identity connectors, authentication, web single sign-on and federation, and application servers providing delegated administration, role management, and web services.
Performs, manages and documents structured security assessment plans of moderately complex applications and infrastructure.
Assignment Level II -
In addition to Assignment Level I tasks, performs the following tasks:
Plans, defines and maintains policies, standards, configuration and operating procedures and guidelines regarding IT security, identity, and access in a complex environment.
Analyzes, designs, implements, tests, troubleshoots, integrates, documents, and configures complex IT security infrastructure in coordination with others, to maximize performance and capacity.
Plans, initiates and applies new complex security infrastructure architecture or design change.
Provides security design assistance on new products and internally developed projects.
Assists in the development and review of complex technical specifications for the procurement of various IT security systems and services, including the evaluation of vendor submissions solicited via bids, requests for information and proposals.
Leads or participates in a team in planning, designing, implementing, and maintaining highly secure application architecture solutions that includes network devices, servers, storage, and virtualization technologies.
Leads or participates in a team in planning, designing, implementing, and maintaining identity and access management services that include directory services, identity IT Security Specialist (05603) 3 of 6 integrators/connectors, authentication services, web single sign-on and federation services, role and group management and delegated administration services.
Reviews and analyzes design and/or accreditation documentation to ensure appropriate security controls are in place.
Performs security assessments of complex applications and infrastructure.
Consults with university executives to provide IT Security policy guidance. Provides training, conducts new hire orientations, and produces ongoing monthly security awareness newsletters. Serves as subject matter expert regarding security design of complex applications, networks, servers, storage and virtualization, directory services, identity connectors, authentication, web single sign-on and federation, and application servers providing delegated administration, role management, and web services.
Assignment Level III - In addition to Assignment Level I and Assignment Level II tasks, performs the following tasks:
Plans, defines and maintains policies, standards, configuration and operating procedures and guidelines regarding IT security, identity, and access in a complex enterprise scale environment.
Analyzes, designs, implements, tests, troubleshoots, integrates, documents, and configures complex, enterprise scale IT security infrastructure in coordination with others, to maximize performance and capacity.
Plans, initiates and applies new complex, enterprise scale security infrastructure architecture or design changes.
Provides security design assistance on complex, enterprise scale new products and internally developed projects.
Leads or participates in a team in planning, designing, implementing, and maintaining highly secure, enterprise scale application architecture solutions that includes network devices, servers, storage, and virtualization technologies.
Leads or participates in a team in planning, designing, implementing, and maintaining complex, enterprise identity and access management services that include directory services, identity integrators/connectors, authentication services, web single sign-on and federation services, role and group management and delegated administration services.
Serves as subject matter expert regarding security design of enterprise scale applications, networks, servers, storage and virtualization, directory services, identity connectors, authentication, web single sign-on and federation, and application servers providing delegated administration, role management, and web services. Reviews and analyzes design and/or accreditation documentation to ensure appropriate security controls are in place.
Performs security assessments of complex, enterprise scale applications and infrastructure. Consults with senior university executives to provide IT Security policy guidance.
CONTRACT TITLE
IT Security Specialist
FLSA
Non-exempt
CAMPUS SPECIFIC INFORMATION
Key responsibilities include, but are not limited to, the following:
? Assist in explaining relevant security procedures to staff and students.
? Participate in the annual Cybersecurity Awareness Month.
? Monitor relevant security programs and implement solutions to reduce or mitigate alerts before they become incidents.
? Investigate security threats as they occur.
? Install and maintain security software to protect data systems.
? Respond to data breaches and malicious malware attacks.
? Research the latest in information technology security trends to keep up to date with the subject and use the latest technology to protect information.
? Make recommendations about potential security advancements.
? Assist in developing, implementing and maintaining a security plan.
MINIMUM QUALIFICATIONS
1. A baccalaureate degree in computer science, engineering or a related field from an accredited college or university and five (5) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions; or
2. A baccalaureate degree from an accredited college or university and six (6) years of satisfactory full-time experience as described in "1" above; or
3. A high school diploma or its educational equivalent and ten (10) years of satisfactory full-time experience as described in "1" above; or
4. Education and/or experience which is equivalent to "1," "2" or "3" above. The following may substitute for some of the required experience required in "1," "2" or "3" above, as follows:
College education (undergraduate credits) may substitute for up to four (4) years of the required experience in "3" above on the following basis:
A. 30 to 59.9 semester credits substitute for 1 year of experience; or
B. 60 to 89.9 semester credits substitute for 2 years of experience; or
C. 90 to 119.9 semester credits substitute for 3 years of experience; or
D. 120 or more semester credits substitute for 4 years of experience.
Graduate credits in information technology, computer science or a related field may substitute for up to two (2) years of experience in "1" or "2" above on the following basis:
A. 15 to 29.9 graduate credits substitute for 1 year of required experience; or
B. 30 or more graduate credits substitute for 2 years of required experience.
Each of the following certifications may substitute for one (1) year of the required experience in "1," "2" or "3" above:
A. Certified Information Systems Security Professional (CISSP) issued by ISC2; and/or
B. Certified Ethical Hacker (CEH) issued by EC-Council; and/or
C. CompTIA Security+ issued by CompTIA; and/or
D. Certified Information Security Manager (CISM) issued by ISACA; and/or
E. Certified Information Security Auditor (CISA) issued by ISACA; and/or
F. GIAC Security Essentials (GSEC) issued by GIAC; and/or
G. Certified Cloud Security Professional (CCSP) issued by ISC2.
However, all candidates must have a high school diploma or its educational equivalent and at least three (3) years of experience as described in "1" above.
Assignment Level II or III:
Level II: After meeting the Qualification Requirements above, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level II.
Level III: After meeting the Qualification Requirements above and the Level II requirements, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level III (for a total of 4 years of experience above the Qualification Requirements).
English Language Proficiency: Demonstrated English language proficiency, including ability to speak, read, write, and understand English well enough to meet minimally acceptable performance standards set for job duties.
Motor Vehicle Driver License: A Motor Vehicle Driver license, valid in New York State, may be required for some, but not all positions.
Note: CUNY considers full-time work to be at least 35 hours per week. Part-time experience of at least 20 hours per week may be prorated by half and credited instead of,but not in addition to, full-time experience during the same period (e.g., two months of related work experience at 20-34 hours per week equates to one month of full-time related work experience.) Part-time experience of fewer than 20 hours per week cannot be credited at all.
COMPENSATION
For appointments expected to start on or before8/31/2025:
Salary commensurate with education and experience: $104,304
CUNY offers a comprehensive benefits package to employees and eligible dependents based on job title and classification. Employees are also offered pension and Tax-Deferred Savings Plans. Part-time employees must meet a weekly or semester work hour criteria to be eligible for health benefits. Health benefits are also extended to retirees who meet the eligibility criteria.
HOW TO APPLY
If you are viewing this job posting on any website other than CUNYfirst, please follow the instructions below:
Go to cuny.jobs
In the box under "job title/ keyword", enter "30424"
Click on "IT Security Specialist Level 1 Provisional "
Click on the "Apply Now" button and follow the instructions.
Please note that the candidates must upload a cover letter describing related qualifications and experience, resume/Curriculum Vitae, and the name and contact information of three (3) professional references as ONE DOCUMENT in any of the following formats: .doc, .docx, or .pdf format.
**Please use a simple name for the document that you uploaded, for example: JDoeResume. Documents with long names cannot be parsed by the application system.
CLOSING DATE
8/18/2025
JOB SEARCH CATEGORY
CUNY Job Posting: Information Technology/Technical
EQUAL EMPLOYMENT OPPORTUNITY
CUNY encourages people with disabilities, minorities, veterans and women to apply. At CUNY, Italian Americans are also included among our protected groups. Applicants and employees will not be discriminated against on the basis of any legally protected category, including sexual orientation or gender identity. EEO/AA/Vet/Disability Employer.
Queens College enjoys a national reputation for its liberal arts and sciences and preprofessional programs. With its extensive range of graduate and undergraduate degrees, honors programs, research opportunities, and internship placements, the college serves more than 20,000 students, mentored by an award-winning faculty. Located on a beautiful, 80-acre campus, the college has been cited for 28 consecutive years in the Princeton Review as a “Best Value” college. U.S. News and World Report and Forbes magazine also rank Queens College a “Best Value College,” thanks to its outstanding academics, generous financial aid packages, and affordability. The Equality of Opportunity Report placed Queens College in the top one percent of all colleges in moving students from poverty to prosperity. Queens College produces more education graduates who become principals, teachers, and counselors for New York City’s public schools than any other college in the metropolitan area. The college contributes to the local talent pool as a leader in tech education, and enrolls the second-most computer science majors of any college in the city. Students from across the country and around the world are att...racted to study at the Aaron Copland School of Music. Its renowned faculty and alumni include celebrated composers, conductors, and performers who have received over 100 Grammy Awards and nominations. Visit the homepage to learn more about Queens College’s stellar programs and robust campus life.