Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT).
United States Jobs Expertini

Urgent! IT Security Specialist L1- Department of Instructional Computing and Information Technology (ICIT) Job Opening In New York – Now Hiring CUNY

IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT)



Job description

IT Security Specialist L1- Department of Instructional Computing and Information Technology (ICIT)
**GENERAL DUTIES**
This position encompasses professional and responsible technical consultative and/or administrative work.

Under administrative direction of a university IT manager, with broad latitude of independent action or decision, serves as subject matter expert on IT security, identity, and access infrastructure; provides IT security architectural guidance; designs security solutions; conducts IT risk assessments and recommended mitigating solutions.
There are three (3) Assignment Levels within this classification.

All personnel perform related work.

Assignment Levels 2 and 3 may supervise staff.

This specification describes typical assignments; related duties may be assigned as needed.
To view the complete job description, go tohttp://www.cuny.edu/about/administration/offices/hr/classified-civil-service/ccsjobs/and view the Job Description for **IT Security Specialist.**
**CONTRACT TITLE**
IT Security Specialist
**FLSA**
Non-exempt
**CAMPUS SPECIFIC INFORMATION**
This position reports to the IT Academic Technology Director.
Assignment Level I
• Monitors industry developments through multiple sources; consults with vendors.
• Ensures compliance with university security policies and standards.
• Oversees security testing plan including routine penetration testing, security controls assessments, and third party cybersecurity engagements.
• Recommends updates and improvements to university security policies and standards.
• Identifies probable system exposure, compromise, problems, or design flaws and escalates issues to upper management to limit serious performance impact.
• Defines, manages, and monitors data security, confidentiality, integrity, and availability.
• Sets up, overs, and maintains security devices, as well as creates guidelines for identifying, reporting, and addressing computer security incidents (e.g., Security Device Management and Incident Response).
• Monitors developments regarding various IT architectural platforms, including hardware, software and network communication components, operating systems, LDAP, server networking, basic load-balancing, DNS, certificate management, and HTTPS.
• Reviews and analyzes design documentation to ensure appropriate security controls are in place.
• Collaborates with application development, network, server, database, and storage teams regarding IT security aspects of new technologies, services, and system requirements.
• Plans, defines and maintains policies, standards, configurations, and operating procedures and guidelines regarding IT security, identity, and access management in a moderate environment.
• Analyzes, designs, implements, tests, troubleshoots, integrates, documents, and configures moderate IT security infrastructure in coordination with others, to maximize performance and capacity.
• Plans, initiates and applies new moderate security infrastructure architecture or design changes.
• Provides security design assistance on moderately complex new products and internally developed projects.
• Assists in the development and review of moderately complex technical specifications for the procurement of various IT security systems and services, including the evaluation of vendor submissions solicited via bids, requests for information and proposals.
• Participates as a team member in planning, designing, implementing, and maintaining highly secure application architecture solutions that includes network devices, servers, storage, cloud, and virtualization technologies.
• Participates as a team member in planning, designing, implementing, and maintaining identity and access management services that include directory services, identity integrators/connectors, authentication services, web single sign-on and federation services, role and group management and delegated administration services.
• Serves as subject matter resource regarding security design of applications, networks, servers, storage and virtualization, directory services, identity connectors, authentication, web single sign-on and federation, and application servers providing delegated administration, role management, and web services.
• Performs, manages and documents structured security assessment plans of moderately complex applications and infrastructure.
**MINIMUM QUALIFICATIONS**
**1.** A baccalaureate degree in computer science, engineering or a related field from an accredited college or university **and** five (5) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions; **or**
**2.** A baccalaureate degree from an accredited college or university **and** six (6) years of satisfactory full-time experience as described in “1” above; **or**
**3.** A high school diploma or its educational equivalent **and** ten (10) years of satisfactory full-time experience as described in “1” above; **or**
**4.** Education and/or experience which is equivalent to 1, 2 or 3 above.

The following may substitute for some of the required experience required in 1, 2 or 3 above, as follows:
College education (undergraduate credits) may substitute for up to four (4) years of the required experience in 3 above on the following basis:
**A.** 30 to 59.9 semester credits substitute for 1 year of experience; **or**
**B.** 60 to 89.9 semester credits substitute for 2 years of experience; **or**
**C.** 90 to 119.9 semester credits substitute for 3 years of experience; **or**
**D.** 120 or more semester credits substitute for 4 years of experience.
Graduate credits in information technology, computer science or a related field may substitute for up to two (2) years of experience in 1 or 2 above on the following basis:
**A.** 15 to 29.9 graduate credits substitute for 1 year of required experience; **or**
**B.** 30 or more graduate credits substitute for 2 years of required experience.
Each of the following certifications may substitute for one (1) year of the required experience in 1, 2 or 3 above:
**A.** Certified Information Systems Security Professional (CISSP) issued by ISC2; **and/or**
**B.** Certified Ethical Hacker (CEH) issued by EC-Council; **and/or**
**C.** CompTIA Security+ issued by CompTIA; **and/or**
**D.** Certified Information Security Manager (CISM) issued by ISACA; **and/or**
**E.** Certified Information Security Auditor (CISA) issued by ISACA; **and/or**
**F.** GIAC Security Essentials (GSEC) issued by GIAC; **and/or**
**G.** Certified Cloud Security Professional (CCSP) issued by ISC2.
**However, all candidates must have a high school diploma or its educational equivalent and at least three (3) years of experience as described in “1” above.**
**Assignment Level II or III** **:**
**Level II:** After meeting the Qualification Requirements above, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level II.
**Level III:** After meeting the Qualification Requirements above and the Level II requirements, an additional two (2) years of satisfactory full-time experience providing IT security architectural guidance, designing security solutions, and/or conducting IT risk assessments and recommended mitigating solutions is required for Level III (for a total of 4 years of experience above the Qualification Requirements).
**English Language Proficiency** **:** Demonstrated English language proficiency, including ability to speak, read, write, and understand English well enough to meet minimally acceptable performance standards set for job duties.
**Motor Vehicle Driver License** **:** A Motor Vehicle Driver license, valid in New York State, may be required for some, but not all positions.
**Note:** CUNY considers full-time work to be at least 35 hours per week.

Part-time experience of at least 20 hours per week may be prorated by half and credited instead of,but not in addition to, full-time experience during the same period (e.g., two months of related work experience at 20-34 hours per week equates to one month of full-time related work experience.) Part-time experience of fewer than 20 hours per week **cannot** be credited at all.
**OTHER QUALIFICATIONS**
• One or more of the following certifications: CISA, CISM, CISSP, CEH
**COMPENSATION**
$104,304
**BENEFITS**
CUNY offers a comprehensive benefits package to employees and eligible dependents based on job title and classification.

Employees are also offered pension and Tax-Deferred Savings Plans.

Part-time employees must meet a weekly or semester work hour criteria to be eligible for health benefits.

Health benefits are also extended to retirees who meet the eligibility criteria.
**HOW TO APPLY**
Applications must be submitted online by accessing the CUNY portal on City University of New York job website www.cuny.edu/employment or https://cuny.jobs/ and following the CUNYFIRST job system instructions.

To search for this vacancy, click on search job listings, select more options to search for cuny jobs and enter the job opening id number.
Click on the apply now button and follow the application instructions.

Current users of the site should access their established accounts; new users should follow the instructions to set up an account.
Please have your documents available to attach into the application before you begin.

Please note that the required material must be uploaded as one document under cv/ resume (do not upload individual files for a cover letter, references, etc.).

The document must be in .doc, .docx, .pdf, .rtf, or text format- and name of file should not exceed ten (10) characters - also do not use symbols (such as accents (e, e, (a, i or 6), ii, i.i, i, -, _or¿¿)).
Incomplete applications will not be considered.
Please include:
• Cover letter and/or statement of scholarly interests
• Curriculum vitae/ resume
• Names and contact information of 3 references
Upload all documents as one single file-- pdf format preferred.
**CLOSING DATE**
The committee will begin reviewing complete applications on Sept.

1, 2025.

The search will remain open, and screening and review of applications will be ongoing-- until the position is filled.

Applications submitted after the deadline will only be considered if the position(s) remain open after initial round.
**JOB SEARCH CATEGORY**
CUNY Job Posting: Information Technology/Technical
**EQUAL EMPLOYMENT OPPORTUNITY**
CUNY encourages people with disabilities, minorities, veterans and women to apply.

At CUNY, Italian Americans are also included among our protected groups.

Applicants and employees will not be discriminated against on the basis of any legally protected category, including sexual orientation or gender identity.

EEO/AA/Vet/Disability Employer.
Job ID
30825
Location
Hunter College


Required Skill Profession

Other General



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your IT Security Potential: Insight & Career Growth Guide


  • Real-time IT Security Jobs Trends in New York, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for IT Security in New York, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 44895 jobs in United States and 1346 jobs in New York. This comprehensive analysis highlights market share and opportunities for professionals in IT Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) Job?

    Great news! is currently hiring and seeking a IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at CUNY adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in New York. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT)?

    Key qualifications for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) typically include Other General and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT)?

    To improve your chances of getting hired for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT), consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) Job Success
    CUNY interview tips for IT Security Specialist L1  Department of Instructional Computing and Information Technology (ICIT)

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the CUNY's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) interview at CUNY, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the CUNY's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) Positions

    Setting up job alerts for IT Security Specialist L1 Department of Instructional Computing and Information Technology (ICIT) is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!