Job Class Search

Job Details


The State Chief Security Officer is responsible for determining and implementing enterprise information security standards. This position ensures that all information systems are functional

Class Code:


Job Grade:


Special Job Requirements:

Plans and participates in on-call schedule for the agency. Occasional travel to state agencies and institutions is required during the year.

Typical Functions:

Develops plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure, and meets emergency data processing needs. Analyzes strategic cyber security measures to align resources to protect more than one organization and lower information technology security costs for organizations by utilizing common solutions. Confers with users to discuss issues such as computer data access needs, security violations, and programming changes. Monitors current reports of computer viruses to determine when to update virus protection systems. Plans modifications of computer security files to incorporate new software, correct errors, or change individual access status. Manages information technology security projects and personnel, and coordinates implementation of computer system plans with state agency/institution personnel and outside vendors. Plans and coordinates risk assessments and tests of data processing systems to ensure functioning of data processing activities and security measures. Acts as a focal point of communication on cyber security issues for state agencies and institutions, and provides information technology security education for the state’s public organizations through presentations, websites, and brochures. Documents computer security and emergency measures policies, procedures, and tests. Maintains relationships with local, state, and federal law enforcement and other related government agencies. Performs other duties as assigned.

Knowledge, Abilities, and Skills:

Knowledge of security applications analysis and determining how security applications should work and how changes in conditions, operations, and the environment will affect outcomes. Knowledge of security industry technologies and methods. Knowledge of business continuity planning, auditing, risk management, and contract negotiation. Knowledge of technology design and generating or adapting equipment and technology to serve user needs. Knowledge of business and management principles involved in strategic planning and coordination of people and resources. Ability to identify complex problems and review related information to develop and evaluate options and implement solutions. Ability to determine causes of security software operating errors and to determine solutions. Ability to undertake risk analysis and threat assessments.

Minimum Qualifications:

The formal education equivalent of a bachelor’s degree in computer science, mathematics, or related field; plus nine years of progressively more responsible experience in systems administration, systems security or a related field, including five years in a supervisory capacity. OR Completion of technical training in computer science, data processing, or a related field acquired from a vocational, military or industrial setting, plus nine years of progressively more responsible experience in systems administration, systems security or a related field, including five years in a supervisory capacity.

Required Certificates:

Must possess a valid Arkansas driver’s license.


Scroll to Top