Team Coordination & Cross-Work Stream Interaction:
- Facilitate coordination between cross-functional teams and work streams to ensure effective communication, knowledge sharing, and alignment across departments.
- Drive collaboration between different teams, ensuring that each work stream is on track, with clear ownership and timelines.
- Act as the main point of contact between work streams, ensuring that dependencies between teams are identified and managed proactively.
Project Oversight & Progress Monitoring:
- Develop comprehensive project plans that outline clear goals, milestones, deadlines, and responsibilities across multiple work streams.
- Track the progress of all work streams within a project, ensuring that individual streams align with overall project objectives and timelines.
- Address any delays or issues, ensuring smooth project progression and that any interdependencies are handled efficiently.
Resource Allocation & Bandwidth Management:
- Monitor team capacity and bandwidth across work streams to ensure that resources are optimally allocated and that no team or individual is overburdened.
- Reallocate resources as needed to maintain a balanced workload and ensure high-priority tasks are completed on time.
- Ensure alignment of resources across multiple work streams to avoid conflicts and optimize productivity.
Performance Tracking & Evaluation:
- Continuously monitor and evaluate the performance of teams and work streams, using data to assess productivity and identify areas for improvement.
- Provide regular feedback to team members and work stream leaders, identifying opportunities for process improvements or resource adjustments.
- Report on the status of project deliverables and team performance to senior leadership, offering insights and actionable recommendations.
Task Progression & Outcome Evaluation:
- Ensure the timely completion of tasks across work streams, making adjustments as needed to accommodate shifts in priorities or resources.
- Evaluate the outcomes of completed projects, identifying key successes and areas for future improvement.
Risk, Security & Issue Management:
- Proactively identify and address potential risks, including cybersecurity vulnerabilities or compliance issues, that may affect the progress or quality of work across different work streams.
- Develop risk mitigation plans and implement corrective actions promptly to keep projects on course.
- Ensure that all project risks, including those related to security policies and data protection, are communicated to stakeholders promptly.
- Maintain familiarity with state agency security regulations and ensure that applications and systems comply with applicable state and federal security policies and standards.
Security Collaboration & Guidance:
- Work closely with enterprise security teams to review and validate security architecture for applications across cloud, on-premises, and hybrid environments.
- Provide ongoing security guidance to application development and DevOps teams, ensuring adherence to security best practices throughout the software development lifecycle (SDLC).
- Collaborate on the implementation of secure CI/CD pipelines, integrating security checks such as static/dynamic code analysis, secrets scanning, and artifact integrity verification.
- Guide teams on proper configuration and use of cloud security services (e.g., IAM, encryption, network security controls) in platforms such as AWS, Azure, or Google Cloud.
- Assist in developing and enforcing infrastructure security standards, including secure provisioning, patch management, and hardening of resources across environments.
- Participate in threat modeling and security risk assessments to proactively identify and mitigate vulnerabilities in application design and deployment strategies.
Vendor Management & Collaboration:
- Oversee relationships with external vendors, ensuring they deliver products and services on time and within agreed-upon terms.
- Collaborate with vendors to resolve any project-related issues and ensure that their deliverables meet organizational and security standards.
- Ensure that vendor engagements include appropriate security clauses and that vendors adhere to state-mandated cybersecurity practices.
Continuous Improvement & Process Optimization:
- Identify opportunities to streamline workflows across workstreams, improve communication, and increase efficiency.
- Implement best practices and process improvements to optimize project execution, resource allocation, and team collaboration.
- Continuously integrate security best practices into the application lifecycle and project management methodologies.
Required years of experience, training, technical skills, and other requirements for job performance:
- Minimum of 7 years of experience in Application management, project oversight, and cross-functional team coordination.
- Minimum of 5 years of Experience with secure CI/CD practices and infrastructure-as-code security controls (e.g., Terraform, Ansible, GitOps).
- Minimum of 5 years of demonstrated experience with cybersecurity principles, secure application development, and compliance with state agency IT security policies.
- Minimum of 5 years of Experience in vendor management, including negotiation, performance tracking, and contract management.
- Minimum of 5 years of Experience in cloud security principles, including identity management, encryption, and network segmentation.
- Strong leadership and organizational skills with a demonstrated ability to manage and oversee multiple teams and work streams simultaneously.
- Proven experience collaborating with security architects and engineering teams to ensure secure application design and deployment.
- Expertise in project management tools and methodologies, with the ability to track performance and optimize resources effectively.
- Excellent communication skills with the ability to drive cross-functional collaboration and manage complex relationships.
- Strong problem-solving skills and the ability to manage risks and resolve issues promptly.
Preferred Skills:
- Familiarity with security tools and platforms, container security, vulnerability management, and SIEM systems is highly desired.
- Familiarity with regulatory frameworks such as NIST, HIPAA, CJIS, or other relevant government security standards is highly desired.
Educational Requirements:
- A bachelor’s degree or foreign equivalent is required from an accredited institution. Will consider three years of progressive, relevant work experience instead of every year of education. Candidates who have completed a Master’s degree program are strongly preferred.
The job entails sitting and working at a computer for extended periods. Should be able to communicate by telephone, email, or face-to-face. Travel may be required as per the job requirements.