Reporting to the Chief Information & Campus Services Officer (CICSO), the Director of Infrastructure and Security is responsible for oversight of the College’s IT security program and its server, storage, networking, and cloud infrastructure. This position manages the Infrastructure and Security staff in Academic and Institutional Technology, providing vision and leadership to ensure reliable, scalable, secure, strategic, and cost-effective operation of Wheaton’s IT infrastructure.
Duties and Responsibilities
Provide vision and leadership in the design and implementation of appropriate IT infrastructure that leverages on-premise and cloud technology solutions to deliver the optimal hosting environment for a variety of services and workloads.
Lead the college’s IT security program to ensure appropriate security controls are implemented to protect College data and technology resources at a level commensurate with their classification and risk.
Lead and mentor the Infrastructure and Security team and support continuous development of their professional skills and ensure a high level of service to the College, rapid response to service disruption and security incidents, and the reliable, scalable, secure, and cost-effective operation of all infrastructure and security systems and services.
Collaborate with other AIT units and key campus stakeholders to develop strategic, innovative, efficient, and cost-effective technology solutions that align with academic and business needs of the college.
Oversee development of appropriate security-related policies and compliance with relevant security standards and regulations and manage the relationship with vendors to ensure appropriate controls are in place to protect College data.
Oversee the college data network and unified communications services, including the wired and wireless network infrastructure, cabling, Internet service, unified communications systems, e911 service, and the digital fax service.
Oversee College server and storage infrastructure in the two on-premise data centers and the cloud, including Linux and Windows virtual machines, Storage Area Network (SAN) and cloud storage, backups that facilitate both incidental loss protection and full disaster recovery for critical enterprise systems, and enterprise services such as Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), IP Address Management (IPAM), Network Time Protocol (NTP), and Active Directory.
Oversee support of the high-performance computing cluster used by computational researchers, and the Linux-based infrastructure used by the computer science department.
Manage vendor relationships, especially as it relates to managed services (e.g., managed network services and security services), cloud-hosted infrastructure, performing appropriate risk analysis for new contracts, and ensuring appropriate security controls are in place to protect College data accessed or hosted by vendors.
Manage the infrastructure and security unit budget and track and analyze relevant metrics for capacity planning and reporting purposes.
This job description is intended to represent key areas of responsibilities; specific assignments may vary from time to time, and other duties may be assigned.
Bachelor’s degree in a technical discipline (e.g., Information Technology, Information Systems, Computer Science, Engineering) or equivalent combination of training, education, and experience from which comparable skills can be acquired. Master’s degree preferred.
Seven years of experience leading a network, systems, or security team and projects.
Experience with contract and vendor negotiations and management to achieve a favorable agreement and reliable service.
Demonstrated ability to effectively manage projects, meet deadlines, and work effectively with minimal direct supervision.
Knowledge of common information security standards and best practices.
Knowledge of standards and best practices for network protocols and service.
Demonstrated effective written and oral communication skills.
Experience with delivering reliable services though cloud infrastructure (Infrastructure as a Service (IaaS) or Platform as a Service (PaaS)).
Experience managing a vendor relationship for managed services.
Experience managing security systems, such as firewalls, security information and event management (SIEM), vulnerability scanning, network access control, or anti-malware protection.
Working knowledge of operating systems such as CentOS or Red Hat Linux, and/or Microsoft Windows Server in a virtualized environment such as VMware.
Experience managing network devices from vendors such as Cisco or HP/Aruba.
The employee is regularly required to sit, talk, or hear; frequently required to use repetitive hand motion, handle or feel, and to stand, walk, reach, bend or lift up to 25 pounds.
FLSA Status – Exempt
As a Christ-centered community, Wheaton College faculty and staff must affirm the College’s Statement of Faith as expressing their own theological convictions and agree to live by the moral standards in Wheaton’s Community Covenant, modeling these commitments for the Christian formation of our students.? Wheaton College faculty and staff also support the Christ-Centered Diversity Commitment which highlights our desire to treat all individuals as equal image-bearers of Jesus Christ through diversity, inclusion, justice and unity.
About Wheaton College
WHEATON COLLEGE is an evangelical Protestant Christian liberal arts college whose faculty and staff affirm a Statement of Faith and adhere to lifestyle expectations of the Wheaton College Community Covenant. Wheaton is an equal opportunity employer committed to recruiting and retaining a diverse and talented workforce and student body. We encourage the expression of multiple perspectives within a Christian worldview, inside and outside the classroom. For more information about Wheaton College visit www.wheaton.edu.
Additionally, Wheaton College aspires to provide a physically safe environment for students, staff, and faculty to learn and work. In support of this objective, the College requires background checks for final candidates, after an employment offer is extended. Employment is contingent upon successful completion of a background check.