×
Register Here to Apply for Jobs or Post Jobs. X

Deputy Chief Information Security Officer | Compliance and Attestation

Remote / Online - Candidates ideally in
Walla Walla, Walla Walla County, Washington, 99362, USA
Listing for: State of Washington
Full Time, Remote/Work from Home position
Listed on 2026-01-10
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Systems Engineer, IT Support
Salary/Wage Range or Industry Benchmark: 102264 - 137520 USD Yearly USD 102264.00 137520.00 YEAR
Job Description & How to Apply Below

Deputy Chief Information Security Officer | Compliance and Attestation

3 days ago Be among the first 25 applicants

Get AI-powered advice on this job and more exclusive features.

Job Type: Full Time | Permanent

Salary Range: $102,264 - $137,520 Annually

Telework/Hybrid: This is a telework/hybrid position. The candidate of choice may work from anywhere within the state of Washington with a reliable internet connection. Travel may be required.

Information Technology is the backbone of everything the Department of Corrections does—powering secure operations across facilities, field offices, and remote teams statewide. When systems are compromised, the impact is real: confidential data is at risk, operations slow, and public safety can be affected. That’s why the Department of Corrections is seeking a strategic, tech‑savvy leader to join our team as Deputy Chief Information Security Officer | Compliance and Attestation (IT Architecture Senior/Specialist).

This highly influential role sets the direction for security architecture, IT compliance, and technology risk management across the agency. As Deputy CISO, you will shape how DOC protects its systems, data, and digital infrastructure—ensuring security is built into everything we do while keeping systems reliable, available, and ready to support mission‑critical work.

You will bring creative, forward‑thinking problem‑solving to partner with IT leaders and technical teams, translating security findings into smart, practical architecture and compliance decisions. Your leadership will ensure DOC’s technology meets rigorous security standards while enabling innovation, efficiency, and statewide service delivery.

In this role, you will also lead the Cybersecurity Assessment and Compliance team—overseeing audits, penetration testing, security architecture reviews, and compliance documentation. Together, you’ll identify vulnerabilities, reduce risk, and strengthen the resilience of the DOC’s network and systems that thousands of employees depend on every day.

If you’re passionate about protecting complex technology environments, leading high‑impact security initiatives, and supporting a mission that improves public safety and changes lives, we invite you to apply and help secure the future of the Department of Corrections!

Application Packet
  • A cover letter regarding your interest in this position with our agency
  • A detailed resume
  • Three professional references
Duties
  • Analyze and assess vulnerability risks identified during scans to support system changes and lead IT architecture or design changes required to address IT architecture, functionality and configuration.
  • Develop and maintain minimum security baseline configurations for new technologies, infrastructure architecture diagrams, and target operating models for new/existing architectures and services.
  • Lead and facilitate architecture presentations to project teams, working groups, design authorities, and leadership.
  • Maintain a coordinated enterprise‑level vulnerability management program that reviews, analyzes, communicates, and guides remediation of IT vulnerabilities.
  • Validate and confirm accuracy and scope of scanning infrastructure with IT teams through both manual and automated processes.
  • Detect and remediate vulnerabilities within established timelines, ensuring regular security scans are scheduled and completed to reduce exposure time.
  • Determine and maintain the scope of systems to include in the vulnerability scanning.
  • Ensure IT architectural standards are consistent across the enterprise.
  • Analyze and assess the criticality from internal and external vulnerability scans to understand impact and deliver remediation plans.
  • Identify and execute attack surface reduction opportunities via vulnerability data analysis, trends, and log reviews.
  • Respond to cyber security incidents and assist with threat hunting and data analysis to protect and maintain the overall IT security of DOC.
  • Other tasks as assigned.
Qualifications – Required
  • Bachelor’s degree in business administration, computer science, or a related field.
  • Five (5) years of information technology experience providing enterprise architecture services.
  • Five (5) years’…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary