×
Register Here to Apply for Jobs or Post Jobs. X

Deputy Chief Information Security Officer | Compliance and Attestation

Remote / Online - Candidates ideally in
Olympia, Thurston County, Washington, 98502, USA
Listing for: State of Washington
Full Time, Remote/Work from Home position
Listed on 2026-01-14
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 102264 - 137520 USD Yearly USD 102264.00 137520.00 YEAR
Job Description & How to Apply Below

Deputy Chief Information Security Officer | Compliance and Attestation (IT Architecture Senior Specialist) Full Time | Permanent Salary Range: $102,264 - $137,520 Annually This is a telework/hybrid position. The candidate of choice may work from anywhere within the state of Washington with a reliable internet connection. Travel may be required.

Information Technology is the backbone of everything the Department of Corre Belongs, powering secure operations across facilities, field offices, and remote teams statewide. When systems are compromised, the impact is real: confidential data is at risk, operations slow, and public safety can be affected. That’s why the Department of Corrections is seeking a strategic, tech-savvy leader to join our team as Deputy Chief Information Security Officer | Compliance and Attestation (IT Architecture Senior/Specialist).

This highly influential role sets the direction for security architecture, IT compliance, and technology risk management across the agency. As Deputy CISO, you will shape how DOC protects its systems, data, and digital infrastructure—ensuring security is্ৰী built into everything we do while keeping systems reliable, available, and ready to support mission‐critical work.

You will bring creative, forward‑thinking problem‑solving to partner with IT leaders and technical teams, translating security findings into smart, practical architecture and compliance decisions. Your leadership will ensure DOC’s technology meets rigorous security standards while enabling innovation, efficiency, and statewide service delivery.

In this role, you will also lead the Cybersecurity Assessment and Compliance team—overseeing audits,(ld penetration testing, security architecture reviews, and compliance documentation. Together, you’ll identify vulnerabilities, reduce risk meines strengthen resilience of the DOC’s network and systems that thousands of employees depend on every day.

If you’re passionate about protecting complex technology environments, leading high‑impact security initiatives, and supporting a mission that improves public safety and changes lives, we invite you to apply and help secure the future of the Department of Corrections!

A completed application packet will include:
  • A cover letter regarding your interest in this position with our agency
  • A detailed resume
  • Three professional references

We are looking for teammates who share our vision of public service, committed to an equitable and inclusive culture that fosters and inspires excellence, while promoting innovation, engagement, and safety, leading to better outcomes for our incarcerated population, our agency, and our community.

Ashag IT Architecture Senior Specialist, some of your duties will include:
  • Analyzing and assessing vulnerability risks identified during scans to support system changes and leading IT architecture or design changes required to address IT architecture, functionality, and configuration which could include:
    • Developing Minimum Security Baseline configurations for new technologies
    • Developing and maintaining infrastructure architecture diagrams to facilitate engineering material builds
    • Leading and facilitatingләр architecture presentations to project teams, working groups, design authorities, and leadership
    • Developing and enhancing target architectures as well as target operate models for new/existing architectures and services
    • Developing Minimum Security Baseline configurations for new technologies.
  • Maintaining a coordinated enterprise‑level vulnerability management program that effectively reviews, analyzes, communicates, and guides remediation of IT vulnerabilities which could look like:
    • Validating and confirming accuracy and scope of scanning infrastructure with IT teams through both manual and automated processes.
    • Detecting and Booting vulnerabilities within established timelines
    • Ensuring regular security scans are scheduled and completed to reduce exposure time
    • Determining and maintaining the scope of systems to include in the vulnerability scanning
    • Ensuring IT Architectural Standards are consistent across the enterprise
  • Analyzing and assessing the criticality from internal and external…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary