Position: Project Manager- Cyber Security Projects

Report generated at: 2025-05-13 08:09:41

Analysis Method: NICE Framework Mapping

Analysis of position description: (Analysis generated using: claude)

Analysis Summary

The Project Manager will oversee the delivery of high-priority cybersecurity projects and programs across the organization. Key responsibilities include applying project management skills, managing all aspects of project delivery, ensuring service quality and customer satisfaction, and leading and motivating staff.

NICE Framework Analysis

Best Role Match

OV-PMA-002 - IT Project Manager
Directly manages information technology projects to provide a unique service or product.

Required Knowledge

K0001 - Knowledge of computer networking concepts and protocols, and network security methodologies
Knowledge of computer networking concepts and protocols, and network security methodologies.
Relevance: Medium
K0002 - Knowledge of risk management processes (e
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Relevance: High
K0003 - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Relevance: Medium
K0004 - Knowledge of cybersecurity and privacy principles
Knowledge of cybersecurity and privacy principles.
Relevance: High
K0039 - Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
Relevance: High

Required Skills

S0356 - Skill in project management
Skill in project management.
Relevance: High
S0070 - Skill in talking to others to convey information effectively
Skill in talking to others to convey information effectively.
Relevance: High
S0296 - Skill in presenting technical information to technical and nontechnical audiences
Skill in presenting technical information to technical and nontechnical audiences.
Relevance: High
S0346 - Skill in communicating with all levels of management including Board members (e
Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).
Relevance: High
S0018 - Skill in creating policies that reflect system security objectives
Skill in creating policies that reflect system security objectives.
Relevance: Medium

Key Tasks

T0263 - Manage the cybersecurity program budget and resources
Manage the cybersecurity program budget and resources.
Relevance: High
T0337 - Manage cybersecurity implications and apply security controls as appropriate for contracts and agreements
Manage cybersecurity implications and apply security controls as appropriate for contracts and agreements.
Relevance: Medium
T0328 - Provide input to implementation plans and standard operating procedures as they relate to cybersecurity
Provide input to implementation plans and standard operating procedures as they relate to cybersecurity.
Relevance: High
T0341 - Develop and document User Experience (UX) requirements
Develop and document User Experience (UX) requirements.
Relevance: Low
T0273 - Provide cybersecurity guidance to leadership
Provide cybersecurity guidance to leadership.
Relevance: High

Original Position Description

Project Manager- Cyber Security Projects
Job ID: 62805
Department: Technology Department
Location:

Description
About the Role
The TEC Department of the Port Authority is currently seeking an experienced individual to ensure successful delivery of high-priority Cyber Security projects and programs
across all Port Authority Line Departments. Reporting to the Chief Information Security Officer, the Cyber Project Manager will be responsible for:
Responsibilities
Applying superior project management skills in the planning and delivery of Cyber programs
Managing and overseeing all aspects of project/program delivery, including the development of quality Project Management Plans, analyzing project risk and complexity,
project/program reporting and development of corrective plans
Providing recognition and impetus for program performance measures including cost and schedule while managing scope and maintaining quality standards
Planning and leading the preparation of highest quality project artifacts and other related documents including necessary support materials and presentations
Ensuring improved level of service, quality, and increased customer satisfaction through oversight of project implementation including assurance of collaborative
coordination among all stakeholders and mitigation of facility operational impacts and foster conclusive conflict resolution in all stages
Ensuring that all project related information is current and accurate and provide high-level briefing on project/program status to senior executive management
Leading, developing and motivating staff ensuring that the highest level of staff capabilities align with the best industry project management practices
Representing TEC/Cybersecurity in cross-departmental teams focused on key Cyber projects.
Minimum Qualifications:
Bachelor’s Degree in Information Security, Computer Science, Electronic Media, Communications, or other relevant subject matter
Minimum of seven years progressively responsible senior level project and program management experience in concurrent complex technology projects, including
knowledge of Operational Technology, technology integration and procurement, at time of appointment to the position
Experienced in simultaneously managing multiple, complex enterprise level technology projects
Knowledge of project management scheduling cost control and scope/code compliance review procedures, along with knowledge of multi-discipline technology principles
Experience having developed program and project strategies to achieve business goals and to understand their impact on various internal and external stakeholders
The ability to create dashboards and other instruments used to present project metrics to various stakeholders
Experience managing and influencing diverse work groups, project teams and internal/external stakeholders and/or Regulatory Agencies
Excellent written and verbal communication skills
Ability to travel to all Port Authority facilities as needed
Desired Qualifications:
Any experience working with cybersecurity concepts, security tools, or any other cyber project management deliverables
PMP (Project Management Professional) or other Project Management Certification
Demonstrated superior customer service, decision-making, problem solving, conflict resolution and interpersonal skills.
Experience working within a public sector technology organization
A minimum of five years’ experience creating and managing project plans in Microsoft Project at an expert level

Generated by CHRIS (Cybersecurity Human Resource Intelligence System)

Relevant Clark Center Resources

Relevance Score System Explanation

Each resource is assigned a relevance score (0-1) based on:

Found 5 relevant resources with a relevance score above 0.30:

Introduction to Cybersecurity

Syllabus created by Intro to Cybersecurity Working Group, Palm Desert, CA January 2019

Why this is relevant:
  • Moderate match with NICE knowledge K0004
  • Moderate match with NICE task T0273
  • Moderate match with NICE task T0328
  • Good overall match with position description
Relevance Score: 0.48
Position Similarity
0.44
NICE Element Similarity
0.50
Combined score: 0.479 (Position: 0.440 × 0.3, NICE: 0.496 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Monitoring Industrial Control Networks

This module gives a brief introduction to monitoring industrial control networks. It is Module 8 of the “Cybersecurity of Industrial Control Systems” course, but the module can also be used independently. 

Learning Setting: Online instruction.

Target Audience: This module is intended for graduate students in information technology, computer engineering, and computer science majors. The students may have widely varying backgrounds, so adherence to the text is important. Expect many questions of a fundamental nature during lectures.

Textbook: Industrial Network Security, 2nd Edition, Eric D. Knapp, Joel T. Langill, ISBN: 978-0-12-420114-9

Prerequisite Knowledge: Students are expected to have a good understanding and previous experience with Linux, Windows, TCP/IP networking, Cybersecurity fundamentals.

Topics include:

Why this is relevant:
  • Strong match with NICE knowledge K0001
  • Moderate match with position description
Relevance Score: 0.46
Position Similarity
0.34
NICE Element Similarity
0.51
Combined score: 0.463 (Position: 0.344 × 0.3, NICE: 0.514 × 0.7)
View in CLARK →
Cybercrime

This module introduces students to personal, governmental, and societal aspects of cybercrime. Students will learn when and how to report cybercrimes committed against them or people they know. At a broader level, students will discuss the possible types of cybercrime and profiles of cybercriminals. From an organizational perspective, barriers to responding, such as attribution and jurisdictional issues, are covered. Students will explore ways of preventing and deterring cybercrime from a law enforcement and policy perspective. At a societal level, the module discusses issues affecting particular people and organizations.

Why this is relevant:
  • Moderate match with NICE knowledge K0039
  • Moderate match with NICE knowledge K0003
  • Moderate match with NICE knowledge K0004
  • Moderate match with position description
Relevance Score: 0.45
Position Similarity
0.34
NICE Element Similarity
0.49
Combined score: 0.448 (Position: 0.344 × 0.3, NICE: 0.493 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Industrial Control Systems (ICS) Networks and Protocols (Module 3)

Industrial Control Systems (ICS) Networks and Protocols (Module 3)

Why this is relevant:
  • Moderate match with NICE knowledge K0001
  • Moderate match with position description
Relevance Score: 0.42
Position Similarity
0.30
NICE Element Similarity
0.47
Combined score: 0.417 (Position: 0.300 × 0.3, NICE: 0.467 × 0.7)
View in CLARK →
Network Attacks and Exploitation in the IoT

This module begins by examining the scope and definition of computer network attacks and computer network exploitation, then walks through the prevalent methodologies used to facilitate malicious network-side activities. The threat of botnets in the IoT is discussed, and data transport protocols used to communicate in the IoT are examined.

Why this is relevant:
  • Moderate match with NICE knowledge K0001
Relevance Score: 0.41
Position Similarity
0.24
NICE Element Similarity
0.48
Combined score: 0.411 (Position: 0.243 × 0.3, NICE: 0.483 × 0.7)
View in CLARK →