00039942
Opened:2/7/2024
Closes:2/21/2024
Position Title:Cybersecurity Analyst II
Class/Group:0320/B25
Military Occupation Specialty Code:Army 17C, 25B, 25D, 170A; Coast Guard CYB10, CYB11, CYB12; Marine Corps 0605; Air Force 1D7X1, 3D0X2; Space Force 5C0X1D, 5C0X1N
Fair Labor Standards Act Status:Exempt
Number of Vacancies:1
Division/Section:Chief Technology Office (Information Security Office)
Salary Range:$5,525 - $7,000/monthly
Duration:Regular
Hours Worked Weekly:40
Work Schedule:This position may be eligible for flexible work hours and/or a hybrid work schedule if certain program guidelines are met; working arrangements may change at any time at the sole discretion of the agency.
Travel:Occasional
Agency Address:300 West 15th Street, #1300 / Austin, Texas 78701
Web site:https://dir.texas.gov/
Refer Inquiries to:People and Culture Office
Telephone:(512) 475-4957 or (512) 463-5920
How To Apply:- Select “Apply Online” to apply for the job at https://capps.taleo.net/careersection/ex/jobsearch.ftl?lang=en
- You must create a CAPPS Career Section candidate profile or be logged in to apply.
- Update your profile and apply for the job by navigating through the pages and steps.
- Once ready, select “Submit” on the “Review and Submit” page.
- If you have problems accessing the CAPPS Career Section, please email the CAPPS Recruiting Help Desk at capps.recruiting@cpa.texas.gov
- Applicants must provide in-depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.
- Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.
Candidates will be notified for appointments as determined by the selection committee.
Selective Service Registration:Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.
H-1B Visa Sponsorship:We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Equal Opportunity EmployerThe Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability. Please call 512-463-5920 to request reasonable accommodation.
Position DescriptionWhat We DoThe Texas Department of Information Resources is the state agency charged with protecting the state’s data and critical technology infrastructure, managing a multi-billion-dollar cooperative contracts program, and providing strategic technology leadership, solutions, and innovation to all levels of Texas government. DIR is a fast-paced and collaborative environment with highly motivated and engaged employees dedicated to achieving the best value for the state.
Position SummaryPerforms information security and cybersecurity analysis work involving planning, implementing, and monitoring security measures for the protection of information systems and infrastructure. Coordinates, performs, and controls information technology security for the agency. Helps with the development of security and business continuity standards and action plans. Work also includes protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
The ideal candidate will have the ability to highlight their strengths in the following functions:
- Performs technical risk assessments and reviews of account permissions, computer data access needs, security violations, programming changes, and new and existing applications and systems.
- Supports the development and implementation of information and cybersecurity policies, standards, guidelines, and procedures to ensure information security capabilities cover current threat capabilities.
- Coordinates with the Information Security Officer to perform cybersecurity incident detection, analysis, and prevention.
- Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
- Monitors systems and procedures to protect data systems and databases from unauthorized access.
- Assists with all agency Continuity of Operations (COOP) Planning; Collaborates with the Information Security Officer to coordinate continuity and restoration activities, plans, and services. Reviews COOP plans, test outcomes, risk assessments, proposed processes, systems, and preventative measures.
- Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention,
detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.
- Performs other work-related duties as assigned.
- Graduation from an accredited four-year college or university with major course work in Business, MIS, Computer Science, Information Security, or related field.
- Additional work-related experience may be substituted for education on a year-for-year basis (High-school diploma and six (6) years of experience without a degree.
- Two (2) to four (4) years of progressively responsible experience in the IT industry.
- Two (2) years of experience developing and implementing security program functions into a risk-based security program with the ability to demonstrate in-depth knowledge of policy development, risk evaluation, and cost benefit analysis to support security program decisions.
- Experience with business continuity planning or emergency management experience.
- Experience with State of Texas information security requirements including Texas Administrative Experience with state or federal IT regulatory issues and processes.
- Experience with Federal, State, Local Government, and Institutes of Higher Education
- Experience in using or developing governance, risk, and compliance software and platforms.
- Strong analytical and problem-solving skills.
- Strong project management, organizational, and time management skills.
- Skill in problem resolution and ability to identify and implement best practices.
- Knowledge of data communications, networking, computer programming and systems analysis
- Knowledge of information security operations and services processes
- Knowledge of principles, practices, and techniques of management controls and information security protections as applied to state government.
- Knowledge of Texas State government and related information technology processes
- Knowledge of security metrics, benchmarking activities and expectations, and security operational monitoring processes
- Ability to handle multiple projects and initiatives.
- Ability to prepare technical issues papers and research reports, and effectively deliver oral presentations and written reports to IT and non-IT management.
- Ability to advise technical staff from customer agencies.
- Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers.
- Ability to understand, follow and convey brief oral and/or written instructions.
- Ability to communicate both verbally and in writing, in a clear and concise manner.
- Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment.
- Ability to work under pressure and exacting schedules to complete assigned tasks.
- Ability to work a flexible schedule to meet required deadlines.
- Ability to travel as necessary to support agency requirements.
- Ability to comply with all agency policy and applicable laws.
- Ability to comply with all applicable safety rules, regulations, and standards.
- Proficiency in the use of a computer and applicable software necessary to perform work assignments e.g., word processing, spreadsheets (Microsoft Office preferred), presentation software, and data analysis/reporting software.
- Regular and punctual attendance at the workplace.
- Criminal background check.
- Frequent use of computers, copiers, printers, and telephones.
- Frequent standing, walking, sitting, listening, and talking.
- Frequent work under stress, as a team member, and in direct contact with others.
- Occasional bending, stooping, lifting, and climbing.
- Occasional travel