You are viewing a preview of this job. Log in or register to view more details about this job.

24-119 - Cybersecurity Analyst (Cybersecurity Analyst II)

Only applicants who apply with a State of Texas application via the CAPPS online application system will be considered for this position. First time applicants will need to create an account https://tinyurl.com/CAPPS-Login in the CAPPS online application system at https://tinyurl.com/CAPPS-Jobs. Please visit our job opportunities page at https://tinyurl.com/How-to-Apply-in-CAPPS for more information about the Texas Water Development Board and answers to frequently asked questions. To view this position in greater detail, visit the CAPPS online application system. 

 

Texas Water Development Board’s Mission 

     Leading the state’s efforts in ensuring a secure water future for Texas. 

  

The Texas Water Development Board (TWDB) endorses telecommuting and hybrid workplace plans, in addition to other flexible work alternatives. We offer competitive compensation and benefits package including medical, dental, vision, 401(k), flexible spending, and flexible work hours so you can have a work/life balance! For more information about our employee benefits and more, visit http://www.twdb.texas.gov/jobs/benefits.asp.

 

The Texas Water Development Board does not discriminate on basis of race, color, national origin, sex, religion, sexual orientation, age, or disability in employment or provision of services, programs, or activities. 

 

***Salary commensurate with experience and qualifications***

 

Job Description Summary

Performs complex (journey-level) information security and cybersecurity analysis work. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services. May provide guidance and training to others. Works under general supervision, with limited latitude for the use of initiative and independent judgment. Reports to the Manager of the Security & Networking Department.

Essential Job Functions

  • Coordinates with users to discuss issues such as computer data access needs, security violations, and application configuration changes.
  • Monitors and analyzes alerts from cybersecurity tools, network devices, and information systems, following up on alerts and providing regular relevant reports to IT management.
  • Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.
  • Designs, develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.
  • Assists in performing cybersecurity incident detection, analysis, prevention, and response.
  • Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
  • Performs forensic analysis of information systems, portable devices, and forensic recovery of data using assessment tools.
  • Performs regular IT security reporting and analysis regarding alerts, incidents, threats, network, and user access deliverables to IT management.
  • Researches and analyzes cybersecurity threat indicators, their behaviors and recommends threat mitigation strategies.
  • Assists in designing, automating, managing, and deploying security applications and infrastructure program activities.
  • Modifies and monitors computer files to incorporate new software and virus protection systems, correct errors, or change individual access status.
  • Maintain essential IT infrastructure, including operating systems, security tools, applications, servers, email systems, cloud systems, software, and hardware.
  • Participate in information technology disaster recovery and business continuity planning.
  • Trains users and promotes security awareness to ensure system security and to improve server and network efficiency.
  • May provide guidance and training to others.
  • Provides weekly activity updates and status reports as assigned.
  • Maintains confidential and sensitive information.
  • Ensures individual and team files (electronic and hard versions) are appropriately maintained and timely disposed of in accordance with the agency’s records retention procedures and schedule.
  • Maintains required certifications and licenses and meets the continuing education needs and requirements of the position to include, attending mandatory training courses.
  • May be required to operate a state or personal vehicle for business purposes.
  • Performs other duties as assigned.

 

Minimum Qualifications

  • Graduation from an accredited four-year college or university with a bachelor’s degree with major coursework in Cybersecurity, Information Technology Security, Computer Engineering, Computer Information Systems, Computer Science, Management Information Systems, OR High School Diploma AND an IT certification such as CISSP, CISA, CRISC, CompTIA, or other security industry accepted certification.
  • One to two years of relevant full time work experience in IT systems administration, cybersecurity analysis, information security analysis, and/or digital forensics.
  • Relevant experience and education can be substituted for each other on a year-for-year basis.

Preferred Qualifications

  • More than two years of relevant full time work experience in cybersecurity analysis, information security analysis, and/or digital forensics.
  • Previous experience administering and managing all aspects of a Microsoft Active Directory Domain environment (AD, DHCP, DNS, Group Policy, etc.).
  • Previous experience administering, supporting, and maintaining cloud services to include but not limited to: Microsoft Azure, Microsoft 365, Amazon Web Services.
  • Previous experience with Help Desk ticketing systems.
  • Previous experience using automation and scripting.

Knowledge, Skills, and Abilities (KSAs)

  • Knowledge of local, state, and federal laws and regulations relevant to the Security and Networking Department.
  • Knowledge of the principles and practices of public administration.
  • Knowledge of the limitations and capabilities of computer systems and technology.
  • Knowledge of technology across all network layers and computer platforms.
  • Knowledge of operational support of networks, operating systems, internet technologies, databases, and security applications and infrastructure.
  • Knowledge of Intrusion Prevention and Intrusion Detection systems
  • Knowledge of cybersecurity and information security controls, practices, procedures, and regulations.
  • Knowledge of incident response program practices and procedures.
  • Knowledge of the technology across all mainstream networks, operating systems, and application platforms.
  • Knowledge of operational support of networks, operating systems, internet technologies, databases, and security applications and infrastructure.
  • Knowledge of cybersecurity and information security controls, practices, procedures, and regulations, incident response program practices and procedures, and information security practices, procedures, and regulations.
  • Skills in using vulnerability scanning applications such as Nmap, Nessus, Tenable, and Splunk.
  • Skills in using and configuring Anti-Virus software such as Sophos, McAfee, Trend Micro, CrowdStrike, and MalwareBytes.
  • Skills in the operation of computers and applicable software.
  • Skills in configuring, deploying, and monitoring security infrastructure.
  • Skills in using Microsoft Office programs such as Word, Excel, and Access.
  • Skills in use of internet, email, word processing, spreadsheet, presentation, and database software.
  • Ability to resolve complex security issues in diverse and decentralized environments.
  • Ability to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls, and to communicate effectively.
  • Ability to adhere to work schedules, follow procedures with respect to leave and submit accurate timesheets by prescribed deadlines.
  • Ability to make mature, objective decisions and identify areas of potential problems.
  • Ability to perform effectively and willingly when changes occur in scope and nature of the work and work environment.
  • Ability to perform routine and non-routine work assignments accurately and on-time with little or no supervision.
  • Ability to perform assigned duties and improve work habits and/or output.
  • Ability to complete assigned work, on time, neatly and with infrequent errors.
  • Ability to interpret policies, procedures, and regulations.
  • Ability to provide prompt, courteous and accurate assistance and clear and concise communication to internal and external stakeholders both verbally and in writing.
  • Ability to work and cooperate with others in a team environment.
  • Ability to resolve complex security issues in diverse and decentralized environments
  • Ability to analyze systems and procedures.
  • Ability to write and revise standards and procedures.
  • Ability to schedule and prioritize work tasks, maintaining regular progress on assignments and meeting deadlines
  • Ability to manage multiple tasks.
  • Ability to stand/sit/move to perform activities such as retrieve/replace files in a large file system for boxes up to 30 lbs.
  • Ability and willingness to travel 5% of the time, primarily within the State of Texas.
  • Ability to operate a vehicle (state or personal) for state business and maintain a driver’s license and driving record that complies with state and agency requirements.
  • Ability to work days that may exceed 8 hours, including early mornings, nights, and weekends.
  • Ability to train and provide guidance to others.