The University of Texas System - Rio Grande City, TX

posted 4 months ago

Full-time - Mid Level
Rio Grande City, TX
Educational Services

About the position

The Senior Information Security Analyst for the Regional Security Operations Center (SOC) at the University of Texas Rio Grande Valley is a pivotal role responsible for the implementation, configuration, operation, and ongoing maintenance of various security solutions. This position plays a critical role in identifying, investigating, and resolving security events detected by these systems, ensuring that the university complies with UT System policies as well as state and federal statutes and regulations. The analyst will develop, implement, monitor, and support access control, data confidentiality, system integrity, system reliability, system audit, and recovery methods and procedures. In addition to maintaining compliance with UTS 165 and TAC 202, the analyst will collaborate with information technology network security teams to resolve complex incidents and mitigate vulnerabilities. This role requires the coordination and documentation of responses to incidents involving abuse of systems and information resources, policy violations, and privacy issues, working closely with the appropriate authorities. The analyst will also oversee risk assessment requests and provide recommendations to management, acting as the main point of contact for university audits. The position involves reviewing and analyzing intrusion detection reports for unusual patterns and security breaches, developing and recommending improvements for security documentation, and implementing processes to secure the confidentiality, integrity, and availability of information resources. The analyst will stay current with advancements in information security, participate in the higher education security community, and contribute to university committees and meetings with the UT System Security Council. Other duties may be assigned as necessary.

Responsibilities

  • Develop, implement, monitor and support access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
  • Ensure the overall university security program is in compliance with UTS 165 and TAC 202.
  • Collaborate with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
  • Coordinate and document response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
  • Oversee risk assessment assistance requests and make recommendations to management.
  • Act as main point of contact regarding university audits.
  • Review and analyze intrusion detection reports for unusual patterns, security breaches, and exploitation of information resources.
  • Develop, prepare and recommend improvements for documentation, including security policies and procedures, security notifications and alerts.
  • Develop and implement processes to secure the confidentiality, integrity and availability of information resources and technology.
  • Observe, monitor, evaluate, and report security policy compliance.
  • Keep current with IT network security and recommend improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
  • Keep current with advancements in information security related subjects and recommend improvements to the university security program.
  • Evaluate and recommend new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
  • Actively participate in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
  • Participate in university committees and meetings with the UT System Security Council.
  • Perform other related duties as assigned.

Requirements

  • Bachelor's degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
  • Four (4) years of relevant IT security, IT operations and/or IT audit experience, including deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools.
  • Basic networking concepts, protocols (TCP/IP), common ports, and knowledge of risk assessment, disaster recovery and business continuity methods and practices.
  • Experience with hacker methodologies, tactics, and the tools used.

Nice-to-haves

  • Bachelor's Degree in Cybersecurity or Information Assurance from an accredited university.
  • Certified Information Systems Security Professional (CISSP).
  • Experience with major operating systems, including command-line proficiency.
  • Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
  • Experience in managing, configuring, deploying, and monitoring security infrastructure.
  • Experience with standard concepts, practices, and procedures for security operation centers.
  • Knowledge of ITIL processes and standards.
  • Experience conducting risk assessments and identifying effective risk mitigation strategies.
  • Experience installing, configuring and repairing computer hardware and system software.

Benefits

  • Commensurate salary based on experience.
  • Full-time employment with potential for hybrid work arrangements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service