The University of Texas System - Edinburg, TX

posted 4 months ago

Full-time - Mid Level
Edinburg, TX
Educational Services

About the position

The Senior Information Security Analyst for the Regional Security Operations Center (SOC) at the University of Texas - Rio Grande Valley is a pivotal role responsible for the implementation, configuration, operation, and ongoing maintenance of various security solutions. This position plays a critical part in identifying, investigating, and resolving security events detected by these systems, ensuring that the university complies with UT System policies as well as state and federal statutes and regulations. The analyst will develop, implement, monitor, and support access control, data confidentiality, system integrity, reliability, audit, and recovery methods and procedures. In this role, the analyst will collaborate closely with the information technology network security team to resolve complex incidents and mitigate vulnerabilities. They will ensure that all consultations regarding information security controls related to university information systems are appropriate and functioning as intended. The analyst will coordinate and document responses to incidents involving abuse of systems and information resources, policy violations, and privacy issues, working with the proper authorities to address these matters. Additionally, the analyst will oversee risk assessment assistance requests and provide recommendations to management based on their findings. The Senior Information Security Analyst will act as the main point of contact for university audits, reviewing and analyzing intrusion detection reports for unusual patterns, security breaches, and exploitation of information resources. They will also be responsible for developing and recommending improvements for documentation, including security policies and procedures, and security notifications and alerts. Keeping current with advancements in information security, the analyst will participate as an internal consulting resource on various security-related subjects and recommend improvements to the university's security program. This role requires active participation in the higher education security community and involvement in university committees and meetings with the UT System Security Council. Other related duties may be assigned as necessary.

Responsibilities

  • Develops, implements, monitors and supports access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
  • Ensures the overall university security program is in compliance with UTS 165 and TAC 202.
  • Collaborates with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
  • Ensures that all consultation on information security controls related to university information systems are appropriate and operating as intended.
  • Coordinates and documents response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
  • Oversees risk assessment assistance requests and makes recommendations to management.
  • Acts as main point of contact regarding university audits.
  • Reviews and analyzes intrusion detection reports provided by UT System for unusual patterns, security breaches, and exploitation of information resources.
  • Develops, prepares and recommends improvements for documentation, including security policies and procedures, security notifications and alerts.
  • Develops and implements processes to secure the confidentiality, integrity and availability of information resources and technology.
  • Observes, monitors, evaluates, and reports security policy compliance.
  • Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
  • Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
  • Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
  • Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
  • Participates in university committees and meetings with the UT System Security Council.
  • Performs other related duties as assigned.

Requirements

  • Bachelor's degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
  • Four (4) years of relevant IT security, IT operations and/or IT audit experience, including deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools.
  • Basic networking concepts, protocols (TCP/IP), common ports, and knowledge of risk assessment, disaster recovery and business continuity methods and practices.
  • Experience with hacker methodologies, tactics, and the tools used.
  • Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.

Nice-to-haves

  • Bachelor's Degree in Cybersecurity or Information Assurance from an accredited university.
  • Certified Information Systems Security Professional (CISSP).
  • Experience with major operating systems, including command-line proficiency.
  • Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
  • Experience in managing, configuring, deploying, and monitoring security infrastructure.
  • Experience with standard concepts, practices, and procedures for security operation centers.
  • Knowledge of ITIL processes and standards.
  • Experience conducting risk assessments and identifying effective risk mitigation strategies.
  • Experience installing, configuring and repairing computer hardware and system software.

Benefits

  • Health insurance coverage
  • Dental insurance coverage
  • Life insurance coverage
  • Disability insurance coverage
  • Flexible scheduling options
  • Professional development opportunities
  • Paid holidays
  • Paid time off (PTO)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service