Cybersecurity Analyst I
Texas-Austin
Texas Comptroller of Public Accounts
Glenn Hegar was elected as Texas Comptroller of Public Accounts — the states chief financial officer — in November 2014.Organization
: TEXAS MEDICAL BOARDPrimary Location
: Texas-AustinWork Locations
: George H.W. Bush 1801 Congress Ave Suite 9.200 Austin 78701Job
: Computer and MathematicalEmployee Status
: RegularSchedule
: Full-time Standard Hours Per Week: 40.00Travel
: Yes, 50 % of the Time State Job Code: 0319 Salary Admin Plan: B Grade: 23Salary (Pay Basis)
: 6,562.50 - 6,562.50 (Monthly)Number of Openings
: 1Overtime Status
: ExemptJob Posting
: Jun 26, 2025, 8:42:24 PMClosing Date
: OngoingDescription
Job Posting: 25-503- 41
INTERNAL/EXTERNAL
PRINCIPAL JOB DUTIES AND RESPONSIBILITIES
(60%)
- Designs, implements, and maintains the agency IT security policies, and procedures to improve TMB’s cybersecurity maturity.
- Develop, update, and maintain agency security policies, procedures, and other cybersecurity program documentation.
- Prepare reports for oversight agencies including but not limited to Monthly Incident Report and biennial Agency Security Plan.
- Develop cybersecurity awareness training strategies to serve multiple user groups and present security awareness seminars.
- Implement programs or projects to ensure agency compliance with privacy and cybersecurity standards and legislation.
- Assist with defining security configurations and operations standards.
- Supports the implementation of security plans with agency personnel and outside vendors.
- Assist in advising management and users regarding security policies and procedures.
- Support external and internal audit activities, perform related responses, analysis, and security remediation.
(25%)
- Monitor agency and software systems for cybersecurity threats and attacks.
-
- Monitors systems and procedures to protect data systems and databases from unauthorized access.
- Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses
- Provide threat assessment, cyber intelligence, software security, and vulnerability assessment services.
- Research and analyze cybersecurity threat indicators, their behaviors and recommend threat mitigation strategies.
- Research and evaluate emerging security-related technologies.
(10%)
- Incident Response
○ Resolves complex security issues in diverse and decentralized environments.
○ Detect, investigate, and assist with remediation, and recovery from cybersecurity threats.
○ Provide tactical response of incident detection and incident response.
○ Reports to Director of IT, CISO or designated Incident Response Lead, concerning residual risk, vulnerabilities, and other security exposures, including misuse of information assets and noncompliance.
(5%)
- Performs related work as assigned.
REQUIRED EXPERIENCE AND EDUCATION
- At least four (4) years progressively responsible work experience.
○ Experience in drafting, reviewing, and revising cybersecurity policies based on organizational needs and regulatory requirements.
○ Experience creating programs and projects for security best practices within the enterprise IT ecosystem.
○ Experience creating cybersecurity awareness training including individual and group training.
○ Conducting risk assessments. - At least two (2) years progressively responsible work experience.
○ Experience in Network Security Monitoring
○ Hands-on experience with Incident Detection Techniques and the use of Vulnerability Assessment Tools
○ Experience collaborating with outsourced IT service delivery organizations. - Graduation from an accredited four-year college or university with major course work in computer science, computer information systems, or management information systems is generally preferred. Education and experience may be substituted for one another.
- Applicants must be US citizens.
Preferred Experience and Education
- Demonstrated experience in Texas state government.
- Demonstrated experience with Texas Administrative Code Chapter 202
- Certified Information Systems Security Professional (CISSP).
Qualifications
KNOWLEDGE, SKILLS, AND ABILITIES
- Technical Skills
- Knowledge or experience with the NIST Incident Response Processes.
- Knowledge of best practices, principles, and techniques for developing security-focused management controls of access points, servers, desktops, and various other hardware assets.
- Knowledge of IT security threats and ability to implement preventative controls including firewalls, access controls, authentication systems, intrusion detection systems, VPNs, and encryption.
- Knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls.
- Knowledge of the techniques used in the operation of security applications, and information security practices, procedures, and regulations.
- Experience with Microsoft products including:
- Windows Server 2016+
- Hyper-V virtualization
- Active Directory
- Azure
- Endpoint security products.
- Experience with vulnerability assessment and penetration testing tools
- Analytical Skills
- Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
- Coordinating solutions to problems; scheduling, testing, installing, and implementing system software; and troubleshooting computer systems.
- Ability to analyze problems and develop solutions; to determine systems and network problems; to communicate effectively with clients/customers to gather information and/or explain policies and procedures.
- Ability to produce high level correspondence/reports/documents/policies/procedures and prepare training/ instructional manuals.
- Ability to work independently.
- Ability to communicate both verbally and in writing with both technical and non-technical staff.
- Ability to complete project assignments within allocated time frame, demonstrating patience and meticulousness in the implementation of information security solutions.
- Ability to handle multiple projects at one time.
- Ability to establish and maintain positive and effective working relationships with others.
- Ability to work well under pressure and maintain flexibility.
- Skill in analyzing problems and devising solutions.
WORK ENVIRONMENT REQUIREMENTS
- All applicants must be familiar with or have a willingness to learn Microsoft suite (e.g. Word, PowerPoint, SharePoint, Excel, and Microsoft Teams).
- All applicants assigned to an agency issued device (e.g. laptops, IPADS, cell phones) must use the agency device assigned to them to conduct agency business. The use of personal devices to perform official work responsibilities is not permitted unless formally approved.
PHYSICAL REQUIREMENTS AND/OR WORKING CONDITIONS
The principal job is performed in a standard office and requires:
- All applicants must be available to work Monday-Friday during standard business hours in the central time zone (CT) and have regular and punctual attendance.
- All applicants will have prolonged periods of sitting and extensive computer screen time due to computer use.
- All applicants will have frequent use of keyboard, mouse, and other input devices.
- All applicants need to have the ability to participate in video calls, phone calls, and virtual meetings.
- All applicants may experience frequently working under deadlines, individually or as a team member, and at times may collaborate with others to meet deadlines.
- All applicants may generally experience low physical demands, occasional lifting of equipment up to a certain weight (e.g. 10-40 lbs.).
LEGAL REQUIREMENTS
- Cannot hold outside employment that interferes with assigned work schedule, nor does it constitute a conflict of interest with TMB employment and services.
- Must reside in Texas.
- Dual employment at another state agency or Texas public university is not permitted.
- A DPS background check will be conducted.
- If hired, must provide documentation(s) within three days of hire that establishes identity and employment verification.
- Compliance with all agency policies and procedures, including but not limited to applicable confidentiality, security and safety rules, regulations and standards.
NEW HIRES/REHIRES
- 60-day waiting period for health coverage.
REMARKS
Resumes will not be accepted without a completed and signed State of Texas application. Only the candidates selected for an interview will be contacted and will receive written notification of application results.
EQUAL EMPLOYMENT OPPORTUNITY EMPLOYER
The Texas Medical Board does not discriminate on the basis of race, color, national origin, sex, age, religion, disability or veteran status. Employment opportunities shall not be denied to a qualified individual with a disability that requires reasonable accommodation. The applicant should communicate requests for reasonable accommodations by calling (512) 305-7142.
Selective Service Requirement: If selected for employment, male applicants ages 18 through 25 must present proof of registration or exemption with the federal Selective Service System.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Azure CISO CISSP Compliance Computer Science Encryption Endpoint security Firewalls Hyper-V Incident response Intrusion detection Monitoring Network security NIST Pentesting Privacy Risk assessment SharePoint VPN Vulnerabilities Vulnerability scans Windows
Perks/benefits: Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.