Cybersecurity Analyst II

Texas-Austin

Texas Comptroller of Public Accounts

Texas Comptroller of Public Accounts The Texas Comptroller’s office is the state’s chief tax collector, accountant, revenue estimator and treasurer. This office strives to provide you the best possible services and resources to do business in...

View all jobs at Texas Comptroller of Public Accounts

Apply now Apply later

Cybersecurity Analyst II (00045287) 

Organization

: DEPARTMENT OF INFORMATION RESOURCES 

Primary Location

: Texas-Austin 

Work Locations

: WP Clements 300 W 15TH ST STE 1300  Austin 78701 

  

Job

: Computer and Mathematical 

Employee Status

: Regular 

Schedule

: Full-time Standard Hours Per Week: 40.00 State Job Code: 0320  Salary Admin Plan: B Grade: 25  

Salary (Pay Basis)

: 6,250.00 - 7,350.00 (Monthly) 

Number of Openings

: 1 

Overtime Status

: Exempt 

Job Posting

: Oct 31, 2024, 8:45:32 PM 

Closing Date

: Ongoing 

Description

 

Job Posting:

00045259

This is a repost of job number 00045259

Opened:

9/17/2024

Closes:

10/1/2024

Position Title:

Cybersecurity Analyst II (Governance, Risk, and Compliance (GRC) Analyst)

Class/Group:

0320/B25

Military Occupation Specialty Code:

Army 25B; Navy 182X, 682X; Air Force 3D1X1; Space Force 514A Fair Labor

Standards Act Status:

Exempt

Number of Vacancies:

1

Division/Section:

Chief Information Security Office / Governance, Risk, and Compliance

Salary Range:

$6,250.00-$7,350.00/month

Duration:

Regular

Hours Worked Weekly:

40

Work Schedule:

This position may be eligible for flexible work hours and/or a hybrid work schedule if certain program guidelines are met; working arrangements may change at any time at the sole discretion of the agency.

Travel:

Limited

Agency Address:

300 West 15th Street, #1300 / Austin, Texas 78701

Web site:

https://dir.texas.gov/

Refer Inquiries to:

People and Culture Office

Telephone:

512-475-4957 or (512) 463-5920

How To Apply:

  • You must create a CAPPS Career Section candidate profile or be logged in to apply.
  • Update your profile and apply for the job by navigating through the pages and steps.
  • Once ready, select “Submit” on the “Review and Submit” page.

Special Instructions:

  • Applicants must provide in-depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.
  • Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.

Interview Place/Time:

Candidates will be notified for appointments as determined by the selection committee.

Selective Service Registration:

Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.

H-1B Visa Sponsorship:

We are unable to sponsor or take over sponsorship of an employment Visa at this time.

Equal Opportunity Employer

The Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability.  Please call 512-475-4922 to request reasonable accommodation.

Position Description

Division:

Office of the Chief Information Security Officer/Governance, Risk, and Compliance (GRC) Program

Class/Group:

0320/B25

Title:

Cybersecurity Analyst II (Governance, Risk, and Compliance (GRC) Analyst)

Fair Labor Standards Act Status:

Exempt

What We Do

The Texas Department of Information Resources is the state agency charged with protecting the state’s data and critical technology infrastructure, managing a multi-million-dollar cooperative contracts program, and providing strategic technology leadership, solutions, and innovation to all levels of Texas government.  DIR is a fast-paced and collaborative environment with highly motivated and engaged employees dedicated to achieving the best value for the state.

Position Summary

The individual in this role will perform complex (journey-level) cybersecurity analysis in a variety of functions, such as, planning, implementing, and monitoring security program elements and services that support government organizations throughout the state of Texas in the protection of their information resources. The individual will also interact frequently with external personnel at other state agencies and educational and governmental organizations throughout the state using a variety of communication mechanisms. The ideal candidate will be a security professional with a background in, and understanding of, the technical, policy, and compliance aspects of information security. Works under general supervision, with limited latitude for the use of initiative and independent judgment.

 

·       Performs governance, risk assessments, and compliance tasks, which involves developing and documenting system security plans, developing policy, and performing process analysis.

·       Completes TX-RAMP assessments, and onboarding of cloud service providers efficiently.

·       Tracks performance metrics and visualizes data. Develop, research, and draft reports, ensuring report data and dashboards are reflected and reported accurately.

·       Conducts troubleshooting support and provides user guidance for systems and tools usage.

·       Provides guidance and resources to customers relating to governance, risk, and compliance topics.

·       Develops and maintain process comprehensive security process documentation. Regularly review and revise documentation for accuracy and effectiveness.

·       Assists in the development and implementation of enterprise security strategies, policies, and plans, as well as the formulation and dissemination of standards and guidelines to manage statewide information and information asset related risks, threats, and vulnerabilities.

·       Performs other work-related duties as assigned.

 

Qualifications

 

Education

·       Graduation from an accredited four-year college or university with major coursework in

information technology security, computer information systems, computer science, management information systems, or a related field.

·       Additional work-related experience may be substituted for education on a year-for-year basis (High-school diploma required.

 

Experience and Training Required

 ·       Minimum of two (2) – four (4) years of experience in data analysis, reporting, and visualization, research, and technical writing

·       Minimum of two (2) – four (4) years of experience in information technology or security analysis or security management work

·       Minimum of one (1) year of experience in identifying and resolving technology and business risks.

 

Experience and Training Preferred

·       Experience with State of Texas information security requirements including Texas Administrative Code §202

·       Experience with Federal Information Security Management Act (FISMA) and National Institute of Standards (NIST) 800 Series Special Publications or other security standards and regulations.

·       One of the following certifications: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Manager (CISM), or equivalent certification/education

·       Administrative experience with Archer Integrated Risk Management

·       Experience with Data Visualization/Reporting software

·       Experience in Texas state government

·       Experience or familiarity researching and writing reports based on legislation, statutory requirements, laws, and regulations related to information security.  

 

Knowledge, Skills, and Abilities

 ·       Knowledge of Texas State government and related information technology processes.

·       Knowledge of the limitations and capabilities of computer systems and technology; technology across all mainstream networks, operating systems, and application platforms; operational support of networks, operating systems, Internet technologies, databases, and security applications and infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; incident response program practices and procedures; and information security practices, procedures, and regulations.

·       Skills in problem resolution.

·       Skill in the use of applicable software and the configuring, deploying, monitoring, and automating of security applications and infrastructure. Ability to promote and support the overall mission, goals, and efforts of the office of the CISO and GRC Program.

·       Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; and to communicate effectively.

·       Ability to apply knowledge of business practices and approaches.

·       Ability to plan, organize, coordinate, monitor and evaluate multiple priorities.

·       Ability to think strategically and focus on results.

·       Ability to prepare technical issue papers and research reports, and effectively deliver oral presentations and written reports to IT and non-IT management.

·       Ability to learn and adapt quickly in a dynamic environment.

·       Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers.

·       Ability to understand, follow and convey brief oral and/or written instructions.

·       Ability to communicate both verbally and in writing, in a clear and concise manner.

·       Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment.

·       Ability to work under pressure and exacting schedules to complete assigned tasks.

·       Ability to work a flexible schedule to meet required deadlines.

·       Ability to comply with all agency policy and applicable laws.

·       Ability to comply with all applicable safety rules, regulations, and standards.

Computer Skills

·       Proficiency in the use of a computer and applicable software necessary to perform work assignments

·       Advanced skills in Microsoft 0365 applications (Excel, PowerPoint, PowerAutomate, PowerBI)

Other Requirements

·       Regular and punctual attendance at the workplace.

·       Criminal background check.

Working Conditions

·       Frequent use of computers, copiers, printers, and telephones.

·       Frequent standing, walking, sitting, listening, and talking.

·       Frequent work under stress, as a team member, and in direct contact with others.

·       Occasional bending, stooping, lifting, and climbing.

Apply now Apply later
Job stats:  7  1  0
Category: Analyst Jobs

Tags: CISA CISM CISO CISSP Cloud Compliance Computer Science CRISC FISMA Governance Incident response Monitoring NIST Risk assessment Risk management Security analysis System Security Plan Vulnerabilities

Perks/benefits: Career development Flex hours

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.