Cybersecurity Analyst II
Texas-Austin
Full Time Entry-level / Junior USD 75K - 88K
Texas Comptroller of Public Accounts
Texas Comptroller of Public Accounts The Texas Comptroller’s office is the state’s chief tax collector, accountant, revenue estimator and treasurer. This office strives to provide you the best possible services and resources to do business in...Organization
: DEPARTMENT OF INFORMATION RESOURCESPrimary Location
: Texas-AustinWork Locations
: WP Clements 300 W 15TH ST STE 1300 Austin 78701Job
: Computer and MathematicalEmployee Status
: RegularSchedule
: Full-time Standard Hours Per Week: 40.00 State Job Code: 0320 Salary Admin Plan: B Grade: 25Salary (Pay Basis)
: 6,250.00 - 7,350.00 (Monthly)Number of Openings
: 1Overtime Status
: ExemptJob Posting
: Oct 31, 2024, 8:45:32 PMClosing Date
: OngoingDescription
Job Posting:
00045259
This is a repost of job number 00045259
Opened:
9/17/2024
Closes:
10/1/2024
Position Title:
Cybersecurity Analyst II (Governance, Risk, and Compliance (GRC) Analyst)
Class/Group:
0320/B25
Military Occupation Specialty Code:
Army 25B; Navy 182X, 682X; Air Force 3D1X1; Space Force 514A Fair Labor
Standards Act Status:
Exempt
Number of Vacancies:
1
Division/Section:
Chief Information Security Office / Governance, Risk, and Compliance
Salary Range:
$6,250.00-$7,350.00/month
Duration:
Regular
Hours Worked Weekly:
40
Work Schedule:
This position may be eligible for flexible work hours and/or a hybrid work schedule if certain program guidelines are met; working arrangements may change at any time at the sole discretion of the agency.
Travel:
Limited
Agency Address:
300 West 15th Street, #1300 / Austin, Texas 78701
Web site:
Refer Inquiries to:
People and Culture Office
Telephone:
512-475-4957 or (512) 463-5920
How To Apply:
- Select “Apply Online” to apply for the job at https://capps.taleo.net/careersection/ex/jobsearch.ftl?lang=en
- You must create a CAPPS Career Section candidate profile or be logged in to apply.
- Update your profile and apply for the job by navigating through the pages and steps.
- Once ready, select “Submit” on the “Review and Submit” page.
- If you have problems accessing the CAPPS Career Section, please follow the instructions in the Resetting CAPPS Password for Job Candidate desk aid.
Special Instructions:
- Applicants must provide in-depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.
- Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.
Interview Place/Time:
Candidates will be notified for appointments as determined by the selection committee.
Selective Service Registration:
Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.
H-1B Visa Sponsorship:
We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Equal Opportunity Employer
The Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability. Please call 512-475-4922 to request reasonable accommodation.
Position Description
Division:
Office of the Chief Information Security Officer/Governance, Risk, and Compliance (GRC) Program
Class/Group:
0320/B25
Title:
Cybersecurity Analyst II (Governance, Risk, and Compliance (GRC) Analyst)
Fair Labor Standards Act Status:
Exempt
What We Do
The Texas Department of Information Resources is the state agency charged with protecting the state’s data and critical technology infrastructure, managing a multi-million-dollar cooperative contracts program, and providing strategic technology leadership, solutions, and innovation to all levels of Texas government. DIR is a fast-paced and collaborative environment with highly motivated and engaged employees dedicated to achieving the best value for the state.
Position Summary
The individual in this role will perform complex (journey-level) cybersecurity analysis in a variety of functions, such as, planning, implementing, and monitoring security program elements and services that support government organizations throughout the state of Texas in the protection of their information resources. The individual will also interact frequently with external personnel at other state agencies and educational and governmental organizations throughout the state using a variety of communication mechanisms. The ideal candidate will be a security professional with a background in, and understanding of, the technical, policy, and compliance aspects of information security. Works under general supervision, with limited latitude for the use of initiative and independent judgment.
· Performs governance, risk assessments, and compliance tasks, which involves developing and documenting system security plans, developing policy, and performing process analysis.
· Completes TX-RAMP assessments, and onboarding of cloud service providers efficiently.
· Tracks performance metrics and visualizes data. Develop, research, and draft reports, ensuring report data and dashboards are reflected and reported accurately.
· Conducts troubleshooting support and provides user guidance for systems and tools usage.
· Provides guidance and resources to customers relating to governance, risk, and compliance topics.
· Develops and maintain process comprehensive security process documentation. Regularly review and revise documentation for accuracy and effectiveness.
· Assists in the development and implementation of enterprise security strategies, policies, and plans, as well as the formulation and dissemination of standards and guidelines to manage statewide information and information asset related risks, threats, and vulnerabilities.
· Performs other work-related duties as assigned.
Qualifications
Education
· Graduation from an accredited four-year college or university with major coursework in
information technology security, computer information systems, computer science, management information systems, or a related field.
· Additional work-related experience may be substituted for education on a year-for-year basis (High-school diploma required.
Experience and Training Required
· Minimum of two (2) – four (4) years of experience in data analysis, reporting, and visualization, research, and technical writing
· Minimum of two (2) – four (4) years of experience in information technology or security analysis or security management work
· Minimum of one (1) year of experience in identifying and resolving technology and business risks.
Experience and Training Preferred
· Experience with State of Texas information security requirements including Texas Administrative Code §202
· Experience with Federal Information Security Management Act (FISMA) and National Institute of Standards (NIST) 800 Series Special Publications or other security standards and regulations.
· One of the following certifications: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Manager (CISM), or equivalent certification/education
· Administrative experience with Archer Integrated Risk Management
· Experience with Data Visualization/Reporting software
· Experience in Texas state government
· Experience or familiarity researching and writing reports based on legislation, statutory requirements, laws, and regulations related to information security.
Knowledge, Skills, and Abilities
· Knowledge of Texas State government and related information technology processes.
· Knowledge of the limitations and capabilities of computer systems and technology; technology across all mainstream networks, operating systems, and application platforms; operational support of networks, operating systems, Internet technologies, databases, and security applications and infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; incident response program practices and procedures; and information security practices, procedures, and regulations.
· Skills in problem resolution.
· Skill in the use of applicable software and the configuring, deploying, monitoring, and automating of security applications and infrastructure. Ability to promote and support the overall mission, goals, and efforts of the office of the CISO and GRC Program.
· Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; and to communicate effectively.
· Ability to apply knowledge of business practices and approaches.
· Ability to plan, organize, coordinate, monitor and evaluate multiple priorities.
· Ability to think strategically and focus on results.
· Ability to prepare technical issue papers and research reports, and effectively deliver oral presentations and written reports to IT and non-IT management.
· Ability to learn and adapt quickly in a dynamic environment.
· Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers.
· Ability to understand, follow and convey brief oral and/or written instructions.
· Ability to communicate both verbally and in writing, in a clear and concise manner.
· Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment.
· Ability to work under pressure and exacting schedules to complete assigned tasks.
· Ability to work a flexible schedule to meet required deadlines.
· Ability to comply with all agency policy and applicable laws.
· Ability to comply with all applicable safety rules, regulations, and standards.
Computer Skills
· Proficiency in the use of a computer and applicable software necessary to perform work assignments
· Advanced skills in Microsoft 0365 applications (Excel, PowerPoint, PowerAutomate, PowerBI)
Other Requirements
· Regular and punctual attendance at the workplace.
· Criminal background check.
Working Conditions
· Frequent use of computers, copiers, printers, and telephones.
· Frequent standing, walking, sitting, listening, and talking.
· Frequent work under stress, as a team member, and in direct contact with others.
· Occasional bending, stooping, lifting, and climbing.
Tags: CISA CISM CISO CISSP Cloud Compliance Computer Science CRISC FISMA Governance Incident response Monitoring NIST Risk assessment Risk management Security analysis System Security Plan Vulnerabilities
Perks/benefits: Career development Flex hours
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.