TDI-Cybersecurity Analyst III

Texas-Austin

Texas Comptroller of Public Accounts

Glenn Hegar was elected as Texas Comptroller of Public Accounts — the states chief financial officer — in November 2014.

View all jobs at Texas Comptroller of Public Accounts

Apply now Apply later

TDI-Cybersecurity Analyst III (00049394) 

Organization

: TEXAS DEPARTMENT OF INSURANCE 

Primary Location

: Texas-Austin 

Work Locations

: Aus Barbara Jordan Building 1601 Congress Avenue  Austin 78701 

  

Job

: Computer and Mathematical 

Employee Status

: Regular 

Schedule

: Full-time Standard Hours Per Week: 40.00 

Travel

: Yes, 5 % of the Time State Job Code: 0321  Salary Admin Plan: B Grade: 27  

Salary (Pay Basis)

: 7,350.00 - 7,350.00 (Monthly) 

Number of Openings

: 1 

Overtime Status

: Exempt 

Job Posting

: Apr 11, 2025, 7:33:48 PM 

Closing Date

: Ongoing 

Description

 

Do you have a passion for public service and enjoy making a difference?  Don’t miss out on this opportunity. The Texas Department of Insurance (TDI) is hiring! Apply now if you’re looking for a rewarding career in public service. We regulate the insurance industry, administer the Texas workers’ compensation system, and educate and protect consumers.

Benefits of working at TDI:

·       Flexible work schedules.

·       Work-life-balance.

·       96 hours of accrued vacation a year.

·       96 hours of accrued sick leave a year.

·       20+ holidays every year.

·       Career advancement opportunities.

·       Free parking.

·       401(k) and 457 Programs.

·       State of Texas retirement plan with a lifetime annuity through the Employee Retirement System of Texas (ERS).

·       Free comprehensive medical insurance for full-time employees and 50% off premium costs for dependents (state pays other 50%).

·       Optional benefits like dental, vision, life insurance, and many more.

·       Qualified employer for the Federal Public Service Loan Forgiveness Program. 

Before you apply:

Learn about our selection process, our military employment preference, and licensing and credential requirements. 

Cybersecurity Analyst III

Performs highly complex (senior-level) cybersecurity analysis work. The work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.  The position assists with the agency’s information governance, awareness, and education. Limited supervision with considerable latitude for the use of initiative and independent judgment

This position:

·       Monitors security logs and creates custom alerts and dashboards to notify the agency about cybersecurity incidents.

·       Compares system settings to institutionally recommended security settings.

·       Performs assessments of infrastructure and applications to assess effectiveness of controls.  

·       Performs risk assessments and reviews of account permissions, computer data access needs, security violations, and programming changes.

·       Works closely with the information technology department and the data center teams to ensure compliance with industry best practices. 

·       Assists in designing and deploying security applications and infrastructure.

·       Updates and develops response procedures and response automation within current systems or by other means if necessary.

·       Reviews products, purchases, and architectural decisions for security implications.

·       Creates official policies and procedures and assists the implementation of security and access related processes.

·       Advises other teams on information security matters, including interdepartmental initiatives.

·       Conducts and coordinates training and exercises as needed, including phishing campaigns, disaster recovery, and security awareness campaigns.

·       Performs other duties as assigned.

 

Qualifications

 

This position requires: 

·       Three years of experience in cybersecurity analysis work or IT system administration.

·       Graduation from an accredited four-year college or university with major coursework in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems, or a related field is generally preferred.

·       Education and experience relevant to position requirements may be substituted for one another on a year-for-year basis

Additional job details:

This position requires regular work attendance. The ideal candidate must be available for weekly meetings and group collaboration via Microsoft Teams and other applications during regular business hours.

Preferences for this position include:

Held at least one certification from a recognized security organization or system company, such as ISC2, Microsoft, Amazon, RedHat, Cisco, Google, Oracle, or Offensive Security. Preferred certifications include:

·       Offensive Security Certified Professional (OSCP),

·       Azure AZ Series (AZ-100+),

·       AWS certifications beyond Cloud practitioner (Architect, Developer, Security, etc.),

·       Cisco Certified Network Associate (CCNA, CCNP),

·       Redhat Certified System Admin (RHCSA, RHCE),

·       Oracle Database Administrator,

·       “Associate of ISC2”, or

·       Certified Information Security Professional (CISSP).

Demonstrable capabilities with any of the following scripting languages:

·       Python

·       Powershell

·       Bash

This position requires demonstrated knowledge of:

·       State laws, rules, procedures, and regulations relevant to job requirements.

·       Operational support of networks, operating systems, Internet technologies, databases, and security infrastructure;  

·       Cybersecurity and information security controls, practices, procedures, and regulations; and of incident response program practices and procedures.

This position requires demonstrated skill in:

·       Problem solving and critical thinking.

·       Using Microsoft Office software applications, including Word, Excel, Outlook, and SharePoint.

·       Using personal computers sufficient to enter and extract data from related systems and programs such as Centralized Accounting Payroll and Personnel (CAPPS) and other systems required to perform the job.

·       Use of applicable software and in configuring, deploying, and monitoring security infrastructure.

This position requires the demonstrated ability to:

·       Communicate and work effectively with a wide range of people with varied skills, knowledge, and backgrounds.

·       Maintain the confidentiality of sensitive information.

·       Analyze and solve work-related problems and work independently on a variety of administrative work and technical assignments.

·       Manage workload and priorities to meet necessary deadlines.

·       Work both independently and as a team player.

·       Resolve complex security issues in diverse and decentralized environments.  

·       Plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls.

Veterans

Get help translating your military work experience and training courses into civilian job terms, qualifications/requirements, and skill sets. Redact personal or sensitive information from all attachments.

To receive a military employment preference, you must submit the following documents, as applicable, with your application. See How to Apply – Military Employment Preference.

Applicable Military Occupational Specialty (MOS) codes are included, but not limited to one of the following:

·       Army Military Occupational Codes - 25D Cyber Network Defender, 17B Cyber and Electronic Warfare Officer

·       Navy Ratings and Designators - 782X CWO - Information Systems Technician

·       Coast Guard Ratings - CYB12 Cybersecurity

·       Marine Corps Occupational Codes - 0681 Information Security Technician, 1702 Cyberspace Warfare Officer

·       Air Force Specialty Codes - 1D7X1 Cyber Defense Operations

·       Space Force Specialty Codes - 5C0X1D Cyber Ops - Defensive Cyber Ops

Click or copy and paste the following link into your browser to access Military Crosswalk information:

https://hr.sao.texas.gov/Compensation/MilitaryCrosswalk/MOSC_InformationTechnology.pdf

How to apply:

All applications must contain complete job histories, including job title, dates of employment, name of employer, manager’s name and phone number, and a description of duties performed. We may reject applications that do not include all the required information. Resumes do not substitute for this required information.

Submitted through Work in Texas:

Work in Texas (WIT) applicants must complete supplemental questions to be considered for the position. To complete supplemental questions, go to CAPPS Career Center to register or log in and access your profile. 

Apply now Apply later
Job stats:  1  0  0
Category: Analyst Jobs

Tags: Automation AWS Azure Bash CCNP CISSP Cloud Compliance Computer Science Cyber defense Governance Incident response Monitoring Offensive security Oracle OSCP PowerShell Python Risk assessment Scripting SharePoint

Perks/benefits: Flex hours Flex vacation Health care Medical leave

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.