Comptroller - Enterprise Security Analyst II
Texas-Austin
Full Time Entry-level / Junior USD 90K - 96K
Texas Comptroller of Public Accounts
Glenn Hegar was elected as Texas Comptroller of Public Accounts — the states chief financial officer — in November 2014.Organization
: COMPTROLLER OF PUBLIC ACCOUNTSPrimary Location
: Texas-AustinWork Locations
: Lyndon B Johnson Building (304-00001) 111 E 17th Street Austin 78774Job
: Computer and MathematicalEmployee Status
: RegularSchedule
: Full-time Standard Hours Per Week: 40.00Travel
: Yes, 5 % of the Time State Job Code: 0320 Salary Admin Plan: B Grade: 25Salary (Pay Basis)
: 7,583.33 - 8,083.33 (Monthly)Number of Openings
: 1Overtime Status
: ExemptJob Posting
: May 12, 2025, 4:25:14 PMClosing Date
: OngoingDescription
Applications must be filed at: https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00049878
Please note that this job posting can be closed without notice and earlier than the closing date indicated in the posting if a suitable candidate is found. We encourage applicants to submit and complete the application promptly.
Are you ready to grow, make a positive impact? If you are seeking to gain knowledge, build your career, and network among goal-oriented professionals, this is the place for you!
Innovation, collaboration, and a commitment to excellence best describes the culture here at the Comptroller’s Office. We take pride in the work we do serving as Texas' accountant, tax collector, treasurer, and much more! The Comptroller’s office serves virtually every citizen in the state. As Texas’ chief tax collector, accountant, revenue estimator, treasurer and purchasing manager, the agency is responsible for writing the checks and keeping the books for the multi-billion-dollar business of state government.
Our agency workforce is as diverse as the people of Texas we serve. We value our employees and take very seriously our collective commitment to public service. Personal development opportunities are strongly encouraged through available workshops, teambuilding exercises, and on the job training. We offer flexible scheduling that helps employees maintain a healthy work-life balance.
Click here to see an inside look at the Texas Comptroller’s office!
ABOUT THE Division
General description
The IT division is looking for a security professional to join our Incident Response team. This person will be joining a fast-paced, security focused team dedicated to solving technical issues on a day-to-day basis. The work will involve handling all aspects of monitoring, incident detection, and front-line response to alerts. Daily tasks include maintaining or enhancing our DLP, EDR, and SIEM products, as well as supporting other relevant areas and projects. Our partially remote work environment offers valuable experience and opportunities. Apply to join our team if you are honest, self-motivated, detail-oriented, and customer friendly.
Work Hours
The position works an eight-hour schedule between 7:00 am and 6:00 pm, 40-hour week, Monday – Friday with occasional work schedule variance as necessary. Hours may change based on business need. Performs On-Call duty on a rotational basis and occasionally work overtime and/or additional hours based on business peaks. Employee must be capable of being online/onsite within one (1) hour of being called.
Teleworking may be considered if certain working conditions are met. The candidate must have permanent residency within the state of Texas and must be able to meet in office requirements, which can vary among different sections (i.e. report to office 1-3 days/week, etc.). Travel reimbursements are not provided for teleworking.
Qualifications
Minimum Qualifications
• Bachelor's degree.
• Four (4) years of experience in cybersecurity analysis, information security analysis, or digital forensics.
Preferred Qualifications
• Bachelor’s degree in information technology security, computer information systems, computer science, management information systems, or a related field.
• Experience in supporting endpoint security, SIEM, vulnerability scanning or DLP tools.
• Experience in analyzing security events or network infrastructures.
Substitution
• One (1) additional year of experience in information security analysis work may substitute for thirty (30) semester hours of educational requirement with a maximum substitution of 120 semester hours (four years).
• Cybersecurity certifications such as, Security +, CISSP, or any related cybersecurity certificates may substitute for one (1) year of the minimum experience requirement.
Licenses/Certifications
One of the following certifications is preferred: Security+, CCNA, CCNA-S, CCNP-S, CCSP, CISSP, GCIA, GCFW, SANS certificates or any related cybersecurity certificates.
SUMMARY OF PHYSICAL REQUIREMENTS
The physical demands described here are represented of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
This position requires the incumbent to primarily perform sedentary office work; however, mobility (standing and walking) is routinely required to carry out some duties. It requires extensive computer, telephone, and client/customer contact.
The job also requires normal cognitive abilities requiring the ability to learn, recall, and apply certain practices and policies. It requires the stamina to maintain attention to detail despite interruptions. Marginal or corrected visual and auditory requirements are required for reading printed materials and computer screens and communicating with internal and external customers. Must be able to lift at least 25 pounds. Will need to sit for extended periods of time while working on a computer.
Employees are required to use their personal mobile phones as a part of 2 factor/multi factor authentication for accessing CPA systems securely. You will also receive critical/emergency calls/texts on your cell phone to ensure immediate communication.
In this role you will:
• Implement and maintain enterprise security systems including Anti-Virus, DLP, SIEM systems, vulnerability scanners and security information management tools.
• Monitors and analyze cybersecurity alerts from cybersecurity tools, network devices, and information systems.
• Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.
• Support and lead incident response activities including coordination of immediate corrective action to systems known to have any security weaknesses or vulnerabilities, including network isolation, re-configuration and installing appropriate patches or upgrades.
• Performs cybersecurity incident detection, analysis, and prevention.
• Implementation of continuous automated security compliance capabilities.
• Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
• Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.
• Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status.
• Design, automate, manage, and deploy security applications and infrastructure program activities.
• Develop plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
• Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency.
• Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
• Implement and maintain security controls for infrastructure systems including servers, workstations, web and other applications.
• Provide ongoing monitoring of sources of information on potential threats and vulnerabilities, including hacker web sites, anti-virus vendors, other government agencies and trade publications.
• Troubleshoots systems problems related to network, security, infrastructure, and application information systems.
• Supports the implementation of computer system security plans with agency personnel and outside vendors.
• Creates and maintains accurate documentation of current enterprise security environment.
• Performs related work as assigned.
Maximize Your Earnings!
At the Comptroller's office, we know potential employees are looking for more than just a paycheck. The agency offers a strong benefits package for you and your family. Insurance, retirement plans, and a flexible work schedule are just the start. See our benefits offering
If you are seeking to gain knowledge, build your career, and network among goal-oriented professionals, this is the place for you!
Important Note to the Candidate:
Salary is contingent upon qualifications. If you are scheduled for an interview and require any reasonable accommodation in our interview process, please inform the hiring representative who calls you to schedule your interview. Whenever possible, please give the hiring representative sufficient time to consider and respond to your request.
MILITARY PREFERENCE
To receive MILITARY PREFERENCE, you are required to provide proof by attaching the necessary documentation to this job application.
https://hr.sao.texas.gov/CompensationSystem/JobDescriptions
Click on the occupational category for the position.
Additional MOS can be found at the State Auditor’s Office,
The Texas Veterans Commission provides helpful employment information. Go to: http://www.texasskillstowork.com, http://www.onetonline.org, https://hr.sao.texas.gov/CompensationSystem/JobDescriptions/ or www.careeronestop.org for assistance translating your military experience and training courses into civilian job terms, qualifications/requirements and skill sets.
Applications submitted through Work in Texas:
Work In Texas (WIT) applicants must complete supplemental questions to be considered for the position. To complete the supplemental questions please go to CAPPS Recruit to register or login and access your profile.
The Comptroller’s Office is proud to be an equal opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity.
Resumes will not be accepted in lieu of completed applications. The application must contain the necessary information in the work history for the applicant to qualify for the position.
An applicant must be eligible to work in the United States to be hired at the Comptroller's office and must remain eligible, without sponsorship or any assurance of financial or other assistance from this agency, during the term of their employment.
Tags: CCNP CCSP CISSP Compliance Computer Science EDR Endpoint security Forensics GCFW GCIA Incident response Monitoring SANS Security analysis SIEM System Security Plan Vulnerabilities Vulnerability scans
Perks/benefits: Career development Flex hours Insurance Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.