IT Security Analyst II

​Job Posting:         



Position Title:      
IT Security Analyst II


Military Occupation Specialty Code:  
Army 25B, 255A, 255S; Navy IT, 682X782X; Coast Guard IT; Marine Corps 0681


Number of Vacancies:

Chief Information Security Office

Salary Range:
$5258.67 - $7500.00/ monthly


Hours Worked Weekly:     



Agency Address: 
300 W. 15th, #1300, Austin, TX 78701

Web site:

Refer Inquiries to:              
Human Resources

(512) 463-5920 or (512) 475-4612


  • Select “Apply Online” to apply for the job at
  • You must create a CAPPS Career Section candidate profile or be logged in to apply
  • Update your profile and apply for the job by navigating through the pages and steps
  • Once ready, select “Submit” on the “Review and Submit” page.

Applicants must provide in depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.

Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.

Interview Place/Time:
Candidates will be notified for appointments as determined by the selection committee.

Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their
Selective Service registration or proof of their exemption from the requirement as a condition of state employment.

The Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age or disability.  Please call 512-463-5920 to request reasonable accommodations.


The Texas Department of Information Resources serves a wide variety of customers by providing
technology leadership, solutions, and value to State of Texas government agencies, higher education, and local government entities of all sizes to facilitate the fulfillment of their core missions. This role within the Chief Information Security Office combines progressive information security program development, implementation, and management expertise with an opportunity to leverage an entrepreneurial determination to evolve information security within state government.

The individual in this role will perform advanced (senior-level) information security analysis in a variety of functions, such as, planning, implementing, and monitoring security program elements and services that support government organizations throughout the state of Texas in the protection of their information resources. The individual will also interact frequently with external personnel at other   state agencies and educational and governmental organizations throughout the state using a variety of communication mechanisms. The ideal candidate will be a well-rounded security professional with   a background in, and understanding of, the technical, policy, and compliance aspects of information security. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.

The ideal candidate will have the ability to highlight their strengths in the following functions:

  • Supports the statewide services efforts to implement and establish policies, systems, reports, and programs that deliver services to agencies and help DIR and its customers fulfill statutorily mandated deadlines and deliverables.
  • Tracks and ensures accuracy of performance measures, contacts, and division metrics across systems.
  • Helps provide oversight and governance to ensure that Shared Technology Service Providers meet prescribed comprehensive infrastructure, facilities, and data security contractual obligations.
  • Ensures division website content is accurate, up-to-date, and effectively communicated. Ensures division email box is monitored and maintained.
  • Functions as a cybersecurity generalist able to support and backfill work across the entire team.
  • Provides GRC system operational support, including troubleshooting issues, access control management, account management, and general technical support.
  • Advises customers and internal stakeholders on security configuration and best practice issues.
  • Performs other related duties as assigned.


  • Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field
  • Two additional years of experience may be used to substitute for each year of formal education. (High School diploma or equivalent certificate required.)


  • Four (4) years of progressively responsible experience in the IT industry
  • Two (2) years of experience in information technology security analysis or security management work
  • One of the following certifications: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Manager (CISM), or equivalent certification/education
  • Experience with the State and Federal regulations and standards, including the National Institute of Standards and Technology (NIST) 800 series publications, Texas Administrative Code § 202, and the Federal Information Security Management Act (FISMA)
  • Experience conducting analysis of cybersecurity incidents and events and the ability to prepare and deliver oral and written presentations of that analysis
  • Experience in Texas state government


  • If not already certified, must obtain within one year of employment a Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Security Professional (CISSP), GIAC Security Essentials Certification (GSEC), or similar certification, or serve as a SME on a certification creation committee or equivalent


  • Knowledge of data communications, networking, computer programming and systems analysis
  • Knowledge of and ability to apply information security best practices
  • Knowledge of principles, practices, and techniques of management controls and information security protections as applied to state government
  • Knowledge of security incident response processes
  • Knowledge of Texas State government and related information technology processes
  • Knowledge of security metrics, benchmarking activities and expectations, and security operational monitoring processes
  • Ability to handle multiple projects and initiatives
  • Ability to prepare technical issue papers and research reports, and effectively deliver oral presentations and written reports to IT and non-IT management
  • Ability to advise technical staff from customer agencies
  • Ability to travel as necessary to support agency requirements
  • Ability to understand, follow and convey brief oral and/or written instructions
  • Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers
  • Ability to communicate both verbally and in writing; in a clear and concise manner
  • Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment
  • Ability to work a flexible schedule to meet required deadlines
  • Ability to work under pressure and exacting schedules to complete assigned tasks
  • Ability to comply with all agency policies and applicable laws
  • Ability to comply with all applicable safety rules, regulations and standards


  • Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred)


  • Regular and punctual attendance
  • Criminal background check


  • Frequent use of a personal computer, copiers, printers and telephones
  • Frequent work under stress, as a team member, and in direct contact with others
  • Frequent standing, walking, sitting, listening and talking
  • Occasional bending and stooping
  • Occasional lifting and climbing