Cybersecurity Analyst I (Cyber Incident Response Team Analyst)
Open Until Filled
Cybersecurity Analyst I (Cyber Incident Response Team Analyst)
Military Occupation Specialty Code:
Army-17C, 25B, 170A; Navy–IT, Coast Guard-CYB10, 11, 12; Marine Corps-0681; Air Force-3D0X3
Number of Vacancies:
Office of the Chief Information Security Officer / Security Operations / CIRT
$5258.67 - $6666.67/monthly
Hours Worked Weekly:
This position may be eligible for flexible work hours and/or a hybrid work schedule if certain program guidelines are met; working arrangements may change at any time at the sole discretion of the agency.
300 W. 15th, Austin, Texas 78701
Refer Inquiries to:
(512) 463-5920 or (512) 475-4612
HOW TO APPLY:
- Select “Apply Online” to apply for the job at https://capps.taleo.net/careersection/ex/jobsearch.ftl?lang=en
- You must create a CAPPS Career Section candidate profile or be logged in to apply
- Update your profile and apply for the job by navigating through the pages and steps
- Once ready, select “Submit” on the “Review and Submit” page
- If you have problems accessing the CAPPS Career Section, please email the CAPPS Recruiting Help Desk at firstname.lastname@example.org
- Applicants must provide in-depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.
- Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.
Candidates will be notified of appointments as determined by the selection committee.
Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.
EQUAL OPPORTUNITY EMPLOYER
The Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability. Please call 512-463-5920 to request reasonable accommodations.
The Texas Department of Information Resources is the state agency charged with protecting the state’s data and critical technology infrastructure, managing a multi-million-dollar cooperative contracts program, and providing strategic technology leadership, solutions, and innovation to all levels of Texas government. DIR is a fast-paced and collaborative environment with highly motivated and engaged employees dedicated to achieving the best value for the state.
A role within the Office of the State Chief Information Security Officer (OCISO) that combines progressive incident response program development, works with many diverse organizations, plans for, and responds to Cyber events, and reviews and communicates threats and vulnerabilities to a wide range of stakeholders. You will play a critical role in responding to cybersecurity incidents in Texas and preparing our state for future cyber incidents. If you are looking to be a changemaker, this role is for you!
Performs complex (journey-level) cybersecurity analysis work. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services. Will interact frequently with state agencies, institutions of higher education, local governmental officials, and other interagency personnel using a variety of communication mechanisms to engage and deliver incident response services. Work with the rest of the OCISO team to collaboratively identify and deliver statewide security program improvements and continuously improve the security posture of the state of Texas as a whole. May provide guidance to others. Works under general supervision, with moderate latitude for the use of initiative and independent judgment.
WHAT WE DO
The ideal candidate will have the ability to highlight their strengths in the following functions:
- Support cyber incident response activities and services for any eligible governmental entity across the state of Texas.
- Coordinates with industry partners, government agencies (including law enforcement and intelligence agencies,) and other specialists to establish and maintain situational awareness of current and emerging risks and threats to the state.
- Coordinates with the DIR Network Security Operations Center (NSOC), any Regional Security Operations Centers (RSOC) and at times federally provided Security Operations Center ex: MS-ISAC SOC, provided internally or by an externally managed security services provider, to identify and assess security incidents.
- In consultation with the DIR leadership, OCISO team, and other relevant stakeholders, develop and potentially deliver tabletop preparedness exercises at the technical or analyst level.
- Provides education to governmental entities on sound security practices.
- Work with the rest of the OCISO team to collaboratively identify and deliver statewide security program improvements and continuously improve the security posture of the State of Texas as a whole.
- Supports development and maintenance of the DIR State of TX CIRT security incident response process, including all required supporting materials.
- Performs related work as assigned.
- Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, cybersecurity, management information systems, or a related field.
- Additional years of work-related experience may be used to substitute for each year of formal education. (High School diploma or equivalent certificate required.)
EXPERIENCE & TRAINING REQUIRED
- Two (2) years of experience in the IT industry performing work in one or more of the following areas is required:
- System Administration
- Information Security
- Vulnerability Scanning
- Vulnerability Management
- Formal Risk Assessments
- Penetration Testing
- Digital Forensics
- Security Operation Center (SOC) Operations
EXPERIENCE & TRAINING PREFERRED
- Experience and training in analyzing, recommending, developing, and implementing cogent enterprise-wide policies, standards, and guidelines.
- Experience in researching and documenting findings on information technology issues, processes, or programs.
- Experience in creating and editing documentation, related processes public presentations, and other written communication.
- Have or work towards obtaining Certified Ethical Hacker (CEH) GAIC Certified Incident Handler (GCIH), GCFE Certified Forensic Examiner (GAIC ), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Security Professional (CISSP), GIAC Security Essentials Certification (GSEC), Certified Incident Handler (GCIH) and/or CyberSec First Responder (CFR) or similar certification, or serve as a SME on a certification creation committee or equivalent.
KNOWLEDGE, SKILLS & ABILITIES
- Knowledge of applied “sound security” concepts, such as the principle of least privilege, the use of multi-factor authentication, and identity and access management.
- Broad understanding of the cybersecurity landscape including identity management, access management, access governance, and privileged access management capabilities and methodologies
- Knowledge of generally accepted information technology standards and practices; of information technology practices; and of information technology management practices.
- Knowledge of the security limitations and capabilities of computer systems and of information security practices, procedures, and regulations
- Knowledge of security architecture and security program requirements
- Knowledge of relevant DIR IT Security Services and regulations including Texas Government Code Chapter 2059, Texas Administrative Code § 202, and other related security codes, documentation, standards, and best practices
- Knowledge of ITIL processes and standards
- Knowledge of standard concepts, practices, and procedures for computer operations and data center operations
- Knowledge of benchmarking activities and expectations
- Demonstrated documentation skills.
- Ability to communicate effectively using interpersonal skills and appropriate supporting technology.
- Ability to promote and support the overall mission, goals, and efforts Office of the CISO and Statewide Security Program.
- Ability to learn and adapt quickly in a dynamic environment.
- Ability to manage projects to resolve complex issues in diverse and decentralized environments
- Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers
- Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment
- Ability to understand, follow, and convey complex oral and/or written instructions
- Ability to communicate both verbally and in writing in a clear and concise manner
- Ability to work under pressure and exacting schedules to complete assigned tasks
- Ability to work occasional overtime and/or a flexible schedule as needed to meet required deadlines
- Ability to travel as necessary
- Ability to comply with all agency policies and applicable laws
- Ability to comply with all applicable health and safety rules, regulations, and standards
- Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g., word processing, Visio (or similar), spreadsheets (Microsoft Office preferred), and project management tools (Microsoft Project preferred).
- Regular and punctual attendance
- Criminal background check
- Exposure to the standard office environment and office conditions
- Job involves a moderate amount of walking daily
- Frequent use of personal computers, copiers, printers, and telephone
- Frequent sitting, listening and talking
- Frequent work under stress, as a team member, and in direct contact with others
- Occasional bending and stooping
- Infrequent lifting and climbing
- May occasionally work extended hours
- May occasionally travel