Junior Information Security Analyst
Junior Information Security AnalystDepartment:
VP Business AffairsClassification:
The University of Texas Permian Basin welcomes applicants for the position of Junior Information Security Analyst.
This position reports to the Chief Information Security Officer.
GENERAL RESPONSIBILITIES: The Junior Information Security Analyst primary responsibilities include cybersecurity analysis, incident detection/response, and the implementation of best-practice IT Security processes, threat assessment, cyber intelligence, secure software configurations, and vulnerability assessments/mitigations, with ancillary duties supporting administration of PeopleSoft user security permissions. This position may also assist with the development and update of cybersecurity-centric policies and procedures and assist with establishing network device implementation best practices, while providing guidance to others. Works under the supervision of the Chief Information Security Officer with moderate latitude for the use of initiative and independent judgement.
SPECIFIC TASKS AND DUTIES:
1. Incident detection and response.
2. Provide level two (2) support with issues pertaining to cybersecurity, as needed, from all University personnel and resolve user-submitted issues and tasks.
3. Information Security and related risk assessments, as well as remediation plan development.
4. Assist with PCI compliance reviews, as needed.
5. Monthly security patching.
6. Multi-factor authentication management.
7. Assist with compiling, maintaining, and filing of all physical and computerized reports, records, and other documents, as required.
8. Document and communicate cybersecurity policy and training.
9. Support information security projects and initiatives.
10. PeopleSoft user security administration.
11. Periodic user access reviews in conjunction with department heads
12. Maintain user access standards in accordance with State, UT System, and local requirements
The above statements are not a complete list of all responsibilities and duties performed by employees in this job. Employee may perform other related duties as assigned by the Chief Information Security Officer.
Generally, the hours for this exempt position are Monday through Thursday, 7:30am – 5:30pm and Friday 8:00am – 12:00pm. The individual holding this position may need to be available early mornings, evenings and weekends to meet the needs of the University.
CONDITIONS OF EMPLOYMENT:
Employment is subject to an introductory period to monitor employee performance. If hired, the prospective employee must present documentation within three (3) days of hire date to establish their identity and employment eligibility as required by Immigration and Customs Enforcement (ICE). Must be able to operate a licensed motor vehicle, have access to a dependable motor vehicle, and possess a valid state driver’s license. Must have and maintain a satisfactory driver’s record.
The University offers an excellent compensation package which includes a broad range of employee benefits including free health insurance (employee only) as well as a generous retirement program. We invite you to learn more at www.utpb.edu.
The University of Texas Permian Basin is an Equal Opportunity/Affirmative Action Employer. Women and underrepresented groups are encouraged to apply.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
EOE, including disability/vets
UTPB participates in e-VerifyRequired Qualifications:
1. Progress towards Bachelor’s degree with an emphasis in computer science, business computer information systems, or, equivalent combination of education and experience.
2. Knowledge of system admin fundamentals – including configuration, maintenance, security, and networking.
3. Excellent communication skills with emphasis on the ability to communicate effectively through clear, concise, delivery coupled with listening attentively, valuing others’ perspectives, creating open dialogue in the incumbent’s area of influence, and effectively conveying technical information to non-technical personnel.
4. Ability to gain the confidence of others through principled business practices, profound integrity, follow-through on commitments, and adherence to established procedures.
5. Ability to establish relationships that enhance cooperation and collaboration.
6. Self-motivated, demonstrating a sense of ownership and commitment to achieving goals and objectives by setting high standards for personal performance.
7. Ability to prioritize tasks and make progress on multiple projects simultaneously.
8. Ability to successfully pass a Level I background check.
9. Prior experience with network, system, and user security, threat hunting, vulnerability management, PowerShell scripting, and incident response is a plus.
In this position, the Information Security Analyst would be expected to have or possess:
1. Ability to handle highly confidential material, understanding that all University information should only be disclosed to others who have a need to know, for legitimate business reasons. Exercise and apply sound judgment and decision making skills.
2. Exemplary customer skills, including dealing effectively with the students, faculty, staff, and general public both in person and over the telephone.
3. Knowledge of the campus community and have the ability to make independent decisions but yet know when supervisory assistance is required.
4. Knowledge of information security threats and the ability to implement and work with preventative controls including: firewalls, access controls, authentication systems, intrusion detection systems, VPNs, and encryption
5. Ability to perform analysis of log files from routers, switches, firewalls, and other IT security systems
6. Skills in the use of vulnerability assessment and penetration testing tools
7. Ability to work on multiple tasks concurrently and to meet project deadlines
8. Troubleshooting skills and a demonstrated history of proficient technical ability
9. Demonstrated customer service, communication, collaboration, and writing documentation skills in the area of technical communication
10. Ability to develop and maintain system documentation and technical manuals
11. Demonstrated writing skills with the ability to compose with accuracy, simplicity, and completeness while providing an appropriate level of detail for the intended audience
12. Ability to work outside normal working hours, as required by circumstances.
13. Possess ability to analyze projects. Ability to shift quickly between several tasks without loss of continuity while balancing priorities to accomplish assigned tasks within the required time frame.
14. Employ appropriate teaching and learning strategies to communicate subject matter. Ability to perform research relating to information security issues and methods of instruction and make recommendations for improvements.
15. Frequently communicates general information to University constituency, however, some situations may require the ability to relay complex information with tact and diplomacy.
16. Ability to work effectively, decisively and flexibly in a fast-paced, dynamic environment. Ability to identify problems and to propose feasible solutions. Strong organizational skills and the ability to work well under pressure and to meet deadlines.
17. Highly motivated and be able to work on own initiative yet the ability to work successfully as part of a team.
18. Engage in meaningful and intentional professional development.
19. Establish and maintain effective communication & working relationships with internal and external constituents.
20. Knowledge of Microsoft Office software. (Specifically, Word, Excel and Outlook) as well as the ability to stay current with emerging office technologies.
21. The ability to travel locally and nationally for University business.
22. Confer regularly with immediate supervisor, other department/University personnel, and/or various firms/organizations/individuals external to the University to exchange information and resolve problems.
23. Carry out all responsibilities and objectives in a professional manner.
24. Maintain professionalism when dealing with all staff and other customers while fostering positive working relationships.
25. Adhere to the policies and procedures established by the State of Texas, University of Texas Board of Regents, and the University of Texas Permian Basin.
26. Knowledge of user access controls and permissions.
27. Understanding of the principle of least privilege/need to know when limiting user access rights
To perform this job successfully, an individual must be physically able to perform each essential duty satisfactorily. The expectations listed below are representative of the skills and/or abilities required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions:
1. Physically able to lift various materials up to 50 pounds on an occasional basis.
2. While performing required job tasks, physically able to remain seated, frequently to continuously.
3. While performing required job tasks, physically able to remain standing up to 15% of the time.
4. Possesses dexterity abilities required to perform typing, operate a computer and other office equipment, to perform filing, and related job responsibilities.
5. Work is normally performed in a typical interior/office work environment. May be required to bend/stoop or kneel/crawl. Have manual dexterity of fingers and hands to operate a keyboard as well as ability to operate tools such as a screwdriver, pliers, etc.
6. Ability to travel for the University
01/31/2021Open Until Filled: