What are the responsibilities and job description for the Ent Security Analyst II position at Texas Tech University?
Major/Essential Functions
Participates in the execution of vulnerability management systems at the network, system, application, and desktop levels.
Performs network/protocol scanning and reporting.
Responsible for the research, technical analysis, recommendation, configuration, and administration of systems and procedures to ensure the protection of information processed, stored or transmitted.
Develops and installs scripts for the customization or automation of security monitors and intrusion prevention systems.
Analyzes systems, processes, or events as a part of formalized Incident Management procedures, including digital forensic investigation and event log analysis
Conducts risk and/or vulnerability assessments for active or proposed enterprise hardware and/or software systems and components.
Conducts security research in keeping abreast of latest security issues
Administers security controls and access lists for network devices including firewalls, switches, routers, servers, and appliances.
Performs other duties in support of the Information Security Program.
Maintains an active awareness of the evolving security threat landscape.
Maintains an active awareness of federal, state, and local regulations and policies.
Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems
Uses a variety of desktop and/or web-based software and tools to create or modify documentation and to communicate with team members and supervisors.
Assist with the training and development of team members.
Lead and/or manage projects involving internal and/or external team members.
May interface with users, vendors, or other stakeholders.
May interface with key IT leadership and/or other functional leadership.
Adheres to all appropriate Institutional policies (including IT OPs) and other relevant internal departmental policies.
Exercise judgment based on an understanding of organizational policies and activities.
Plan and organize effectively, prioritize goals, use time efficiently, and communicate effectively, both orally and in writing.
Establish and maintain effective work relationships.
Experience in one or more security domains as defined by the ISC2 CISSP Common Body of Knowledge (CBK), which currently includes: Access formation Security and Risk Management.
Knowledge of security and risk frameworks, standards, and best practices (e.g., HITRUST CSF, NIST, ISO 27001, COBIT) preferred.
Business Continuity/Disaster Recovery Planning.
Security Architecture and Design.
Physical and Environmental Security.
Telecommunications and Network Security.
Legal Regulations, Compliance, and Investigations.
Required Qualifications
Bachelor's degree with coursework in computer science, MIS, IT, or other related area plus one (1) year related full-time paid experience OR a combination of related education and/or experience.
Required Attachments
Cover Letter, Recommendation/Referral, Resume / CV
Pay Statement
Compensation is commensurate upon the qualifications of the individual selected and budgetary guidelines of the hiring department, as well as, the institutional pay plan. For additional information, please reference the institutional pay plan on the Human Resources webpage.
EEO Statement
As an EEO/AA employer, the Texas Tech University System and its components will not discriminate in our employment practices based on an applicant’s race, ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, genetic information or status as a protected veteran.
Jeanne Clery Act
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. By October 1 of each year, institutions must publish and distribute their Annual Campus Security Policy & Crime Statistics Report (ASR) to current and prospective students and employees. You can locate this report through our website at: https://www.ttuhsc.edu/emergency/clery-report.aspx.
Pay Basis
Monthly
Pay Grade Minimum
Salary commensurate with related education, experience and/or skills.
Pay Grade Maximum
Salary commensurate with related education, experience and/or skills.
Grant Funded?
No
Job Type
Full Time
Job Group
Enterprise IT
Shift
Day
Travel Required
Up to 25%
Does this position work in a research laboratory?
No
Air Force Specialty Code
1B4X1, 3D0X2, 3D0X3,
Army Military Occupational Specialty Code
17C, 25B, 25D, 35Q, 255A, 255S
Marine Military Occupational Specialty Code
0651, 0659, 0681, 0689, 0688
Navy Enlisted Classification Code
CTN, IT, 182X, 184X, 682X, 782X, 784X
Participates in the execution of vulnerability management systems at the network, system, application, and desktop levels.
Performs network/protocol scanning and reporting.
Responsible for the research, technical analysis, recommendation, configuration, and administration of systems and procedures to ensure the protection of information processed, stored or transmitted.
Develops and installs scripts for the customization or automation of security monitors and intrusion prevention systems.
Analyzes systems, processes, or events as a part of formalized Incident Management procedures, including digital forensic investigation and event log analysis
Conducts risk and/or vulnerability assessments for active or proposed enterprise hardware and/or software systems and components.
Conducts security research in keeping abreast of latest security issues
Administers security controls and access lists for network devices including firewalls, switches, routers, servers, and appliances.
Performs other duties in support of the Information Security Program.
Maintains an active awareness of the evolving security threat landscape.
Maintains an active awareness of federal, state, and local regulations and policies.
Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems
Uses a variety of desktop and/or web-based software and tools to create or modify documentation and to communicate with team members and supervisors.
Assist with the training and development of team members.
Lead and/or manage projects involving internal and/or external team members.
May interface with users, vendors, or other stakeholders.
May interface with key IT leadership and/or other functional leadership.
Adheres to all appropriate Institutional policies (including IT OPs) and other relevant internal departmental policies.
Exercise judgment based on an understanding of organizational policies and activities.
Plan and organize effectively, prioritize goals, use time efficiently, and communicate effectively, both orally and in writing.
Establish and maintain effective work relationships.
Experience in one or more security domains as defined by the ISC2 CISSP Common Body of Knowledge (CBK), which currently includes: Access formation Security and Risk Management.
Knowledge of security and risk frameworks, standards, and best practices (e.g., HITRUST CSF, NIST, ISO 27001, COBIT) preferred.
Business Continuity/Disaster Recovery Planning.
Security Architecture and Design.
Physical and Environmental Security.
Telecommunications and Network Security.
Legal Regulations, Compliance, and Investigations.
Required Qualifications
Bachelor's degree with coursework in computer science, MIS, IT, or other related area plus one (1) year related full-time paid experience OR a combination of related education and/or experience.
Required Attachments
Cover Letter, Recommendation/Referral, Resume / CV
Pay Statement
Compensation is commensurate upon the qualifications of the individual selected and budgetary guidelines of the hiring department, as well as, the institutional pay plan. For additional information, please reference the institutional pay plan on the Human Resources webpage.
EEO Statement
As an EEO/AA employer, the Texas Tech University System and its components will not discriminate in our employment practices based on an applicant’s race, ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, genetic information or status as a protected veteran.
Jeanne Clery Act
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. By October 1 of each year, institutions must publish and distribute their Annual Campus Security Policy & Crime Statistics Report (ASR) to current and prospective students and employees. You can locate this report through our website at: https://www.ttuhsc.edu/emergency/clery-report.aspx.
Pay Basis
Monthly
Pay Grade Minimum
Salary commensurate with related education, experience and/or skills.
Pay Grade Maximum
Salary commensurate with related education, experience and/or skills.
Grant Funded?
No
Job Type
Full Time
Job Group
Enterprise IT
Shift
Day
Travel Required
Up to 25%
Does this position work in a research laboratory?
No
Air Force Specialty Code
1B4X1, 3D0X2, 3D0X3,
Army Military Occupational Specialty Code
17C, 25B, 25D, 35Q, 255A, 255S
Marine Military Occupational Specialty Code
0651, 0659, 0681, 0689, 0688
Navy Enlisted Classification Code
CTN, IT, 182X, 184X, 682X, 782X, 784X
Medical Assistant - ENT
Midland Health -
Midland, TX
Security Officer
Securitas Security Services -
Lubbock, TX
Security Officer
Securitas Security Services -
Hobbs, NM