Cyber Security Analyst

Responsibilities:

Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information. Provides a full range of analytic duties using knowledge of multidisciplinary security concepts, principles and practices applicable to security administration. Develops, recommends and enhances preventive and detective controls. Monitors and verifies that ERCOT’s internal and external computer security systems are protected from the latest threats and risks.

Implements, monitors and maintains preventive and detective controls. This may include any combination of the following: Designs architectures and controls for cyber security. Monitors, evaluates and executes security procedures. Monitors computing resources for evidence of compromise and reporting security incidents. Responds to, and reports on, IT security incidents, providing initial assessment of impact severity and types of incidents being addressed. Analyzes compromised computing resources of routine to moderate complexity. Supports the development, documentation, deployment, review and maintenance of information security policies. Communicates information security requirements and principles. Ensures compliance with security related regulatory and corporate requirements.

This position may be filled at any of the levels indicated below.

Essential Job Duties

Level 2

  • Monitors computing resources for evidence of compromise and report security incidents.
  • Responds to, and reports on IT security incidents, providing initial assessment of impact severity and types of incidents being addressed
  • Analyzes compromised computing resources of routine to moderate complexity, to assist in improving security design and policy compliance, and to understand and document new threat profiles
  • Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems
  • Researches, analyzes, designs, tests and implements new or vendor supplied security software solutions
  • Provides up to date documentation and procedures on security software product administration
  • Assists in the development of technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
  • Works as a member of the Incident Response Team and perform analysis of security breaches
  • Studies and grows current knowledge of security issues

Level 3

  • All of the above tasks, plus
  • Designs cyber security monitoring program, including technologies and processes
  • Investigates and analyzes computing resources for evidence of compromise and reports security incidents
  • Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls
  • Functions as a member in the security group’s Incident Response Team
  • Analyzes complex compromised computing resources to improve security design and policy compliance, and to anticipate and prevent new threat profiles
  • Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems
  • Researches, evaluates, tests and implements new or vendor supplied security software solutions
  • Provides up to date documentation and procedures on security software product administration
  • Develops and defends new technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
  • Performs periodic and complex operating system and application security assessments to determine the likelihood of vulnerability or compromise, and prepares possible resolutions for implementation
  • Analyzes security breaches
  • Expands expert knowledge of security issues
  • Reports issues to the department personnel responsible for the resource
  • Serves as a mentor for junior security teammates

Level 4

All of the above, and

  • Functions as a senior member in the security group’s Incident Response Team
  • Functions as a subject matter expert in regards to assigned areas
  • Serves as a mentor for the security team

Position level is open depending on the candidate’s previous experience that is identified.

Qualifications:

Education 

  • Bachelor’s degree in Cyber Security, Computer Science, MIS, or a combination of education and experience that provides the applicant with knowledge equivalent to a major in of such fields is required for all levels

Work Experience 

  • Level 2: Minimum 2 years (in excess of degree requirements stated above) of progressively responsible experience in IT security
  • Level 3: Minimum 5 years (in excess of degree requirements stated above) of progressively responsible experience in IT security
  • Level 4: Minimum 8 years (in excess of degree requirements stated above) of progressively responsible experience in IT security

Certifications & Licenses

  • CISSP and/or other security certifications preferred for all levels

Source:http://jobs.energycentral.com/job/cyber-security-analyst-taylor-texas-177062?utm_source=Indeed&utm_medium=organic&utm_campaign=Indeed

. . . . . . . .

Print Friendly, PDF & Email

Leave a Reply