Knowledge, Skills, Abilities:
- The Enterprise Security Analyst's scope of responsibility includes information security management at the enterprise level. • With close supervision and/or assistance from team members, performs one or more of the following duties: • Participates in the execution of vulnerability management systems at the network, system, application, and desktop levels. • Performs network/protocol scanning and reporting. • Develops and installs scripts for the customization or automation of security monitors and intrusion prevention systems. • Analyzes systems, processes, or events as a part of formalized Incident Management procedures, including digital forensic investigation and event log analysis. • Administers Access Control Systems and Policies including Access Requests, Identity Management Physical Access, or Surveillance Systems. • Conducts risk and/or vulnerability assessments for active or proposed enterprise hardware and/or software systems and components. • Administers security controls and access lists for network devices including firewalls, switches, routers, servers, and appliances. • Performs other duties in support of the Information Security Program. • Maintains an active awareness of the evolving security threat landscape. • Maintains an active awareness of federal, state, and local regulations and policies. • May interface with users, vendors, or other stakeholders. • Uses a variety of desktop and/or web-based software and tools to create or modify documentation and to communicate with team members and supervisors. • May interface with key IT leadership and/or other functional leadership from the Texas Tech University System institutions. • Adheres to all appropriate Institutional policies (including IT OPs) and other relevant internal departmental policies.
• Ability to: • Exercise judgment based on an understanding of organizational policies and activities. • Plan and organize effectively, prioritize goals, use time efficiently, and stay on task. • Communicate effectively, both orally and in writing. • Establish and maintain effective work relationships. • Experience in one or more security domains as defined by the ISC2 CISSP Common Body of Knowledge (CBK), which currently includes: • Access Control • Information Security and Risk Management. • Application Security • Operations Security. • Business Continuity/Disaster Recovery Planning. • Security Architecture and Design. • Physical and Environmental Security. • Telecommunications and Network Security. • Cryptography. • Legal Regulations, Compliance, and Investigations. • Requires a very high level of proficiency in the theoretical and practical application of specialized knowledge in computer system analysis, programming, and software engineering, relating to IT Security. • Professional certifications are not required, but Microsoft, Cisco, or CISSP certifications may be preferred qualifications.
Bachelor's degree with coursework in computer science, MIS, IT, or other related area OR a combination of related education and/or experience. Applicants for this Security Sensitive Level II position will be subject to a criminal background check and must pass a drug and alcohol test after a conditional offer of employment has been extended, but before employment can be confirmed.
- Preferred Knowledge, Skills, and Abilities* - Professional certifications are not required, but Microsoft, Cisco, or CISSP certifications may be preferred qualifications.
Does this position work in a research laboratory?
Cover Letter, Professional/Personal References, Resume / CV
Compensation is commensurate upon the qualifications of the individual selected and budgetary guidelines of the hiring department, as well as, the institutional pay plan. For additional information, please reference the institutional pay plan on the Human Resources webpage.
Up to 25%
As an EEO/AA employer, the Texas Tech University System and its components will not discriminate in our employment practices based on an applicant’s race, ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, genetic information or status as a protected veteran.