Please paste the following URL into a browser to view the entire job posting in the CAPPS Career Section: https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00049878
You may apply to the job directly through the CAPPS Career Section. It is not necessary to apply both through Work In Texas and CAPPS Career Section
Applications must be filed at:https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00049878
Please note that this job posting can be closed without noticeand earlier than the closing date indicated in the postingif a suitable candidate is found. We encourage applicants to submit and complete the application promptly.
Are you ready to grow, make a positive impact?If you are seeking to gain knowledge, build your career, and network among goal-oriented professionals, this is the place for you!
Innovation, collaboration, and a commitment to excellence best describes the culture here at the Comptrollers Office. We take pride in the work we do serving as Texas' accountant, tax collector, treasurer, and much more! The Comptrollers office serves virtually every citizen in the state. As Texas chief tax collector, accountant, revenue estimator, treasurer and purchasing manager, the agency is responsible for writing the checks and keeping the books for the multi-billion-dollar business of state government.
Our agency workforce is as diverse as the people of Texas we serve. We value our employees and take very seriously our collective commitment to public service.Personal development opportunities are strongly encouraged through available workshops, teambuilding exercises, and on the job training. We offer flexible scheduling that helps employees maintain a healthy work-life balance.
Clickhereto see an inside look at the Texas Comptrollers office!
ABOUT THE Division
General description
The IT division is looking for a security professional to join our Incident Response team. This person will be joining a fast-paced, security focused team dedicated to solving technical issues on a day-to-day basis. The work will involve handling all aspects of monitoring, incident detection, and front-line response to alerts. Daily tasks include maintaining or enhancing our DLP, EDR, and SIEM products, as well as supporting other relevant areas and projects. Our partially remote work environment offers valuable experience and opportunities. Apply to join our team if you are honest, self-motivated, detail-oriented, and customer friendly.
Work Hours
The position works an eight-hour schedule between 7:00 am and 6:00 pm, 40-hour week, Monday Friday with occasional work schedule variance as necessary. Hours may change based on business need. Performs On-Call duty on a rotational basis and occasionally work overtime and/or additional hours based on business peaks. Employee must be capable of being online/onsite within one (1) hour of being called.
Teleworking may be considered if certain working conditions are met. The candidate must have permanent residency within the state of Texas and must be able to meet in office requirements, which can vary among different sections (i.e. report to office 1-3 days/week, etc.). Travel reimbursements are not provided for teleworking.
Qualifications: Minimum Qualifications
Bachelor's degree. Four (4) years of experience in cybersecurity analysis, information security analysis, or digital forensics.
Preferred Qualifications
Bachelors degree in information technology security, computer information systems, computer science, management information systems, or a related field. Experience in supporting endpoint security, SIEM, vulnerability scanning or DLP tools. Experience in analyzing security events or network infrastructures.
Substitution
One (1) additional year of experience in information security analysis work may substitute for thirty (30) semester hours of educational requirement with a maximum substitution of 120 semester hours (four years). Cybersecurity certifications such as,Security +, CISSP, or any related cybersecurity certificates may substitute for one (1) year of the minimum experience requirement.
Licenses/Certifications
One of the following certifications is preferred: Security+, CCNA, CCNA-S, CCNP-S, CCSP, CISSP, GCIA, GCFW, SANS certificates or any related cybersecurity certificates.
SUMMARY OF PHYSICAL REQUIREMENTS
The physical demands described here are represented of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
This position requires the incumbent to primarily perform sedentary office work; however, mobility (standing and walking) is routinely required to carry out some duties. It requires extensive computer, telephone, and client/customer contact.
The job also requires normal cognitive abilities requiring the ability to learn, recall, and apply certain practices and policies. It requires the stamina to maintain attention to detail despite interruptions. Marginal or corrected visual and auditory requirements are required for reading printed materials and computer screens and communicating with internal and external customers. Must be able to lift at least 25 pounds. Will need to sit for extended periods of time while working on a computer.
Employees are required to use their personal mobile phones as a part of 2 factor/multi factor authentication for accessing CPA systems securely. You will also receive critical/emergency calls/texts on your cell phone to ensure immediate communication.
In this role you will:
Implement and maintain enterprise security systems including Anti-Virus, DLP, SIEM systems, vulnerability scanners and security information management tools. Monitors and analyze cybersecurity alerts from cybersecurity tools, network devices, and information systems. Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use. Support and lead incident response activities including coordination of immediate corrective action to systems known to have any security weaknesses or vulnerabilities, including network isolation, re-configuration and installing appropriate patches or upgrades. Performs cybersecurity incident detection, analysis, and prevention. Implementation of continuous automated security compliance capabilities. Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools. Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies. Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status. Design, automate, manage, and deploy security applications and infrastructure program activities. Develop plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency. Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses. Implement and maintain security controls for infrastructure systems including servers, workstations, web and other applications. Provide ongoing monitoring of sources of information on potential threats and vulnera