Job ID: TX-23R0001202 (95291109)5p
Hybrid/Local Cybersecurity Analyst with DR/BC, forensic, network traffic/flow analysis, threat mitigation, automation, breach detection/prevention, encryption experience
Location: Austin, TX DPS
Duration: 12 Months
Some remote work is allowed upon review of workload and job duties. Texas residency is required.
YearsRequired/PreferredExperience
2RequiredExperience in systems analysis and design work.
2RequiredAbility to analyze systems and procedures, to write and revise standards and procedures, and to communicate effectively
1RequiredSkill in solving problems; scheduling, testing, installing, and implementing programs; and troubleshooting computer systems
1RequiredKnowledge of the limitations and capabilities of computer systems, the techniques used in the design of non-automated systems, info technology equip, applicable programming languages, computer hardware and software, computer operating systems
1Requiredwriting program code, and automated mapping.
1RequiredExperience preparing charts, diagrams, tables, and flowcharts to assist in problem analysis and submitting recommendations for solution.
2PreferredExperience working in an IT technical operations or development environment with the creation and management of highly detailed actions, tasks, and schedules.
1PreferredExperience supporting, planning and implementing contingency plans, recovery guides or disaster recovery documentation for information technology systems.
The Department of Information Resources (DIR) requires the services of a Systems Analyst hereafter referred to as Worker, who meets the general qualification of systems analyst and the specifications outlined in this document for Texas Department of Public Safety.
1. Perform cybersecurity incident detection, analysis, and prevention; forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
2. Monitor and analyze cybersecurity alerts from cybersecurity tools, network devices, and information systems; and monitors network traffic and flow for analysis.
3. Monitor and maintain cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.
4. Monitor and maintain systems and procedures to protect data systems and databases from unauthorized use or access.
5. Research and analyze cybersecurity threat indicators and their behaviors, and recommend threat mitigation strategies.
6. Monitor and analyze cybersecurity alerts from cybersecurity tools, network devices, and information systems.
7. Evaluate network and system security configuration for best practices.
8. Assist in recommending plans to safeguard computer configurations and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
9. Assist in planning and deploying manual and/or automated security capabilities.
10. Assist in developing information technology disaster recovery and business continuity planning.
11. Research, evaluate, and recommend systems and procedures for the prevention, detection, containment, and correction of data security breaches.
12. Assist the agency in encrypting data transmissions and erecting firewalls to conceal confidential information as it is being transmitted and to eliminate tainted digital transfers.
13. Advise management and users regarding security procedures.
14. Performs other duties as assigned.
