Performs and assists with routine information security tasks and functions. Performs basic security administrative tasks across Information Technology functional areas. Carries out and assists with carrying out security policies, standards and procedures. Gathers information for security risk analysis and incident management efforts. Assists in security risk assessment and management. Supports malicious and unwanted software tracking, monitoring and removal efforts. Monitors security profiles, reviews security violation reports, investigates possible security exceptions, and updates, and maintains and documents security controls. Provides routine technical support for evaluation of products and/or procedures to enhance productivity and effectiveness. Investigates elevated security issues regarding Information and Telecommunication Systems (ITS) Department built/managed workstation systems.
Distinguishing Characteristics:
This is the first in a series of three information security-related job classifications within the Information Technology job family. Conducts routine information security tasks and functions. The Security Analyst I assists in security risk assessment and management and supports malicious and unwanted software tracking, monitoring and removal efforts. This classification may require a flexible work schedule in order to meet the needs of the department.
Education and Experience:
Bachelor's degree in Computer Science, Information Systems, Business Administration or a directly related field AND one (1) year of relevant work experience, including six (6) months experience in security administration;
OR,
Any combination of education and experience that has been achieved and is equivalent to the stated education and experience and required knowledge, skills, and abilities sufficient to successfully perform the duties and responsibilities of this job.
Licenses, Registrations, Certifications, or Special Requirements:
Valid Texas Driver's License.
CompTIA Security+ Certification, Certified Information Systems Security Professional (CISSP) or equivalent industry-recognized certification required
Knowledge, Skills, and Abilities:
Knowledge of:
Work primarily performed in office setting, either on-site or in a secure hybrid/telework environment. May involve occasional visits to data centers, agency offices, or vendor locations for security inspections, audits, or meetings. Must adhere to strict security protocols and procedures, including physical access controls, background checks, and secure area clearances. May occasionally work outside normal business hours to respond to security incidents or meet project deadlines.
Physical requirements include extended periods of sitting, using a computer and other standard office equipment. Subject to visual acuity, speech and hearing, hand and eye coordination and manual dexterity necessary to operate a computer and office equipment. Occasional lifting or carrying of equipment or materials (typically less than 25 pounds) may be required. Must be able to remain focused and alert while working on detailed technical tasks, especially during incident response or time-sensitive audits.