Information Security Analyst (Req#: 14063)
|April 16, 2012 - August 02, 2012|
|Salary Range:||47,784 - 60,000|
|Employment Type:||Full Time|
|Description:||Under general supervision, supports and implements security procedures and controls necessary to ensure the integrity, confidentiality, and availability of UTHSCT mission critical information resources. Provides support for the institutional information security program. Assists to identify, investigate and report fraudulent use, misuse, and/or abuse of information systems and applications.|
|Duties:||•Assists Information Security Officer (ISO) in support of information security requirements.|
•Supports the implementation of approved projects.
•Provide technical support for data confidentiality protection, system integrity, system reliability, audit and system recovery methods and procedures.
•Assists in investigation of unauthorized access, modification, disclosure, or destruction.
•Provides technical support for selection, configuration, and maintenance of security software, utilities, and hardware; as well as the remediation of known vulnerabilities.
•Provide technical support to maintain existing security architect and design.
•Assists in developing technical security standards to support policies and practice standards. Supports monitoring standards and incident investigation procedures.
•Identifies and resolves security vulnerabilities, operational issues, audit concerns with existing applications, hardware implementations, and legacy systems. Provides documentation as appropriate.
•Supports the development and implementation of security awareness training programs.
•Participates in handling of investigations relating to theft of information resources, abuse of computer systems and violation of the UTHSCT Information Security policy and/or any other privacy policies.
•Monitors computer resources for evidence of compromise, and responds to and reports security incident.
•Supports and analyzes controls necessary to ensure and protect the security of all information system assets.
•Participates as a team member.
•Adheres to internal controls and reporting structure.
•Performs related duties as required.
Required: Bachelor’s degree. Related experience can substitute for education.
Preferred: Bachelor’s degree from accredited institution in computer science, information technology, or information systems.
Required: Two years of network, system administration, systems security and controls, or other related experience.
Preferred: Certification in network technology or information security (CCISP, CISM, CISSP, CSP, etc.).
This job is no longer active. Please click here to see current job listings.