+———————————–+———————————–+
| Job Title | Analyst, Information Security |
+———————————–+———————————–+
| FLSA Status | Exempt |
+———————————–+———————————–+
| Posted Salary Range | Commensurate with experience. |
+———————————–+———————————–+
| Employment Status | Full Time |
+———————————–+———————————–+
| Department | Center for Information Technology |
| | & Services |
+———————————–+———————————–+
| Job Summary | |
| | |
| | The incumbent is responsible for |
| | protecting the university’s |
| | computer systems and networks. |
| | He/she monitors security |
| | breaches, install security |
| | software, and develops security |
| | policies and procedures. |
| | |
| | |
+———————————–+———————————–+
| Knowledge Skills and Abilities | |
| | |
| | Knowledge of cloud security and |
| | mobile device management |
| | Knowledge of security best |
| | practices |
| | Knowledge of security frameworks |
| | and standards (e.g., |
| | |
| | ISO/ |
| | |
| | ICE 27001, |
| | |
| | NIST) |
| | Knowledge of security tools and |
| | technologies (e.g., firewalls, |
| | intrusion detection systems, |
| | encryption) |
| | Strong analytical and |
| | problem-solving skills |
| | Good teamwork skills |
| | Excellent communication skills, |
| | verbal, written, and |
| | interpersonal |
| | Ability to analyze information, |
| | summarize findings, and present |
| | in them in ways that are easily |
| | understood to decision makers |
| | Ability to think strategically, |
| remaining focused on goals and |
| | objectives |
| | Ability to handle multiple |
| | projects simultaneously and meet |
| | deadlines |
| | Ability to work well in a team |
| | environment and under pressure |
| | |
| | |
+———————————–+———————————–+
| Essential Job Functions | |
| | |
| | Monitors the university’s |
| | networks for security breaches |
| | and investigates incidents when |
| | they occur |
| | Installs and maintains security |
| | software, such as firewalls and |
| | data encryption programs |
| | Conducts penetration testing to |
| | identify vulnerabilities in the |
| | computer systems |
| | Develops and implements security |
| | policies and procedures |
| | Prepares reports on security |
| | breaches and the extent of the |
| | damage caused |
| | Stays up to date with the latest |
| | security trends and technologies |
| | Provides training to staff on |
| | security best practices |
| | Collaborates with other IT staff |
| | to ensure comprehensive security |
| | measures are in place |
| | Recommends security enhancements |
| | to management |
| | Occasionally works evenings and |
| | weekends |
| | On-call availability for |
| | emergency situations |
| | Other related duties, as assigned |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
+———————————–+———————————–+
| Qualifications | |
| | |
| | Bachelor’s degree in Computer |
| | Science, Information Technology, |
|