T

Security Analyst I P68

Texas A&M University System Offices
Full-time
On-site
Bryan, Texas, United States
$3,896.88 - $5,416.66 USD monthly

Job Title

Security Analyst I P68

Agency

Texas A&M University System Offices

Department

Cyber Operations

Proposed Minimum Salary

Commensurate

Job Location

Bryan, Texas

Job Type

Staff

Job Description

The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 11 universities, a comprehensive health science center, eight state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond.

The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan with 8.25% employer contribution through Teachers Retirement System of Texas (TRS); tuition assistance; and wellness programs to promote work/life balance.

Salary:

$3,896.88 - $5,416.66 per month commensurate with experience.

Job Description Summary:

The Security Analyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The security analyst's primary focus will be investigating and responding to cyber threats. 


Responsibilities:
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
- Document and escalate incidents that may cause ongoing and immediate impact to the environment.
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
- Other duties as assigned.


Education and Experience:
- Bachelor’s degree in applicable field or equivalent combination of education and experience.
- Two year of information technology, information security or cybersecurity work experience. 


Knowledge, Skills and Abilities:
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of adversarial tactics, techniques, and procedures.
- Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Skilled in researching vulnerabilities and exploits utilized in traffic.
- Skilled in using protocol analyzers.
- Skilled in performing packet-level analysis.
- Skilled in technical writing.
- Skilled in preserving evidence integrity according to standard operating procedures or national standards.
- Ability to interpret the information collected by network and host detection tools.
- Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.

- Ability to multi-task and work cooperatively with others.

- On-call rotation with less than 10% travel.

Other Requirements:

This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being rejected without an option to reapply. A cover letter and resume may be required in addition to a completed employment application.

All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution’s verification of credentials and/or other information required by the institution’s procedures, including the completion of the criminal history check.

Equal Opportunity/Affirmative Action/Veterans/Disability Employer.