Description and Functions
Open Until Filled
GENERAL DESCRIPTION:
The Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security anomalies, Indicators of Compromise (IOC), and Indicator of Attack (IOA) detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.
Human Resource Contact: Jennifer Erickson / jennifer.erickson1@wyo.govESSENTIAL FUNCTIONS: - Monitor all in-place security solutions for efficient and appropriate operations in addition to mitigating security anomalies, Indicators of Compromise (IOC), and Indicators of Attack (IOA).
- Review logs and reports of all in-place devices, whether they are under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.
- Provide support to CSOC Analyst I&II by performing advanced triage of new and/or novel attacks.
- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices.
- Perform deployment, integration, and initial configuration of all new security solutions and any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
- Participate in the planning and design of enterprise security architecture, under the direction of the team supervisor or CISO, where appropriate.
- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the team supervisor or CISO, where appropriate.
Qualifications
PREFERENCES:
Preference may be given to those with experience end point security management solutions.
Preference may be given to those with experience in security information and event management (SIEM)
Preference may be given to those with an understanding of IP, TCP/IP, and other network administration protocols
Preferences may be given to those with an understanding of Cybersecurity best practices.
KNOWLEDGE:
- Key knowledge areas include an understanding of network architectures, cloud computing platforms, cybersecurity principles, and familiarity with legal and regulatory compliance requirements related to information security.
- Essential skills involve mid-level knowledge in configuring and managing next-generation firewalls, intrusion detection blades, and VPN encryption technologies, threat analysis, vulnerability assessment, and incident response.
- The ability to troubleshoot network security issues and implement security best practices across diverse computing environments.
- Functional competencies include analytical thinking, effective communication to articulate security risks and recommendations, and the capability to stay current with evolving cyber threats and technology trends.
- Moreover, a proactive approach to cybersecurity, the ability to work collaboratively within and across teams, and a commitment to continuous learning and professional development are indispensable for navigating the dynamic landscape of network security successfully.
MINIMUM QUALIFICATIONS:
Education:
Bachelor's Degree (typically in Computer Technology)
Experience:
0-3 years of progressive work experience in Systems and Infrastructure with acquired knowledge at the level of a Systems Technologist II
OR
Education & Experience Substitution:
4-6 years of progressive work experience in Systems and Infrastructure with acquired knowledge at the level of a Systems Technologist II
Certificates, Licenses, Registrations:
None
Necessary Special Requirements
PHYSICAL WORKING CONDITIONS:
- Occasional travel is required around the State of Wyoming throughout the year, which may include overnight stays and weekends.
- Ability to lift 50 pounds.
- Some projects may include work with the State of Wyoming Correctional facilities.
NOTES: - FLSA: Non-Exempt
- Successful candidates must pass a background check.
Supplemental Information
077-Enterprise Technology Services - Information Security Services
Click
here to view the State of Wyoming Classification and Pay Structure.
Class Specifications are subject to change, please refer to the A & I HRD Website to ensure that you have the most recent version.