drjobs Security Analyst IT SYSTEMS TECHNICAL SPECIALIST

Security Analyst IT SYSTEMS TECHNICAL SPECIALIST

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Anne Arundel County, MD - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Introduction

OPEN TO ALL QUALIFIED APPLICANTS

This is a position specific recruitment. The resulting certified eligible list may be used to staff several current and future vacancies for this position/function only.


GRADE

21

LOCATION OF POSITION

Annapolis Maryland

POSITION DUTIES

The Comptroller of Maryland seeks to hire a talented Cybersecurity Analyst Tier 2 for monitoring troubleshooting and protecting the security of the COM enterprise environment. The Cybersecurity Analyst performs information security and cybersecurity analysis work involving planning implementing and monitoring security measures for the protection of information systems and infrastructure. Work also includes protecting cybersecurity assets and delivering cybersecurity incident detection incident response threat assessment cyber intelligence software security and vulnerability assessment services. The Cybersecurity Analyst Tier 2 will report to the Chief Information Security Officer.

Responsibilities:
  • Performs technical risk assessments and reviews of account permissions computer data access needs security violations programming changes and new and existing applications and systems including data center physical security and environment.
  • Performs cybersecurity incident detection analysis and prevention.
  • Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
  • Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
  • Monitors systems and procedures to protect data systems and databases from unauthorized access.
  • Monitors and analyzes cybersecurity alerts from cybersecurity tools network devices and information systems. Supports the implementation of computer system security plans with agency personnel and outside vendors.
  • Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification destruction or disclosure and to meet emergency data processing needs.
  • Takes part in any securityoriented projects or critical initiatives.
  • Stay uptodate on information technology & security news trends and standards.
  • Deliver an exceptional customer experience every day.
  • Other duties as identified or assigned.

PLEASE NOTE:Resumes will not be accepted in lieu of a completed application. AlsoITD is responsible for the 24x7x365 support for ADC mainframe distributed systems and networks. All ITD employees are available for oncall support.

MINIMUM QUALIFICATIONS

Experience:Seven years of experience designing developing testing implementing and maintaining application communication database or operating systems software.

NOTES:

  1. Candidates may substitute graduation from an accredited high school or possession of a high school equivalency certificate and thirty credit hours from an accredited college or university in Computer Science Computer Technology Management Information Systems or other information technologyrelated field to include coursework in application communication database or operating systems software technology for four years of the required experience.
  2. Candidates may substitute graduation from an accredited high school or possession of a high school equivalency certificate and one year of experience designing developing testing implementing and maintaining application communication database or operating systems software for four years of the required experience.
  3. Candidates may substitute the possession of a Bachelors degree from an accredited college or university in Computer Science Computer Information Technology Management Information Systems or other information technologyrelated field to include coursework in application communication database or operating systems software technology and three years of experience designing developing testing implementing and maintaining application communication database or operating systems software for the required experience.
  4. Candidates may substitute U.S. Armed Forces military service experience as a commissioned officer in theComputer Systems Operations classifications or Computer Systems Operations specialty codes in the Information Technology field of work on a yearforyear basis for the required experience.
** For education obtained outside of the U.S. you will be required to provide proof of the equivalent American education as determined by a foreign credential evaluation service. If you possess a degree obtained outside of the United States please submit a detailed coursebycourse evaluation report from one of the U.S. equivalency evaluating members identified at OR PREFERRED QUALIFICATIONS
  • 3 years of experience in networking or system administration/engineering
  • 1 year Azure Security experience
  • 1 Year Azure Infrastructure experience
  • Bachelors degree in computer science or related field or equivalent experience.
  • Additional certifications in security related disciplines (eg: Security CEH CISSP etc. are preferred.
  • 1 year of experience with Firewalls.
  • 1 year of experience with GRC and familiarity with various cybersecurity frameworks such as ISO 27001 and NIST standards.
  • Willingness to learn new technologies and keep up with industry trends.
  • Ability to learn and communicate technical information to nontechnical people.
  • Must have excellent written & oral communication skills and strong interpersonal skills.
  • Strong technical skills including experience with identity and access management solutions.
  • Familiarity with cyber security best practices and compliance standards.
  • Enterprise IT operational experience Strong understanding of operating systems infrastructures protocols and applications.
  • Previous experience working as a cybersecurity analyst would be a great plus
  • Working knowledge of cyber threat actor tactics techniques and procedures (TTPs) including the ability to troubleshoot cybersecurity issues configurations and incidents across a wide range of devices and infrastructure environments

SELECTION PROCESS

Please ensure you provide sufficient information on your application to demonstrate that you meet the qualifications for this recruitment. Please indicate clearly any positionspecific experience and ensure all education and experience sections are complete. Approval of your application will be based on a review of the information you submit. All qualified applicants are placed on an unranked list of candidates and will remain active on this list for at least one year. Incomplete information may result in the disqualification of your application.

All information concerning your qualifications must be submitted by the closing date. We will not consider information submitted after this date.

Upon appointment (new hires and/or transfers) must successfully undergo fingerprinting. Disqualifying charges may include any felony; any crime of moral turpitude e.g. embezzlement fraud tax evasion or bribery; any crime of identity theft or impersonation; any crime of or battery; and any crime relating to the use or distribution of a controlled dangerous substance other than regardless of the age of the offense or the specifications of the position.

*Resumes will not be accepted in lieu of a completed application.

BENEFITS

FURTHER INSTRUCTIONS







Required Experience:

IC

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.