The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately halfway between the minimum and the maximum and represents an employee that possesses full job knowledge qualifications and experience for the the normal course employees will be hired transferred or promoted between the minimum and midpoint of the salary range for a job.
Note: Applications will be accepted until 11:59 PM on the Posting End Date.
Job End Date
OngoingThis position is subject to the satisfactory completion of relevant background checks.
This position follows a hybrid work model combining remote work with in-office days at the UBC Campus
At UBC we believe that attracting and sustaining a diverse workforce is key to the successful pursuit of excellence in research innovation and learning for all faculty staff and students. Our commitment to employment equity helps achieve inclusion and fairness brings rich diversity to UBC as a workplace and creates the necessary conditions for a rewarding career.
Job Summary
The Cybersecurity Network Analyst II is responsible fordesigning implementing configuring automating and maintaining network security solutions based on business security and privacy needs. This position monitors and responds to threats and vulnerabilities by implementing protective measures using existing network security solutions and working on new network protection solutions.
A fixed schedule is set for this role but flexibility is required as some work must be performed outside of regular business operating hours. This position may be required to act in an on-call capacity in the event of a cybersecurity incident or major service disruption.
Organizational Status
Works independently and jointly within the Cybersecurity Operations and Identity Management team. Collaborates with management and staff from all sections of the Chief Information Security Officer portfolio Information Technology other administrative and academic offices and faculty to coordinate application support. Interacts directly with other University technology professionals.
Work Performed
The Cybersecurity Network Analyst II is responsible fordesigning implementing configuring automating and maintaining network security solutions based on business security and privacy needs. This position monitors and responds to threats and vulnerabilities by implementing protective measures using existing network security solutions and working on new network protection solutions.
A fixed schedule is set for this role but flexibility is required as some work must be performed outside of regular business operating hours. This position may be required to act in an on-call capacity in the event of a cybersecurity incident or major service disruption.
Organizational Status
Works independently and jointly within the Cybersecurity Operations and Identity Management team. Collaborates with management and staff from all sections of the Chief Information Security Officer portfolio Information Technology other administrative and academic offices and faculty to coordinate application support. Interacts directly with other University technology professionals.
Work Performed
Consequence of Error/Judgement
Effective network security is essential for UBC to deliver secure services to the broad UBC community. Decisions and actions taken by the incumbent will have a direct impact on how quickly the Cybersecurity team can respond to a rapidly changing network threat landscape how secure UBC systems are from attackers how available they are to the community and a secondary impact on how UBC systems perform and function. Errors in judgment poor analysis or failure to act decisively could have a detrimental effect on the security and availability of these systems. Insecure systems could lead to system downtime or a data addition to damaging the reputation of Information Technology and UBC a breach could also adversely impact the University community including the large majority of students faculty and staff and could have a significant impact on funding and revenue.
Supervision Received
Works under the general direction of the Manager Security Operations and may receive direction from senior technical staff as assigned. The Cybersecurity Analyst II must be able to work independently as well as contribute actively and collaborate openly as a team member. Must demonstrate the ability to work effectively under pressure with minimum supervision.
Supervision Given
No direct supervision is required but is expected to assist team members as required. Also to work on a project basis with Cybersecurity and other IT professionals.
Minimum Qualifications
Undergraduate degree in a relevant -depth knowledge of applications and the business requirements supporting them. Minimum of five years of related experience or the equivalent combination of education and experience.
- Willingness to respect diverse perspectives including perspectives in conflict with ones own
- Demonstrates a commitment to enhancing ones own awareness knowledge and skills related to equity diversity and inclusion
Preferred Qualifications
Collaboration - Actively solicits ideas and opinions from others to efficiently and effectively accomplish specific objectives targeted at defined business outcomes. Openly encourages other team members to voice their ideas and concerns. Shows respect for differences and diversity and disagrees without personalizing issues. Utilizes the strength of team members to achieve optimal performance.
Communication for Results -Conducts discussions with and writes memoranda to all levels of colleagues and peer groups in ways that support troubleshooting and problem-solving. Seeks and shares relevant information opinions and judgments. Handles conflict empathetically. Explains the context of interrelated situations asks probing questions and solicits multiple sources of advice prior to taking action when appropriate
Problem-Solving -Applies problem-solving methodologies and tools to diagnose and solve operational and interpersonal problems. Determines the potential causes of the problem and devises testing methodologies for validation. Shows empathy and objectivity toward individuals involved in the issue. Analyzes multiple alternatives risks and benefits for a range of potential solutions. Recommends resource requirements and collaborates with impacted stakeholders.
Analytical Thinking - Coordinates the information gathering and reporting process. Reviews trends and compares them to expectations. Conducts research to define problems and prepares responses to anticipated questions. Prioritizes multiple issues and opportunities. Identifies relationships and linkages within several information sources. Anticipates issues that are not readily apparent on the surface. Identifies root causes and effects. Defines priorities within performance objectives. Reports and identifies areas that need guidance in order to resolve complex issues. Anticipates the possible outcome of potential solutions.
Information Systems Knowledge - Resolves escalated problems of technical support. Identifies root causes. Sets up and integrates new and enhanced information systems. Identifies customer needs and determines the appropriate approach to apply and ensures resolution. Solicits the input of appropriate technical experts and managers as required.
Thoroughness - Demonstrates operational agility. Uses organizational systems that result in multiple critical activities to be identified and completed on time. Renegotiates priorities as necessary. Puts systems in place and uses them to monitor and detect errors and problems. Tests and inspects outputs and applies quality checks prior to work submission.
Required Experience:
IC