The Security Analyst III, under general direction, serves as technical lead for information technology (IT) security analysis projects or services. Provides technical oversight for the application of and compliance with technical standards. Completes reports and summaries for management and users including project status reports, problem reports, and progress summaries.
Develops and manages data, system, and network security architecture.
Coordinates enforcement and audits of security policies and procedures such as access, breach escalation, use of firewalls, and encryption routines.
Coordinates the administration and monitoring of data security profiles on all platforms and audits reviews of security violation reports and investigations of security exceptions. Coordinates investigations of possible security violations and ensures completion of investigation reports.
Coordinates the development of risk analysis scenarios and response procedures.
Coordinates and monitors the updates, maintenance, and documentation of security controls. Coordinates and monitors direct support to clients and internal IT groups for security related issues
Oversees and coordinates advice given to technical staff, policy administrators, and clients on the integrity of security procedures, systems, and policies in the design of systems and facilities
Oversees processes used to document and log information security incidents, responses, plans, methods, and procedures. Monitors and audits security documentation and logs.
Creates, evaluates, and approves plans for the implementation of new technology deployments and system integration testing.
Coordinates the evaluation of security products, services, and procedures to enhance productivity and effectiveness. Makes recommendations based on the evaluation of new technologies.
This document represents the major duties, responsibilities, and authorities of this job, and is not intended to be a complete list of all tasks and functions. Other duties may be assigned.
Education & Experience:
Bachelor's degree in applicable field and five years of related experience.
Knowledge, Skills and Abilities: (Required)
Knowledge of word processing and spreadsheet applications. Knowledge of IT architecture, project management, negotiation skills, basic vendor relations, advanced client relation skills, proposal writing, business acumen, persuasive communication, adaptability to change, team leadership skills, and quality assurance methodologies.
Experience with basic information security tools e.g. Wireshark, nmap
Intermediate understanding/experience with Microsoft environment: Windows, Active Directory, Office365, ATP
Understanding of at least one information security framework e.g. NIST, COBIT
Solid understanding of and experience with IP networking including switching, routing, wireless, DHCP, DNS, firewalls, IDS/IPS
Ability to multitask and work cooperatively with others.
Vulnerability scanning program e.g. Nessus
Centralized desktop security management program e.g. Kaspersky, Sophos, etc.
Email filtering programs e.g. Proofpoint, Microsoft SIEM, e.g. Splunk
Licensing/Professional Certification - CISSP, CISM or equivalent
Please make sure to provide the following documents:
2) Cover Letter to include two professional references
For detailed instructions on how to apply for any positions on our website, please use the following link:
Internal Number: R-035359
About Texas A&M University - San Antonio
Texas A&M-San Antonio provides affordable higher education opportunities to students from over 30 counties in the surrounding South Texas region, and has graduated over 5,000 students who are career-ready in a variety of in-demand fields such as education, business, information technology and cyber security, criminology and biology.