Job Number: 29458734 Full/Part Time: Full Time Schedule: 8AM - 5PM Salary: $78,700 - $145,100
Position Information The IT Security Analyst protects and defends UCR School of Medicine and UCR Health's information technology systems, networks, and data through cyber defense analysis, incident response, and vulnerability assessment and management. This involves analyzing security events and incidents, implementing security controls, configuring and managing security systems, conducting vulnerability scans and assessments, and performing various IT security-related tasks. Identifies anomalous network activity and potential threats to network resources, tracks and documents security incidents from initial detection through final resolution, writes and publishes cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. Works with stakeholders to resolve computer security incidents and vulnerability compliance, performs risk and vulnerability assessments of relevant technology focus areas, and makes cybersecurity recommendations to leadership based on relevant threats and vulnerabilities. Must be proactive in identifying potential security threats and vulnerabilities to maintain the security and integrity of institutional information and infrastructure.
The nature of this allows for a hybrid work schedule where the incumbent can work two days onsite in the office and remotely for the other three days of the work week, subject to periodic review and change.
Please note: The interview process will require the candidate to prepare and present a work sample. The interview timeslot will allow for approximately 15 minutes for the candidate to present on a topic or project worked on the past that would be related to this position.
**As a condition of employment, you will be required to comply with the University of California SARS-CoV-2 (COVID-19) Vaccination Program Policy. All Covered Individuals under the policy must provide proof of Full Vaccination or submit a request for Exception (based on Medical Exemption, Disability, and/or Religious Objection) or Deferral (based on pregnancy) no later than the applicable deadline. For new University of California employees, the applicable deadline is ten weeks after their first date of employment. **
Education Education Requirements
Degree Requirement Bachelor's degree in related area and/or equivalent experience/training. Required
Licenses
License Requirement Must possess or obtain a Valid CA Drivers License in acccordance with the California Department of Motor Vehicles, if driving a university/personal vehicle for university related business Preferred
Certifications
Certification Requirement Information Security certification such as CEH, CASP+, CISSP, etc. Preferred
Conditions
Condition Requirement If not already held, will obtain Security+ or above certification within 3 months of appointment date Required
Experience
Experience Requirement 4 - 7 years of related experience. Required Experience completing vulnerability scanning and risk assessments Preferred Experiencing performing log review and analysis Required Experience conducting security event triage, incident response, and/or digital forensics Required Experience conducting security risk assessment Preferred Experience managing security tools Preferred Related experience in healthcare industry Preferred
Minimum Requirements Special Condition Requirement Must pass a background check. Required Occasional travel for university related business meetings, conferences and/or professional development. Required Ability to work periodically outside of Normal Business Hours as assigned. Required Must be able to participate as part of the on-call rotation schedule for after hours support. Required Travel Outside of Normal Business Hours Required
Preferred Qualifications Ability to follow department processes and procedures. Experience in incident response and digital forensics including data collection, examination and analysis. Demonstrated skills applying security controls to computer software and hardware. Knowledge of computer hardware, software and network security issues and approaches. Experience using IT security systems and tools. Knowledge of data encryption techniques. Experience analyzing logs for security breaches. Basic skill at reading and interpreting security logs. Knowledge of other areas of IT, department processes and procedures. Interpersonal skills sufficient to work effectively with both technical and non-technical personnel at various levels in the organization. Ability to maintain confidentiality.
Additional Information Demonstrated skill at administering complex security controls and configurations to computer hardware, software and networks.
Knowledge and experience in implementation of IT Security frameworks, such as CIS Critical Security Controls, NIST 800-66 rev 2, and/or NIST Cybersecurity Framework.
Demonstrated experience selecting and applying appropriate data encryption technologies.
Skill in reviewing logs to identify evidence of past intrusions.
Skill in using security event correlation tools.
Knowledge of adversarial tactics, techniques, and procedures, different classes of attacks and cyber attack stages, such as protecting a network against malware.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy and various data privacy and security standards, including of Personal Health Information (PHI)
Knowledge of authentication, authorization, and access control methods including host/network access control mechanisms, network access, identity, and access management, and policy-based and risk adaptive access controls.
Ability to share meaningful insights about the context of an organization?s threat environment that improve its risk management posture.
Knowledge of computer networking concepts and protocols, and network security methodologies and ability to interpret the information collected by network tools and detect host and network-based intrusions using intrusion detection technologies