Information Security Analyst Senior jobs in United States
cer-icon
Apply on Employer Site
company-logo

State of Arizona ยท 1 day ago

Information Security Analyst Senior

The State of Arizona's Department of Emergency and Military Affairs provides emergency management and military capabilities to the citizens of Arizona and the nation. They are seeking an Information Security Analyst Senior responsible for safeguarding computer systems and networks by conducting risk assessments, identifying vulnerabilities, and developing security policies and procedures.

GovernmentOffice AdministrationPublic Relations
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Conducts audits of information systems compliance, to include network devices; servers; and end user devices, related to security standards, guides and application updates to enable and ensure accreditation of all systems IAW with all command, Army, and DOD security directives, policies and procedures
Conducts investigations of security incidents, reports findings to leadership and remediates findings based on guidance from the Cybersecurity service provider and IAW with all command, Army, and DOD security directives, policies and procedures to include computer viruses and sanitation of highly classified information from organization
Maintains an operational knowledge base of past, current and possible future threats to the security posture by attending courses, conferences, seminars, Online research, and information sharing between other Cybersecurity/Information Assurance professionals. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations
Troubleshoots problems and implements changes on multiple computer platforms. Diagnoses system failures to isolate source of problems between equipment, system software, and application programs. Provides solutions by modifying codes, devising fixes, documenting problems and advising responsible party. Interacts with peers and vendors to resolve hardware and software problems and reports unresolved problems

Qualification

IT security principlesNetwork operationsComputer forensicsOperating systemsIT security certificationCustomer serviceInterpersonal skillsWritten communicationOral communication

Required

Conducts audits of information systems compliance, to include network devices; servers; and end user devices, related to security standards, guides and application updates to enable and ensure accreditation of all systems IAW with all command, Army, and DOD security directives, policies and procedures
Conducts investigations of security incidents, reports findings to leadership and remediates findings based on guidance from the Cybersecurity service provider and IAW with all command, Army, and DOD security directives, policies and procedures to include computer viruses and sanitation of highly classified information from organization
Maintains an operational knowledge base of past, current and possible future threats to the security posture by attending courses, conferences, seminars, Online research, and information sharing between other Cybersecurity/Information Assurance professionals. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations
Troubleshoots problems and implements changes on multiple computer platforms. Diagnoses system failures to isolate source of problems between equipment, system software, and application programs. Provides solutions by modifying codes, devising fixes, documenting problems and advising responsible party. Interacts with peers and vendors to resolve hardware and software problems and reports unresolved problems
Knowledge of a variety of operating systems (ex. Windows OS.) on desktop and server
Knowledge of customer service and support principles and methods used to deliver a wide range of customer support services
Knowledge of system software, hardware and networking and how they all interconnect/work together
Knowledge of applying methods for evaluating, implementing, and disseminating IT security tools and procedures
Knowledge of IT security certification and accreditation requirements; network operations and protocols; and computer forensics principles
Skilled in troubleshooting problems and implementing changes on multifaceted and interdependent computer platforms
Skilled in applying IT security principles, methods, and tools
Skilled in implementing and supporting IT security applications
Skilled in applying methods for evaluating, implementing, and disseminating IT security tools and procedures
Skilled in prioritizing and planning work activities; ensuring proper protection of evidence is used in investigating computer crimes
Ability to utilize excellent interpersonal, written and oral communication skills
Ability to apply IT security certification and accreditation requirements
Ability to execute on network operations and protocols
Ability to prioritize workload based on Risk Management needs and impact to the organization
Ability to work within guidelines of established methods; obtain, clarify and provide information within established parameters and guidelines
This position requires possession of and ability to retain a current, valid Arizona state-issued driver's license appropriate to the assignment
Must be a U.S. citizen
Candidates for this position will be required to submit to a criminal background investigation as well as possess the ability to achieve a favorable Tier 3 investigation for the purpose of obtaining/maintaining a Secret clearance eligibility and Common Access Card (CAC) within one year of hire
This is an Information Assurance position. The candidate must meet the requirements for certification at Level II in the Information Assurance Technician within 6 months, or less, of appointment to this position. Certification requirements may be found in DODI 8140 and DOD 8570.01-M Information Assurance Workforce Improvement Program. This includes a Bachelor's degree of any kind and CompTIA Security+ certification or higher

Preferred

A Bachelor of Science degree in Information Technology, Cybersecurity, Information Systems, Data Science, Computer Science, or Software Engineering is preferred
Security+, Pentest+, SSCP, CEH, CCSP, GSEC certification are preferred

Benefits

Sick leave
Vacation with 10 paid holidays per year
Health and dental insurance
Retirement plan
Life insurance and long-term disability insurance
Optional employee benefits include short-term disability insurance, deferred compensation plans, and supplemental life insurance

Company

State of Arizona

twittertwittertwitter
company-logo
As public servants, we deeply care about Arizona and are committed to facing the issues of our state head-on.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Aletha Della Rocco
Human Resources Business Partner, Talent Acquisition
linkedin
leader-logo
George McNeely MBA
Chief Human Resources Officer - Arizona Department of Administration - Shared Services
linkedin
Company data provided by crunchbase