Systems Technologist II (Ctst08) 2024-01098

State Of Wyoming Cheyenne , WY 82003

Posted 2 weeks ago

Description and Functions

Open Until Filled

GENERAL DESCRIPTION:

The Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security anomalies, Indicators of Compromise (IOC), and Indicators of Attack (IOA) detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The Security Analyst is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

Human Resource Contact: Jennifer Erickson 307-275-5114,Jennifer.Erickson1@wyo.gov

ESSENTIAL FUNCTIONS: The listed functions are illustrative only and are not intended to describe every function which may be performed at the job level.

  • Monitor all in-place security solutions for efficient and appropriate operations in addition to mitigating security anomalies, Indicators of Compromise (IOC), and Indicators of Attack (IOA).
  • Review logs and reports of all in-place devices, whether they are under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.
  • Perform deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.
  • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices.
  • Participate in the planning and design of enterprise security architecture, under the direction of the team supervisor or CISO, where appropriate.
  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the team supervisor or CISO, where appropriate.

Qualifications

PREFERENCES:

Preference may be given to those with experience end point security management solutions.

Preference may be given to those with experience in security information and event management (SIEM)

Preference may be given to those with an understanding of IP, TCP/IP, and other network administration protocols

Preferences may be given to those with an understanding of Cybersecurity best practices.

KNOWLEDGE:

  • Proven analytical and problem-solving abilities.

  • Ability to effectively prioritize and execute tasks in a high-pressure environment.

  • Good written, oral, and interpersonal communication skills.

  • Ability to conduct research into IT security issues and products as required.

  • Ability to present ideas in business-friendly and user-friendly language.

  • Highly self-motivated and directed.

  • Keen attention to detail.

  • Team-oriented and skilled in working within a collaborative environment.

MINIMUM QUALIFICATIONS:

Education:

Bachelor's Degree (typically in Computer Technology)

Experience:

0-2 years of progressive work experience (typically in Computer Technology) with acquired knowledge at the level of a Systems Technologist I

OR

Education & ExperienceSubstitution:

3-5 years of progressive work experience (typically in Computer Technology) with acquired knowledge at the level of a Systems Technologist I

Certificates, Licenses, Registrations:

None

Necessary Special Requirements

PHYSICAL WORKING CONDITIONS:

  • Rotational On-Call requirements
  • Some travel with overnights
  • Frequent work on weekends

NOTES:

  • FLSA: Non-Exempt
  • The successful candidate must pass a background check

Supplemental Information

Click here to view the State of Wyoming Classification and Pay Structure.

URL: http://agency.governmentjobs.com/wyoming/default.cfm

The State of Wyoming is an Equal Opportunity Employer and actively supports the ADA and reasonably accommodates qualified applicants with disabilities.

Class Specifications are subject to change, please refer to the A & I HRD Website to ensure that you have the most recent version.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove

Systems Technologist II (Ctst08) 2024-01098

State Of Wyoming