JOB DESCRIPTION
Provides support in solving all phases of a large and complex Critical Infrastructure Security (CIS) program. Provides a full range
of analytic duties using knowledge of multidisciplinary security concepts, principles and practices applicable to security
administration. Responds to, and reports on, IT security incidents, providing initial assessment of impact severity and types of incidents being addressed.
Performs periodic operating system and application security assessments of simple-to-moderate complexity and review for evidence of vulnerability or compromise and assisting with the implementation of resolution. Monitors computing resources for evidence of compromise and report security incidents.
JOB DUTIES
- Understands and applies principles, theories and concepts related to the profession and ERCOT's culture.
- Exercises judgment within defined procedures and practices to determine appropriate action.
- Impact is generally limited to specific assignments or projects.
- May respond to inquiries and / or provide assistance and / or guidance to lower-level workers.
ADDITIONAL JOB DUTIES
Cyber Security Analyst Senior
Implements, monitors and maintains preventive and detective controlsMonitors computing resources for evidence of compromise and report security incidentsAnalyzes compromised computing resources of routine to moderate complexity, to assist in improving security design and policy compliance, and to understand and document new threat profilesDevelops and implements mitigation strategies for threat reduction based on monitoring of IT systemsResearches, analyzes, designs, tests and implements new or vendor supplied security software solutionsProvides up to date documentation and procedures on security software product administrationAssists in the development of technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation proceduresWorks as a member of the Incident Response Team and perform analysis of security breachesStudies and grows current knowledge of security issuesSupports the development, documentation, deployment, review and maintenance of information security policiesCommunicates information security requirements and principleEnsures compliance with security related regulatory and corporate requirementsDesigns cyber security monitoring program, including technologies and processesInvestigates and analyzes computing resources for evidence of compromise and reports security incidentsEnforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controlsFunctions as a member in the security group's Incident Response TeamAnalyzes complex compromised computing resources to improve security design and policy compliance, and to anticipate and prevent new threat profilesDevelops and defends new technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation proceduresPerforms periodic and complex operating system and application security assessments to determine the likelihood of vulnerability or compromise, and prepares possible resolutions for implementationAnalyzes security breachesExpands expert knowledge of security issuesReports issues to the department personnel responsible for the resourceServes as a mentor for junior security teammatesConducts incident response activities for security incidents involving major cloud service providers such as AWS, Azure, and GCP, ensuring timely and effective resolutionProduces and presents compelling security-related training contentCreates and consistently delivers awareness material promoting security awarenessEXPERIENCE
Requires minimum 5 years job related work experience in excess of degree requirementsEDUCATION
Bachelor's Degree : Cyber Security, Computer Science, MIS, or related discipline (Preferred)or a combination of education and experience that provides equivalent knowledge to a major in such fields is requiredCERTIFICATION
CISSP Certified Information Systems Security Professional (Preferred)Additional Preferred Certs : GSEC, GCIH, GCIA, GREM, GCFR and / or GCTDRead the full posting.
J-18808-Ljbffr