This recruitment has been reopened for additional applicants and will remain open until filled. If you have already applied for recruitment #644-2025-1, you do not need to reapply. New applicants are encouraged to submit applications as soon as possible as this recruitment may close at any time without further notice.
Information Technology (IT) provides technical services, manages the county's technical resources, and provides consulting services for technology improvements through three programs : Administration, Operations, and Technology Solutions. These programs provide a complete range of technology services, which include strategic planning, new service design, systems analysis, project management, security risk management, data security, applications delivery and support networks, servers and storage, desktop and mobile management, database administration, and end-user support.
General Statement of Duties
An IT Security Analyst assists the IT Security Administrator in managing information security operations and functions; implement and support the development of related policies, procedures, and business practices; adhere to administrative controls and improvements; and follow procedures for new and changing regulatory requirements. Facilitate and coordinate throughout the county to achieve the objectives of the service plan.
Supervision Received
Under general supervision of the IT Security Administrator, or designee who assigns work, establishes goals, and reviews the results obtained for overall effectiveness through analyzing work products, observations, and meetings.
Supervision Exercised
This classification acts as a lead worker to non-supervisory employees or in collaboration with other departments. Works inter-departmentally to identify and correct flaws in the County's security systems, solutions, and programs while recommending specific measures that can improve the County's overall security posture. Plans, organizes, manages, and administers information security programs, operations, and functions. Assists in, develops, and maintains information security policies, procedures, and business practices. Leads security risk assessment efforts and supports the employee security-awareness training program. Evaluates security goals, objectives, priorities, and activities to improve performance and outcomes. Recommends and establishes physical, technical, and administrative security controls and improvements; serves as an advisor to the management team.
Implement and Manage Security Tools
Implements new security configurations
Security Risk and Prevention
Security Incident and Authoritative Contact
Miscellaneous
Experience and Training
Special Requirements
Preferences
Knowledge, Skills, and Abilities
Knowledge of technology hardware and software systems, application languages, server based systems, cloud computing, personal computers, local and wide area network configurations and management, information and data management software and state-of-the-art system development and maintenance technologies; local, state, and federal laws, rules, policies, and regulations affecting information security and related technology and systems; strategic planning, preparation, and projection; effective leadership and organizational communication principles and practices. Working knowledge of prevailing industry security standards and common body of knowledge gained by way of CISSP, SANS, and CISA certifications.
Skills and abilities to manage comprehensive information security programs; lead diverse technologies, employees, and customer groups; communicate effectively in writing and orally, make public or staff presentations; establish and maintain effective working relationships with employees, systems users, outside consultants, and vendors, including customers in high-stress situations; and assist in confidential investigations; identify information security problem areas, formulate diagnoses, and propose practical solutions. Deep understanding of network infrastructure, routers, switches, firewalls, and associated network protocols and concepts.
Physical Requirements
Drives a motor vehicle; sees using depth perception; stands; sits; moves about the work area; bends forward; stoops; climbs 1 floor of stairs; crawls; reaches overhead; lifts up to 40 lbs.; pushes and pulls up to 25 lbs.; carries up to 20 lbs.; moves carts weighing up to 100 lbs.; operates a keyboard; speaks clearly and audibly; reads a 12 pt font; distinguishes shades and colors; hears a normal speech level; works in areas that may be exposed to dust.
J-18808-Ljbffr
It Security Analyst • Salem, OR, US