Job Details

University of Texas at El Paso
  • Position Number: 3169091
  • Location: El Paso, TX
  • Position Type: Computing - Network/System Administration


Cybersecurity Specialist


Job ID: 7584
Location: El Paso, TX
Full/Part Time: Full Time
Regular/Temporary: $RegTemp

FLSA Status
Exempt

Posting End Date
Open until filled

Salary
Salary Commensurate with Experience

Hours per Week
40 Hours weekly; Standard 8:00am-5:00pm, Monday-Friday

Hiring Department
Information Security

Required Application Materials
A resume, cover letter, and a list of 3 professional references are required to apply.
  • PLEASE SUBMIT ALL DOCUMENTS IN A SINGLE PDF.

    Purpose of Position
    Under minimal supervision and with limited and considerable latitude for the use of initiative and independent judgment, the Cybersecurity Administrator is responsible for supporting the technical infrastructure of the Information Security Office (ISO) with incident responders and providing technical guidance and support for the network infrastructure that monitors the University's Information System Security programs to ensure compliance with federal and state laws and regulations, and UT System's standard industry practice, policies, and procedures.

    Essential Functions
    Assists with providing system administration with a background in the setup, configuration, and maintenance of hosts with various Microsoft Windows operating systems or UNIX/Linux based operating systems.

    Assists with implementing security applications for the Information Security Office.

    Assists with providing setup, configuration, and maintenance of relational databases including but not limited to Microsoft SQL Server, MySQL Server, and SQLite.

    Assists with providing setup, configuration, and maintenance of web-based services including websites.

    Assists with administrating and maintaining various log-based cybersecurity monitoring and analysis systems. Troubleshoots and resolves any issues encountered.

    Assists with installing, troubleshooting, and monitoring security-related applications and architectures on University Information Technology (IT) systems.

    Assists in performing technical risk audits, and vulnerability assessments on University IT systems on all levels including network, system, application, and physical. Works with IT areas and vendors to assist in the review, development, and technical implementation of cybersecurity enhancements to their operations.

    Reviews system logs, alerts, and other data sources to identify, investigate, report any possible cybersecurity incidents or discovered vulnerabilities, both internal and external to the University; Suggest and help implement remediation steps and appropriate safeguards in the event of any cybersecurity incidents promptly.

    Researches, recommends, implements, tests, and deploys acquisitions of new security hardware and/or software to improve University cybersecurity posture.

    Works with university staff and students to gather cybersecurity requirements, identify sensitive information resources, and help mitigate possible cybersecurity threats. Plans out and implements protective measures to ensure University systems and data are adequately protected.

    Documents and maintains detailed written records of cybersecurity incidents as mandated by the UT Systems or Texas state departments. Works with law enforcement and legal representatives in investigations of possible security violations.
    Participates in UT System, Texas state, and industry cybersecurity functions to stay abreast of current laws, regulations, and industry practices.

    Assists in developing, maintaining, training, and communicating cybersecurity awareness programs, policies, and procedures to all University users regarding IT systems.

    Performs duties as a Local Registration Authority Administrator (LRAA); issues digital keys for encryption programs.

    Coordinates with users to investigate and solve issues such as computer data access requirements, cybersecurity questions and violations, vulnerability remediation, and programming changes.

    Continually evaluate new cyber threats, solutions, and the impact on IT and University operations and balancing these needs to develop and implement the best cybersecurity solutions for the university.

    Assists with special projects, as needed.

    Complies with all State and University policies.

    Other duties may be assigned.

    Supervisory Responsibilities: No supervisory responsibilities

    Required Qualifications
    Minimum Education required: Bachelor's degree from four year college or university in computer science or educationally equivalent engineering field.

    Minimum Experience required: Two years of work experience in cybersecurity related field; or an equivalent combination of education and experience.

    Working knowledge of various cybersecurity technologies, architecture, networking, engineering, and administration topics and implementations including but not limited to firewalls, intrusion prevention systems, DNS security, data loss prevention, encryption, etc. Understanding of networking, storage, and operating system technologies. Administration experience with Microsoft Windows and UNIX/Linux operating systems. Experience with Microsoft Office software and ability to learn and use institutional software systems. Experience in application development with a focus on software engineering methodologies, software development life-cycles, and secure coding including but not limited to problem analysis, requirements gathering, system documentation, construction, testing, and deployment.

    Preferred Qualifications
    Preferred Qualifications: Experience with SIEM tools such as Splunk. Experience with vulnerability scanning tools such as Tenable Nessus. Experience with application or script development to automate tasks

    Working Conditions
    Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

    While performing the duties of this job, the employee is frequently required to sit, use hands to feel, reach with hands and arms, and talk or hear. The employee is occasionally required to stand and walk. The employee must occasionally lift and move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception, and ability to adjust focus.

    Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

    While performing the duties of this job, the noise level in the work environment is usually moderate.

    EO/AA Statement
    The University of Texas at El Paso is an Equal Opportunity / Affirmative Action Employer. The University does not discriminate on the basis of race, color, national origin, sex, religion, age, disability, genetic information, veteran status, or sexual orientation and gender in employment or the provision of services in accordance with state and federal law. Discrimination on the basis of sex includes an employee's or prospective employee's right to be free from sexual harassment under Title IX of the Higher Education Amendments of 1972.


    To apply, visit https://zahr-prd-candidate-ada.utshare.utsystem.edu/psp/ZAHRPRDADA/EMPLOYEE/HRMS/c/HRS_HRAM_FL.HRS_CG_SEARCH_FL.GBL?Page=HRS_APP_JBPST_FL&Action=U&FOCUS=Applicant&SiteId=2&JobOpeningId=7584&PostingSeq=1







    Copyright 2022 Jobelephant.com Inc. All rights reserved.

    Posted by the FREE value-added recruitment advertising agency


    jeid-c11002a6debaa54ebc0f7c0690a61079
  • By continuing to use our site, you agree to our Terms of Service and Privacy Policy. Learn more about how we use cookies by reviewing our Cookie Policy.