IT Security Analyst II

Posting Details

Position Information

Job Title IT Security Analyst II
Department Information Technology Security Office
Full Time/Part Time Full-Time
Requisition Number S18253
Open Date 01/12/2018
Close Date
Salary Information

Salary Commensurate with Experience and Qualifications

Work Schedule

Monday through Friday, 8 a.m. to 5 p.m.

Benefits Eligible Yes
Eligible for Overtime No
Position Summary

Under the general direction of the Chief Information Security Officer, the IT Security Analyst II will participate in the development and support of a vulnerability management program; assess any changes to the university security posture that these vulnerabilities may cause; provide regular reports to the sr. management (CIO and others) about the vulnerabilities found; provide immediate escalation of urgent issues that would represent a threat to the institution; participate in the development of network, system and application security policies, plans, and procedures; ensure that security policies are applied and maintained for network devices, remote access devices, firewalls, and servers and systems; and monitor and analyze information related to network and system security.

The IT Security Analyst II will also provide technical support and guidance in the areas of security analysis, intrusion detection, incident response and network security management; prepare documentation on information security standards and best practices; audit and strengthen security on workstations, servers and other network systems.

Education Required Bachelor's Degree
Concentration / Degree Type

In information technology, MIS, computer science, engineering, or other related field.

Substitution for Education Requirement

May substitute additional related experience, above and beyond what is required, on an equivalent year for year basis in lieu of the degree requirement.

Education Preferred
Experience Required 5 years
Type of Experience

At least five years in an information security role, including vulnerability assessment, system auditing, intrusion detection, incident response, and firewall management.

Substitution for Experience Requirement

May substitute additional related education, above and beyond what is required, on an
equivalent year for year basis in lieu of the
experience requirement.

Experience Preferred

- Experience in Higher Education preferred.
- Four plus years in an IT Security Analyst role.

License/Certification Required
License/Certification Preferred

- CISSP, CCNA or CCNP Security, GSEC, or CEH.

Skills Required

- Ability to work with technical personnel, senior university staff and the general campus community; Excellent oral and written communications, excellent interpersonal, communications, collaborative and negotiating skills; Familiarity with industry and government regulations and standards, such as GLB, PCI, HIPAA, FERPA, and NIST SPs; Strong technical background in Information Security methodologies, Internet (TCP/IP) protocols and network architecture/hardware; and Familiarity with current and up-and-coming security methodologies and products.

Skills Preferred

- Experience with vulnerability assessment software, such as Tenable Security Center and Nessus or Rapid7 NexPose and Metasploit; familiarity with logging and event management tools, such as Splunk or LogRhythm; using and administering multiple operating systems, especially versions of Windows, Macintosh OSX, and Linux; penetration testing tools and methodologies; change management process; programming and scripting languages, such as PERL and Python; intrusion detection and prevention systems, from offerings such as Palo Alto and BRO; a comprehensive understanding of firewalls; forensic tools, such as Encase Forensic and open source tools; familiarity with basic computing desktop and server hardware, including storage systems; desktop encryption software, such as Symantec PGP, FileVault, and BitLocker; network access control systems, such as Cisco NAC, ISE, or Aruba Clear Pass; antivirus software, such as TrendMicro OfficeScan and Microsoft Forefront; and virtual systems, such as VMWare.

Internal / External Contacts

- Frequent contact with faculty members, research staff, administrative staff, and students in all departments.
- Frequent contact by telephone and in person with vendors to facilitate installation of new products and maintenance of existing systems.
- Frequent contact via electronic mail with persons not employed by Rice University on a nationwide basis.
- Frequent contact in person with persons not employed by Rice University at off-site conferences.

Physical Demands

Must be able to move computer equipment.

Working Conditions

Non-smoking environment.

Security Sensitive Yes
Special Instructions to Applicants

Applicants may be asked to provide a writing sample and give a short presentation based on an agreed-upon topic to the interview team.

Quick Link for Posting

Job Duties

Job Duty Name Vulnerability Management Program
Description of Job Duty

- Work with the Chief Information Security Officer and other Rice community members to design, implement, and manage a campus-wide vulnerability management program. Use commercial and open source tools and techniques to assess campus resources for vulnerabilities. Work with system owners to manage and triage identified vulnerabilities. Report on progress and areas of concern to the CISO. Work with third parties to validate findings as required to ensure independent verification of program milestones.

- Include stakeholders in both the Office of Information Technology and partner IT organizations in the deployment of the program.

Percentage of Time 50
Job Duty Name System and Event Correlation and Analysis
Description of Job Duty

- Evaluate security threats against vulnerabilities identified in the vulnerability management program to determine the level of security necessary to protect information systems on campus. Implement and configure security measures such as firewalls, intrusion prevention systems and other security software or devices as required.

- Generate alerts and other actionable intelligence to identify active threats and take action to protect the campus, following predefined playbooks. Develop new playbooks as necessary.

Percentage of Time 30
Job Duty Name Documentation and Reporting
Description of Job Duty

- Prepare system documentation and specifications of system security procedures. Prepare periodic activity reports. Assist in preparation of and issue new and revised computing security standards and procedures.

Percentage of Time 15
Job Duty Name Other Duties
Description of Job Duty

- Other duties as assigned by Chief Information Security Officer.

Percentage of Time 5

Applicant Documents

Required Documents
  1. Cover Letter
  2. Resume
  3. References/Recommendation Request
Optional Documents

Supplemental Questions

Required fields are indicated with an asterisk (*).

  1. * Do you have a bachelor's degree or higher in information technology, MIS, computer science, engineering, or other related field, or additional related experience, above and beyond what is required, on an equivalent year for year basis in lieu of the degree requirement?
    • Yes
    • No
  2. * Do you have at least five years of experience in an information security role, including vulnerability assessment, system auditing, intrusion detection, incident response, and firewall management or equivalent year for year basis in lieu of the experience requirement?
    • Yes
    • No
  3. * Do you have direct experience supporting vulnerability management software?

    (Open Ended Question)

  4. * Please provide the salary or range that you would require or consider for this position.

    (Open Ended Question)