StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Cybersecurity Analyst IV

TEXAS BOARD OF ARCHITECTURAL - Austin, TX

Apply Now

Job Description

Please paste the following URL into a browser to view the entire job posting in the CAPPS Career Section: may apply to the job directly through the CAPPS Career Section. It is not necessary to apply both through Work In Texas and CAPPS Career SectionGENERAL DESCRIPTIONThe Texas Board of Architectural Examiners is seeking a Cybersecurity Analyst IV. Work involves advanced (senior-level) information security, cybersecurity analysis, systems administration, and network systems work. Works under minimal supervision, with considerable latitude for the use of initiative and independent judgment.ESSENTIAL JOB FUNCTIONS1. Performs technical risk assessments and reviews of account permissions, computer data access needs, security violations, programming changes, and new and existing applications and systems, including data center physical security and environment.2. Performs cybersecurity incident detection, analysis, and prevention.3. Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.4. Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.5. Monitors systems and procedures to protect data systems and databases from unauthorized access.6. Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.7. Supports the implementation of computer system security plans with agency personnel and outside vendors.8. Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.9. Modifies and monitors computer configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status.10. Implements continuous automated security compliance capabilities.11. Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.12. Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency.13. Develops plans to safeguard computer configuration and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.14. Coordinates agency policies for encryption of data transmissions and the definition of firewall configuration to protect confidential information in transit.15. Designs, develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.16. Designs, automates, manages, and deploys security applications and infrastructure program activities.17. Participates in the development of information technology disaster recovery and business continuity planning.18. Performs troubleshooting support of systems hardware, software, and networking issues. Responds to incident and problem calls, and processes service requests and tasks.19. Installs, configures, maintains, and administers servers, operating systems, and applications.20. Supports operational, technical, and system requirements for the location, installation, operation, and maintenance of servers.21. Prepares and maintains operating procedures for technical support, troubleshooting, maintenance, and innovative systems administration techniques.22. Performs network startup and shutdown procedures; maintains control records. Monitors the status of the network to ensure that all devices are working properly.23. Performs tuning and capacity planning activities to enhance the performance of network resources.24. Gathers data pertaining to customersand#8217; needs and uses information to identify, predict, interpret, and evaluate system and network requir ments.25. Installs, tests, and maintains network hardware and software; analyzes network utility and availability.26. Maintains the networkand#8217;s physical and logical structures, including network connections.27. Maintains network support software, analyzes user support statistics, and recommends appropriate measures.28. Maintains the operating system and security software used on the network, adds new users to the network, and establishes rights and privileges.29. Monitors the performance of backup, recovery, and the archival of files stored on the network.30. Maintains the local area or wide area network, Internet or intranet, cable and hub installations, and inventories.31. Interprets and solves problems when a user or an automated monitoring system indicates that a problem exists.32. Detects, anticipates, and mitigates network system vulnerabilities.33. Coordinates and/or designs and maintains local area network implementations.34. Monitors network security, including registering users and installing firewalls.35. Monitors the operational network environment and takes corrective measures to ensure efficient performance.36. Designs or coordinates the design of the procedures necessary to save and recover local area or wide area network environments from hardware and software failures.37. Oversees and/or conducts major studies regarding system usage, makes recommendations for improvements, and determines network system requirements.38. Reviews network system plans for completeness and accuracy, and plans and schedules network studies and system implementations.39. Analyzes existing network and system procedures for efficiency and effectiveness.40. Analyzes and defines agency disaster recovery responsibilities and procedures.41. Monitors and defines the requirements of the overall security of the enterprise network.42. Prepares budget recommendations for network facilities, analyzes user support statistics, and implements appropriate measures.43. Manages multiple projects occasionally, and/or manages some of the most complex network projects, including those involving highly complex planning, designing, and integrating of local area or wide area network, Internet and intranet systems, and other data networks.44. Acts as the agencyand#8217;s information security officer.45. Performs related work as assigned.Qualifications: MINIMUM QUALIFICATIONS1. Graduation from a two-year technical college or an accredited four-year college or university with major coursework in networking is required. Relevant work experience, in excess of the required three years listed below, may be substituted on a year-for-year basis.2. Three yearsand#8217; experience in the following areas is required: WAN and Ethernet LAN management, configuring network routers and switches, Microsoft server management, administering active directory services, and network and endpoint security software.3. Experience with hardware virtualization technologies (such as VMware or Microsoft) is required.4. Experience in the following areas is preferred: supporting and troubleshooting server hardware and components, supporting domain name services, voice over IP telephony technologies, Microsoft Office 365 administration, Microsoft Exchange server administration, Microsoft Windows PowerShell and scripting, Microsoft Entra ID, Intune and Defender administration, information security analysis work.5. Willingness to work irregular hours, including evenings, weekends, and holidays and travel up to 10% for work-related purposes as required.KNOWLEDGE, SKILLS ABILITIES (KSAs)1. Knowledge of network facilities and data processing techniques; computer hardware and software; network operating system and security software; and performance monitoring and capacity management tools.2. Knowledge of domain and network design and topologies.3. Ability to diagnose, analyze, and resolve specific network problems.4. Knowledge of Microsoft Windows server and

Created: 2026-04-09

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.