University of Texas Rio Grande Valley

NETWORK SECURITY ANALYST III

Edinburg, TX, US

29 days ago
Save Job

Summary

Responsible for the monitoring, development, implementation, configuration, ongoing maintenance, integrity and security of the University IT network security function that follow network security strategies, methodologies, and practices for the entire university. Description of Duties * Responsible for operating and monitoring security systems on multiple University campuses to identify information security incidents and compromises and provide immediate and real time security network intelligence and responses. Makes recommendations for remediation and incident resolution. * Performs complex to advanced network security analysis work. * Coordinates response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents. * Maintains firewalls by making changes as needed and by implementing various blocking and monitoring mechanisms while evaluating and assessing organizational risk. * Configures and maintains firewalls for departments and colleges. * Performs key software, hardware and configuration upgrades, and by making changes as needed. * Configures and maintains encrypted virtual private networks for departments and colleges including: site-to-site, SSL, and remote access (client) VPNs. * Manages security related projects and executes project tasks. * Addresses vulnerability findings and implements appropriate corrective action. * Employs network forensic tools and packet analysis techniques to analyze unusual network traffic patterns for security breaches or network utilization issues. * Employs forensic tools and techniques to recover and seize deleted, fragmented and corrupted data from digital media of all types. * Secures and maintains custody of logs and other evidence for evaluation and analysis and provide them to appropriate personnel. * Preserves and collects electronically stored information based on approved requests while properly documenting change of custody. * Prepares reports and presentations on security related matters and tailors content based on the audience and level of expertise. * Researches, recommends, installs and maintains tools to aid in disaster recovery, business continuity, intrusion prevention, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities. * Provides risk assessment assistance, technical support, and administrative support for technical implementations and systems throughout the university while providing recommendations and identifying areas of improvement. * Prepares and issues security notices when necessary. * Provides information for risk assessment assistance, technical support, and administrative support for risk assessment assistance, technical support, and administrative support for technical implementation and systems throughout the university. * Researches and evaluates advancements in information security related subjects, and function as an internal consulting resource on viruses, spyware, computer forensics, recovery and similar subject matter and makes recommendations for improved services. * Maintains and monitors spam filter devices as needed. * Provides internal training, guidance and work leadership to staff members in network security related techniques. * Performs other duties as assigned. Supervision Received Specific supervision from assigned supervisor. Supervision Given Direct supervision of assigned staff. Required Education Bachelor's degree in Computer Science or Computer Information Systems or a related field from an accredited university. Preferred Education N/A Licenses/Certifications Preferred: ITIL Foundation Certification. Certifications in one or more of the following: Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Cisco Certified Network Associate (CCNA), EC-Council Certified Ethical Hacker (CEH), EC-Council Certified Computer Hacking Forensic Investigator (CHFI), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), Palo Alto Networks Certified Network Security Engineer (PCNSE), Palo Alto Networks Accredited Configuration Engineer (ACE), Pulse Secure Certified Connect Administrator (PSC-CA), Fortinet Certified Network Security Administrator (FCNSA), GIAC Security Essentials Certification (GSEC), CompTIA Security+. Required Experience Five (5) years of full-time work experience in performing data networking analysis as a Network Security Analyst, System Analyst, System Administrator, Network Administrator or related field which provides the required knowledge, skills and abilities to perform the job duties. Preferred Experience More than the minimum full-time experience in network security analysis/operations. Knowledge of installation, configuration and maintenance of security applications, including vulnerability scanners, spam filters, and intrusion detection systems. Knowledge of installation, configuration and maintenance of firewalls. Knowledge of networking concepts, including subnetting, access controls, ports, and protocols (TCP/IP). Knowledge and experience in computer languages, programs, and protocols. Knowledge of major operating systems, including command-line proficiency. Knowledge of OWASP Top 10. Experience in one or more coding/scripting languages. e.g. C, C++, Java, JSP, .NET, ASP.NET, Visual Basic 6, VBScript, JavaScript, PL/SQL and Oracle DB/MS SQL Server. Experienced with usage of applications security tools/source code analyzers and open source security tools. Experience with log analysis tools E.g.: Splunk, Elasticsearch. Knowledge of ITIL Practices. Equipment Use of standard office equipment. Working Conditions Needs to be able to successfully perform all required duties. Office Environment; some travel and weekend/evening work is required. Work is performed primarily in a general office environment and can be performed remotely within close proximity to a UTRGV campus. If the work is performed remote high-speed internet and a designated workspace are required. Other Knowledge of information and network security strategies, technologies, practices and standards. Knowledge of information and network security monitoring, traffic analysis techniques, attack vectors, incident detection handling and response. Excellent customer service and communication skills as well as the ability to prioritize and meet deadlines. Physical Capabilities N/A Employment Category Full-Time Minimum Salary Commensurate with Experience Posted Salary Commensurate with Experience Position Available Date 04/04/2025 Grant Funded Position No If Yes, Provide Grant Expiration Date

How strong is your resume?

Upload your resume and get feedback from our expert to help land this job

People also searched: