Job Vacancy Information Technology Technical Associate/Network Security Analyst Chicago State University

Job title: Information Technology Technical Associate/Network Security Analyst

Company: Chicago State University

Job description: Posting Number S220107P

Posting Date

Closing Date

Title Information Technology Technical Associate

Working Title Information Technology Technical Associate/Network Security Analyst

Employee Class Civil Service

Department Network Service

Full-time/ Part-time Full-time


Required certification:

Cisco Certified Network Associate, CCNA Security certification


Cisco Cyberops certification

Hours Per Week 37.5

Standard Work Week Monday-Friday and some evenings and weekends

Anticipated Start Date 07/01/2022

Job Summary

The Information Security Analyst will be responsible for day-to-day security threat monitoring and analysis. This position will manage security incidents and review security alerts for compliance and will work towards resolving them. This position will work on threat intelligence, security consultation, forensics and incident response that adhere to best practices and recognized control frameworks.

Job Description

1. Executes Information Security Network Monitoring and Incident Response procedures and contributes to continuous improvement of those procedures.

2. Works as part of the IT team to monitor existing security controls implemented within the University’s IT infrastructure.

3. Ensures that established controls remain in place to meet regulatory requirements, controls are operating as expected, and monitors the output of the controls on a regular basis for events of interest.

4. Identifies changes needed to controls as part of ongoing change management activities.

5. Investigates events of interest to determine if security incidents have occurred. Reports security incidents to supervisors.

6. Administers information security systems, including improvements to detection and response capabilities as well as updates, backups, and upgrades.

7. Monitors Configuration and Vulnerability Management procedures.

8. Works as part of the IT team to implement and monitor vulnerability management procedures.

9. Works with systems, applications, and vendors to ensure the regular configuration and vulnerability scans are conducted on the organizations IT infrastructure.

10. As configuration changes and vulnerabilities are discovered, ensures that these items are tracked and sent to the departments for mitigation and remediation.

11. Follows up with departments to ensure timely responses, and updates tracking system once tickets are closed.

12. Reports configuration and vulnerability statistics to supervisors weekly.

13. Consults, advises, and provides security assessment services to application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned.

14. Researches security issues and contributes to IT Security communications, web pages, blogs, and awareness materials.

15. Participates in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.

16. Promotes an institutional perspective and fosters professional achievement of self and colleagues.

17. Works on specific projects as indicated by the supervisor or team leader.

18. Researches, recommends, and implements changes to procedures and systems to enhance data systems security.

19. Communicates with users to understand their security needs and supports the implementation of procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security.

Minimum Qualifications

1. Any combination totaling two years from the following categories:

a) progressively more responsible work experience in IT-related profession

b) college course work in Information Technology (IT), IT Management, or a closely related discipline, as measured by the following conversion table or its proportional equivalent:

● 60 semester hours or Associate’s Degree equals one year

● 90-120 semester hours or Bachelor’s Degree equals two years

Certified in CCNA certification or and preferred in Cisco Cyberops certification

Preferred Qualifications

1. Background with system administration of Linux/Unix systems or Microsoft Windows systems.

2. Proficient with programming or scripting languages used in relevant field.

3. Expertise with incident detection and response frameworks and tools.

4. An understanding of TCP/IP networking and related networking concepts.

5. Diagnose complex technical problems.

Knowledge, Skills and Abilities

1. Excellent oral and written communications skills

2. Knowledge of the systems and operations used within the areas and departments of responsibility

3. Ability to oversee and coordinate activities of user groups

4. Ability to effectively communicate with other colleagues, supervisors, administrative staff, and other IT users

5. Ability to identify and resolve technical problems

6. Ability to effectively communicate and professionally interact with all staff levels

Additional Applicant Information

Physical Requirement/ Demands

May require extend periods of sitting or standing at a time.

Work Enviroment / Conditions

Office, classroom, conference setting environment.

Expected salary:

Location: Chicago, IL

Job date: Wed, 15 Jun 2022 05:17:35 GMT

Apply for the job now!

Leave a Reply

Your email address will not be published. Required fields are marked *