Job title: Information Technology Technical Associate/Network Security Analyst
Company: Chicago State University
Job description: Posting Number S220107P
Posting Date
Closing Date
Title Information Technology Technical Associate
Working Title Information Technology Technical Associate/Network Security Analyst
Employee Class Civil Service
Department Network Service
Full-time/ Part-time Full-time
Specialization
Required certification:
Cisco Certified Network Associate, CCNA Security certification
or
Cisco Cyberops certification
Hours Per Week 37.5
Standard Work Week Monday-Friday and some evenings and weekends
Anticipated Start Date 07/01/2022
Job Summary
The Information Security Analyst will be responsible for day-to-day security threat monitoring and analysis. This position will manage security incidents and review security alerts for compliance and will work towards resolving them. This position will work on threat intelligence, security consultation, forensics and incident response that adhere to best practices and recognized control frameworks.
Job Description
1. Executes Information Security Network Monitoring and Incident Response procedures and contributes to continuous improvement of those procedures.
2. Works as part of the IT team to monitor existing security controls implemented within the University’s IT infrastructure.
3. Ensures that established controls remain in place to meet regulatory requirements, controls are operating as expected, and monitors the output of the controls on a regular basis for events of interest.
4. Identifies changes needed to controls as part of ongoing change management activities.
5. Investigates events of interest to determine if security incidents have occurred. Reports security incidents to supervisors.
6. Administers information security systems, including improvements to detection and response capabilities as well as updates, backups, and upgrades.
7. Monitors Configuration and Vulnerability Management procedures.
8. Works as part of the IT team to implement and monitor vulnerability management procedures.
9. Works with systems, applications, and vendors to ensure the regular configuration and vulnerability scans are conducted on the organizations IT infrastructure.
10. As configuration changes and vulnerabilities are discovered, ensures that these items are tracked and sent to the departments for mitigation and remediation.
11. Follows up with departments to ensure timely responses, and updates tracking system once tickets are closed.
12. Reports configuration and vulnerability statistics to supervisors weekly.
13. Consults, advises, and provides security assessment services to application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned.
14. Researches security issues and contributes to IT Security communications, web pages, blogs, and awareness materials.
15. Participates in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
16. Promotes an institutional perspective and fosters professional achievement of self and colleagues.
17. Works on specific projects as indicated by the supervisor or team leader.
18. Researches, recommends, and implements changes to procedures and systems to enhance data systems security.
19. Communicates with users to understand their security needs and supports the implementation of procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security.
Minimum Qualifications
1. Any combination totaling two years from the following categories:
a) progressively more responsible work experience in IT-related profession
b) college course work in Information Technology (IT), IT Management, or a closely related discipline, as measured by the following conversion table or its proportional equivalent:
● 60 semester hours or Associate’s Degree equals one year
● 90-120 semester hours or Bachelor’s Degree equals two years
Certified in CCNA certification or and preferred in Cisco Cyberops certification
Preferred Qualifications
1. Background with system administration of Linux/Unix systems or Microsoft Windows systems.
2. Proficient with programming or scripting languages used in relevant field.
3. Expertise with incident detection and response frameworks and tools.
4. An understanding of TCP/IP networking and related networking concepts.
5. Diagnose complex technical problems.
Knowledge, Skills and Abilities
1. Excellent oral and written communications skills
2. Knowledge of the systems and operations used within the areas and departments of responsibility
3. Ability to oversee and coordinate activities of user groups
4. Ability to effectively communicate with other colleagues, supervisors, administrative staff, and other IT users
5. Ability to identify and resolve technical problems
6. Ability to effectively communicate and professionally interact with all staff levels
Additional Applicant Information
Physical Requirement/ Demands
May require extend periods of sitting or standing at a time.
Work Enviroment / Conditions
Office, classroom, conference setting environment.
Expected salary:
Location: Chicago, IL
Job date: Wed, 15 Jun 2022 05:17:35 GMT
Apply for the job now!