Texas Department of Motor Vehicles

Receive alerts when this company posts new jobs.

Similar Jobs

Job Details

CPA - Cybersecurity Analyst II (reopened)

at Texas Department of Motor Vehicles

Posted: 6/8/2020
Job Status: Full Time
Job Reference #: 00004646
Keywords:

Job Description

 

 

**APPLICANTS WHO PREVIOUSLY APPLIED DO NOT NEED TO REAPPLY; YOUR APPLICATION IS STILL BEING CONSIDERED.


APPLICATIONS MAY BE FILED ONLINE AT:
https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00004646&tz=GMT-05:00

 

APPLICATIONS SUBMITTED THROUGH WORK IN TEXAS:
Work In Texas (WIT) applicants must complete the supplemental questions to be considered for the posting. In order to complete the supplemental questions please go to CAPPS Recruit to register or login and access your profile. Go to CAPPS Recruit to Sign In (Link: https://capps.taleo.net/careersection/304/jobsearch.ftl?lang=en )


PLEASE NOTE:
All applications must contain complete job histories, which includes job title, dates of employment, name of employer, supervisor's name and phone number and a description of duties performed.   If this information is not submitted, your application may be rejected because it is incomplete. Resumes do not take the place of this required information.

 

DIVISION:
Fiscal Management/Statewide Fiscal Systems


GENERAL DESCRIPTION:
Performs advanced (senior-level) cybersecurity analysis work. Work involves establishing Identity and Access Management (IAM), Multifactor Authentication (MFA), Role Based Access Control (RBAC), Privileged Access Management (PAM), Single-Sign-On (SSO), and other cybersecurity related processes and procedures for statewide system users.  Serves as subject matter expert (SME) for cybersecurity initiatives. Ensures the confidentiality, availability, and integrity of statewide systems. May assign and supervise the work of others. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.


WORK HOURS:
8 a.m. to 5 p.m., 40 hour work week, Monday through Friday. May occasionally work evenings, weekends or holiday.  Hours may change based on business needs.


ESSENTIAL DUTIES AND RESPONSIBILITIES:
• Configures and maintains cybersecurity infrastructure and architectures.  Cybersecurity initiatives may include Software as a Service (SaaS) and on-premise products.
• Integrates cybersecurity products with statewide systems that are hosted on the mainframe, on servers, and in the cloud.
• Liaises with information technology and information security teams to ensure smooth integration of cybersecurity products.
• Establishes methods and procedures for the provisioning of application access for statewide systems.
• Establishes standards and methods for federating cybersecurity products with internal and external systems, including Microsoft Azure, Office 365, Active Directory, PeopleSoft HCM, PeopleSoft Financials, Business Objects, and other on-premise and cloud

  applications.
• Oversees and assists on projects that cross agency systems and other state entities that require coordination, planning, and scheduling during project development and implementation.
• Prepares logic flow charts, decision tables, narrative descriptions, and similar materials to support network enhancements necessary to support cybersecurity initiatives.
• Oversees and conducts training of staff before the implementation of cybersecurity products, and provides advice and guidance during the implementation process.
• Assists in advising management and users regarding cybersecurity procedures.
• Assists in recommending and managing the implementation of corrective actions.

• Monitors cybersecurity infrastructure, policies and procedures to protect information systems from unauthorized use.
• Evaluates network and system security configuration for best practices and risk-based access controls.
• Oversees the development of operating procedures for technical support, troubleshooting, maintenance, and innovative systems administration techniques.
• Develops and implements strategic planning actions and policy decisions related to the agency's cybersecurity systems, and makes recommendations concerning the direction of the agency's cybersecurity systems.
• Reviews network system plans for completeness and accuracy, and plans and schedules network studies and system implementations for cybersecurity initiatives.
• Reviews, develops, and delivers cybersecurity awareness training.
• Reviews, develops, and delivers end-user training for cybersecurity products implemented for the statewide systems.
• Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.
• Researches and analyzes cybersecurity and privacy legislation, regulations, advisories, alerts, and vulnerabilities.
• Identifies and evaluates new cybersecurity technologies to remediate vulnerabilities.
• May assign and supervise the work of others.
• Performs other related duties as assigned.

 



Qualifications

EDUCATION:
Graduation from an accredited college or university with a Bachelor's degree.


PREFERRED EDUCATION:
Graduation from an accredited college or university with a Bachelor's degree in Cybersecurity, Information Technology Security, Computer Engineering, Computer Information Systems, Computer Science, Management Information Systems, or a related field.


EXPERIENCE:
Six (6) years of experience with one or more of the following areas:


• Information Security
• Systems Administration
• Identity Access Management (IAM)
• Vulnerability Management
• Formal Risk Assessments
• Penetration Testing

 

PREFERRED EXPERIENCE:
Experience with one or more of the following areas:


• Centralized Accounting and Payroll/Personnel System (CAPPS)
• PeopleSoft implementations
• Cloud implementations
• Cybersecurity analysis
• Information security analysis
• Privileged Access Management (PAM)
• Single-Sign-On
• Network Federation
• Application Security
• Network administration work

 

SUBSTITUTIONS:
One (1) additional year of experience with one or more of the following areas:


• Information Security
• Systems Administration
• Identity Access Management (IAM)
• Vulnerability Management
• Formal Risk Assessments
• Penetration Testing

 

may substitute for thirty semester hours of educational requirement with a maximum substitution of 120 semester hours (four years).

 

PREFERRED LICENSES/CERTIFICATIONS:
Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), CompTIA Security , and CompTIA Advanced Security Practitioner (CASP)


PHYSICAL REQUIREMENTS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.


This position requires the incumbent to primarily perform sedentary office work; however, mobility (standing and walking) is routinely required to carry out some duties. It requires extensive computer, telephone and client/customer contact. It requires the ability to bend, stoop, kneel, and reach as needed for filing and similar routine office duties. The job also requires normal cognitive abilities requiring the ability to learn, recall, and apply certain practices and policies. It requires the stamina to maintain attention to detail despite interruptions. Marginal or corrected visual and auditory requirements are required for reading printed materials and computer screens and communicating with internal and external customers.

 

KNOWLEDGE SKILLS AND ABILITIES:

KNOWLEDGE:
• Programs, concepts, and techniques for enterprise risk management
• Operational support of networks, operating systems, Internet technologies, databases, and security infrastructure
• Cybersecurity and information security controls, practices, procedures, and regulations
• Laws, statutes, codes, and regulations relating to risk management, information security, business continuity, fraud, and privacy


SKILLS:
• Configuring, deploying, and monitoring security infrastructure (Technical Competence)
• Using effective written and verbal communication to convey information in a clear, concise manner (Communication)
• Identifying and resolving problems by using strong analytical techniques, innovative approaches and taking the initiative in preventing and solving problems (Problem Solving)

 

ABILITIES:
• Resolve complex security issues in diverse and decentralized environments
• Plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls
• Communicate effectively, and to assign and supervise the work others
• Establish and maintain working relationships with co-workers, agency staff and management to achieve common goals (Teamwork)
• Plan, organize and prioritize multiple assignments to effectively manage a fast paced and changing work environment without compromising accuracy (Adaptability)
• Consistently meet internal and external customer needs and expectations in a professional manner (Customer Service)
• Effectively demonstrate skill and ability to perform the specific job duties and tasks as defined by job description (Technical Competence)
• Be dependable, meet deadlines and produce high-quality work (Workload Management/Productivity)


VETERANS:

In order to receive veteran's preference a copy of your DD214, VA disability rating (if applicable) or a DD1300 must be attached to your application.


Veterans, Reservist or Guardsmen with an MOS or additional duties that fall in the fields of 17C, 25B, 25D, 17, 29, 88 or other related fields pertaining to the minimum experience requirements may meet the minimum qualifications. Please call Human Resources, CPA Veterans Liaison at 512-475-3560/800-531-5441 for more information or assistance.


Go to http://www.texasskillstowork.com, http://www.onetonline.org, or www.careeronestop.org for assistance translating your military experience and training courses into civilian job terms, qualifications/requirements and skill sets.


Additional Military Crosswalk information can be found at: http://www.hr.sao.state.tx.us/Compensation/JobDescriptions.aspx 


We fully recognize, honor and enforce the Uniformed Services Employment and Reemployment Rights Act (USERRA) and encourage opportunities to hire Veterans, Reservists and Guardsmen.


IMPORTANT NOTES TO THE CANDIDATE:
Candidates may be asked to participate in a skills demonstration and/or presentation.


Salary is contingent upon qualifications and is subject to salary administration and budgetary restrictions.


CPA employees in the same job classification, if selected, will be laterally transferred with no increase in salary. (An example might be an Accounts Examiner III in Revenue Administration who moves to

 an Accounts Examiner III in the Enforcement division.)

Complete copies of college transcripts must be furnished to the divisional hiring representative at the time of the interview for positions requiring a college degree, and/or specific educational credits.


Unless otherwise indicated on specific postings, regular attendance is an essential job requirement of all positions. Your application for employment with the Comptroller of Public Accounts may subject you to a criminal background check. All positions requiring a degree and/or licensing require proof of degree and/or license at time of interview. If you are scheduled for an interview and require any reasonable accommodation in our interview process, please inform the hiring representative who calls you to schedule your interview. Whenever possible, please give the hiring representative sufficient time to consider and respond to your request. Only applicants scheduled for interviews will be contacted.


Thank you for considering employment at the Comptroller of Public Accounts! The Comptroller's office is an equal employment opportunity employer.