Experience Inc. Jobs

Job Information

University of Texas Rio Grande Valley INFORMATION SECURITY ENGINEER in Rio Grande Valley, Texas

Position Information

Posting NumberSRGV7631

Working TitleINFORMATION SECURITY ENGINEER

Number of Vacancies1

LocationRio Grande Valley

DepartmentInformation Security

FTE1

FLSAExempt

Scope of Job

Responsible for the development, implementation, maintenance and monitoring of information technology security systems. To ensure operational and security technical controls are in place and that they adhere to organizational security policies and procedures for both the UTRGV Information Security Office and the Regional Security Operations Center ( RSOC ).

Description of Duties

  • Responsible for developing, implementing, maintaining and the monitoring of information technology security systems.

  • Conducts functional and connectivity testing to ensure continuing operability.

  • Designs and implements appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures.

  • Designs group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs, as required and in accordance with local, state and federal rules and regulations.

  • Oversees the installation, implementation, configuration, and support of system components.

  • Develops and oversees the implementation of systems administration standard operating procedures to ensure compliance with university policies.

  • Establishes and manages user accounts by overseeing or conducting backup and recovery tasks when needed.

  • Implements and enforces local network usage policies and procedures to ensure compliance with organization systems administration standard operating procedures and local, state and federal rules and regulations. Maintains baseline system security according to organizational policies and procedures.

  • Manages accounts, network rights, and access to systems and equipment.

  • Conducts security system audits and assessments on a regular basis to ensure computer systems, networks and data is protected.

  • Plans, executes, and verifies data redundancy and system recovery procedures.

  • Provides ongoing optimization and problem-solving support to users.

  • Monitors and maintains security system/server configuration.

  • Oversees, installs, manages, updates, and troubleshoots assigned systems/servers/applications as required.

  • Verifies and ensures system hardware availability, functionality, integrity, and efficiency.

  • Conducts periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.

  • Manages system/server resources to include performance, capacity, availability, serviceability, and recoverability.

  • Diagnoses faulty security system/server hardware and performs repairs as needed, to include installing, configuring, and updating as required.

  • Conducts troubleshooting on hardware/software interface and interoperability problems as they arise.

  • Collaborates with incident response teams to effectively manage and mitigate security incidents, breaches, viruses, and intrusions, including containment, eradication, and recovery.

  • Generates incident reports, maintains incident documentation, and communicates findings to appropriate stakeholders.

  • Adheres to established security policies, procedures, and best practices to maintain a high level of system security posture.

  • Works closely with other members of the RSOC team, as well as cross-functional teams, to share information and ensure a coordinated response to security incidents.

  • Maintains a working knowledge of IT network security, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources.

  • Leads, mentors, supervises and evaluates assigned staff.

  • Collaborates with other university departments to continuously improve systems, services, and operations.

  • Stays abreast on the latest security trends, technologies and best practices to ensure the organization stays secure.

  • Performs other duties as assigned.

Supervision Received

General supervision from assigned supervisor.

Supervision Given

Direct supervision of assigned staff.

Required Education

Bachelor’s degree in cybersecurity, information security, information technology, computer sciences, risk management, or closely related field from an accredited university.

Preferred Education

Master’s degree in cybersecurity, information security, information technology, computer sciences, risk management, or closely related field from an accredited university.

Licenses/Certifications

Preferred:Certifications addressing network infrastructure, mobile device integration, hardware evaluation, operating systems, technical support, business continuity and disaster recovery, cloud computing security, incident management, IT governance, risk management, securing communications, authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and managing, maintaining, troubleshooting, installing, and configuring basic network infrastructure.

Required Experience

  • Three (3) years of professional experience in Information Security, Identity and Access Management, Payment Card Industry ( PCI ), application security, networking, or device security including experience conducting risk assessments and identifying effective risk mitigation strategiesor

  • Bachelor’s degree in unrelated field from an accredited university with four (4) years of the required experienceor

  • Master’s degree in information or cybersecurity with (2) years of the required experience.

Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.

Preferred Experience

Knowledge and experience with programming and computer languages such as SQL , PowerShell, Python, or similar. Experience in managing, configuring, deploying, and monitoring security infrastructure. Experience with standard concepts, practices, and procedures for security operation centers.

Equipment

Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g., word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.

Working Conditions

Needs to be able to successfully perform all required duties. Work is performed primarily in a general office environment. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which may require presence at multiple locations throughout the Rio Grande Valley.

Work is performed primarily in a general office environment to include hybrid work (subject to change based upon business needs). If the work is performed off campus, high-speed internet and a designated workspace are required.

Other

Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Ability to independently analyze information security threat intelligence and vulnerability information and provide recommendations for remediation. Demonstrated ability to multitask and self-manage assigned projects and daily tasks in an environment with shifting priorities. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security ( CIS ) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP . Demonstrated ability to follow established procedures, even in a high-pressure situation. Exceptional planning and organizational skills. Excellent communication skills, verbal and written, including the ability to convey technical information to a non-technical audience. Demonstrated ability to perform independent research and apply critical reasoning skills to solve technical issues. Familiarity with information security compliance and best practices, including COBITS , PCI , NIST , ISO , CJIS , and information security related federal and state laws and regulations, including privacy protection, identity protection, HIPAA , FERPA , records retention requirements, and CALEA . Knowledge of ITIL processes and standards. Knowledge of and familiarity with Cloud security practices, network operating systems, endpoint devices, Active Directory, ITSM , Amazon Web Services, Environment and PII vulnerability scanning, Office 365, and Oracle Identity Manager or similar IAM product. Ability to coordinate IT security and compliance projects to meet legal, regulatory, and contractual guidelines.

Physical Capabilities

N/A

Employment CategoryFull-Time

Minimum SalaryCommensurate with Experience

Posted SalaryCommensurate with Experience

Position Available Date06/24/2024

Grant Funded PositionNo

If Yes, Provide Grant Expiration Date

Posting Detail Information

EEO Statement

It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.

Special Instructions to Applicants

Dear Applicant, Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following: *Date of Birth *Social Security Number *Gender *Ethnicity/Race Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission. If you have any questions, please do not hesitate to contact us at (956)665-8880 and/or careers@utrgv.edu.

Additional Information

UTRGV is a distributed location institution and working location is subject to change based on need.

All UTRGV employees are required to have a criminal background check ( CBC ). Incomplete applications will not be considered.

Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development .

Quick Linkhttps://careers.utrgv.edu/postings/43303

Posting Supplemental Questions

Required fields are indicated with an asterisk (*).

    • Are you a current UTRGV employee?
  • Yes

  • No

    • Are you now, or previously, employed by The University of Texas System or any of its institutions?
  • Yes - I currently am employed by the UT System or its institutions

  • Yes - I have previously been employed by the UT System or its institutions

  • No - I have never been employed by the UT System or its institutions

    • Please select your highest level of completed education.
  • 6th grade education

  • 10th grade education

  • High School Diploma or GED

  • Associates Degree, Technical, or Trade School Degree/Certification or 60 Hours of College Hours

  • Bachelors Degree from an accredited university

  • Masters Degree from an accredited university

  • Ph. D. or other terminal degree from an accredited university

  • None of the above

    • Please provide the field of study for your education:

(Open Ended Question)

    • Please indicate the number of years of work experience you have directly related to the position in which you are applying for:
  • Less than 1 year

  • 1 year

  • 2 years

  • 3 years

  • 4 years

  • 5 years

  • 6 years

  • 7 years

  • 8 years

  • 9 years

  • 10 years

  • Over 10 years

    • Do you meet the minimum requirements for this position?
  • Yes

  • No

Applicant Documents

Required Documents

  • Resume

Optional Documents

  • Cover Letter/Letter of Application

  • Curriculum Vitae

  • Unofficial Transcripts

  • Reference Letter 1

  • Reference Letter 2

  • Reference Letter 3

  • Certifications and Licenses

  • Training Certificates

  • Other Document

  • List of 3 References

  • Unofficial Transcripts 2

  • Unofficial Transcripts 3

  • Letter of Interest

  • Unofficial Graduate Transcripts

  • Additional Document

DirectEmployers