The IT Security Analyst performs two core functions for the Enterprise. The first is the day-to-day operations of in-place security solutions and the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.
This list may not include all tasks and/or knowledge which may be expected of the employee, nor does it cover all specific duties which may be required. Other duties may be assigned.
Strategy & Planning
- Participates in the planning and design of enterprise security architecture, under the direction of the Enterprise Systems Manager, or IT Leadership Team where appropriate.
- Leads the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures).
- Participates in the planning and design of an enterprise business continuity plan and disaster recovery plan.
Acquisition & Deployment
- Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
- Recommends additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
- Performs the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
Operational Management
- Maintains up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices).
- Maintains operational configurations of all in-place security solutions as per the established baselines.
- Monitors all in-place security solutions for efficient and appropriate operations.
- Reviews logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.
- Participates in investigations into problematic activity.
- Participates in the design and execution of vulnerability assessments, penetration tests, and security audits.
- Provides on-call support for end users for all in-place security solutions.
Education/Experience:
- College diploma or university degree in Computer Science and/or minimum two years relevant work experience.
- Equivalent combination of education and experience may be accepted.
- Preferred Certificate or Licenses (one or more of the following):CompTIA Security+
GIAC Information Security Fundamentals
Microsoft Certified Systems Administrator: Security
Associate of (ISC)2
Physical Requirements/Working Conditions: Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
- Work is performed primarily in a standard office environment, includes frequent interaction with City staff.
- The essential functions of this position require sufficient physical ability and mobility to work in an office or virtual setting; to stand or sit for prolonged periods of time; to occasionally stoop, bend, kneel, crouch, reach, and twist; the dexterity of hands and fingers to operate a computer keyboard, mouse, power tools, and to handle other computer components; occasional inspection of cables in floors and ceilings; lifting and transporting of moderately heavy objects, such as computers and peripherals; and to hear and verbally communicate to exchange information. Includes on-call availability as needed, nights and weekends on occasion.