This job has expired and you can't apply for it anymore. Start a new search.
ERCOT - Electric Reliability Council of Texas logo
Company Name:
Approximate Salary:
Not Specified
Location:
Taylor, Texas
Country:
United States
Industry:
Information Technology - Other
Position type:
Full Time
Experience level:
2 - 5 years
Education level:
Bachelor's Degree

Cyber Security Analyst

Are you an ERCOT Employee? If so please log in to Workday to apply.

Monitors and verifies that ERCOT’s internal and external computer resources are protected by detecting, investigating, and responding to cyber threats.

JOB SUMMARY 

  • Monitors ERCOT resources for vulnerabilities, threats, and indicators of compromise.
  • Identifies and investigates security incidents, providing initial assessment of threats detected.
  • Performs cyber security incident response actions. 
  • Analyzes compromised resources to collect forensic evidence.
  • Documents incident findings, actions taken, and results to team members and management.
  • Provides input to evaluate security products, make recommendations, and ensure the integrity of ERCOT resources.
  • Performs on-call rotational duties.
  • Works in a highly collaborative team environment.

Essential Job Duties and Tasks

Level 2:

  • Monitors computing resources for evidence of compromise and report security incidents.
  • Responds to, and reports on IT security incidents, providing initial assessment of impact severity and types of incidents being addressed.
  • Analyzes compromised computing resources of routine to moderate complexity, to assist in improving security design and policy compliance, and to understand and document new threat profiles.
  • Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems.
  • Researches, analyzes, and recommends new or vendor supplied security software solutions.
  • Provides up to date documentation and procedures on security software product use.
  • Assists in the development of technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
  • Works as a member of the Incident Response Team and perform analysis of security breaches.
  • Studies and grows current knowledge of security issues

Level 3/Senior:

  • All of the above tasks, and
  • Investigates and analyzes computing resources for evidence of compromise and reports security incidents.
  • Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls.
  • Functions as a senior member in the security group’s Incident Response Team.
  • Analyzes complex compromised computing resources to improve security design and policy compliance, and to anticipate and prevent new threat profiles.
  • Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems.
  • Researches, evaluates, tests and recommends new or vendor supplied security software solutions.
  • Provides up to date documentation and procedures on security software product use.
  • Provides guidance for enterprise patching to expedite deployment when necessary based upon risk.
  • Develops and defends new technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
  • Performs periodic and complex operating system and application security assessments to determine the likelihood of vulnerability or compromise, and prepares possible resolutions for implementation.
  • Takes a leadership position on the Incident Response Team and analyzes security breaches.
  • Expands expert knowledge of security issues
  • Reports issues to the department personnel responsible for the resource
  • Serves as a mentor for junior security teammates

QUALIFICATIONS

Education

All Levels:

Bachelor’s degree in Computer Science, Electrical Engineering or a combination of education and experience that provides the applicant with knowledge equivalent to a major in of such fields.

Certifications & Licenses

All Levels:

CISSP and/or other security certifications preferred.

Work Experience

Level 2

Minimum of two years (in excess of degree requirements stated above) of progressively responsible experience in IT security.

Level 3:

Minimum of five years (in excess of degree requirements stated above) of progressively responsible experience in IT security.

Senior:

Minimum of eight years (in excess of degree requirements stated above) of progressively responsible experience in IT security.

Are you an ERCOT Employee? If so please log in to Workday to apply.

More Jobs Like This