JOB DESCRIPTION
Provides support in solving all phases of a large and complex Critical Infrastructure Security (CIS) program. Provides a full range
of analytic duties using knowledge of multidisciplinary security concepts, principles and practices applicable to security
administration. Responds to, and reports on, IT security incidents, providing initial assessment of impact severity and types of incidents being addressed.
Performs periodic operating system and application security assessments of simple-to-moderate complexity and review for evidence of vulnerability or compromise and assisting with the implementation of resolution. Monitors computing resources for evidence of compromise and report security incidents.
- Understands and applies principles, theories and concepts related to the profession and ERCOT's culture.
- Exercises judgment within defined procedures and practices to determine appropriate action.
- Impact is generally limited to specific assignments or projects.
- May respond to inquiries and/or provide assistance and/or guidance to lower-level workers.
ADDITIONAL JOB DUTIES
Cyber Security Analyst Senior
- Implements, monitors and maintains preventive and detective controls
- Monitors computing resources for evidence of compromise and report security incidents
- Analyzes compromised computing resources of routine to moderate complexity, to assist in improving security design and policy compliance, and to understand and document new threat profiles
- Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems
- Researches, analyzes, designs, tests and implements new or vendor supplied security software solutions
- Provides up to date documentation and procedures on security software product administration
- Assists in the development of technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
- Works as a member of the Incident Response Team and perform analysis of security breaches
- Studies and grows current knowledge of security issues
- Supports the development, documentation, deployment, review and maintenance of information security policies
- Communicates information security requirements and principle
- Ensures compliance with security related regulatory and corporate requirements
- Designs cyber security monitoring program, including technologies and processes
- Investigates and analyzes computing resources for evidence of compromise and reports security incidents
- Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls
- Functions as a member in the security group's Incident Response Team
- Analyzes complex compromised computing resources to improve security design and policy compliance, and to anticipate and prevent new threat profiles
- Develops and defends new technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures
- Performs periodic and complex operating system and application security assessments to determine the likelihood of vulnerability or compromise, and prepares possible resolutions for implementation
- Analyzes security breaches
- Expands expert knowledge of security issues
- Reports issues to the department personnel responsible for the resource
- Serves as a mentor for junior security teammates
- Conducts incident response activities for security incidents involving major cloud service providers such as AWS, Azure, and GCP, ensuring timely and effective resolution
- Produces and presents compelling security-related training content
- Creates and consistently delivers awareness material promoting security awareness
EXPERIENCE
- Requires minimum 5 years job related work experience in excess of degree requirements
EDUCATION
- Bachelor's Degree: Cyber Security, Computer Science, MIS, or related discipline (Preferred)
- or a combination of education and experience that provides equivalent knowledge to a major in such fields is required
CERTIFICATION
- CISSP Certified Information Systems Security Professional (Preferred)
- Additional Preferred Certs: GSEC, GCIH, GCIA, GREM, GCFR and/or GCTD
Electric Reliability Council of Texas
Texas United States
www.ercot.com