IT Security Analyst 1 – 5 TX
Job Summary
Primary responsibility involves monitoring, detecting, protecting and maintaining the security of data, systems and networks. Plans, configures, designs, develops, implements and maintains tools, systems and procedures to ensure the integrity, reliability and security of data, systems and networks.
| Job Title | IT Security Analyst 1 TX | IT Security Analyst 2 TX | IT Security Analyst 3 TX | IT Security Analyst 4 TX | IT Security Analyst 5 TX |
|---|---|---|---|---|---|
| Job Code | 5351 | 5352 | 5353 | 6365 | 6366 |
| Bargaining Unit | TX | TX | TX | TX | TX |
| FLSA | Non-Exempt | Non-Exempt | Exempt | Exempt | Exempt |
| Generic Scope | Entry-level professional with limited prior experience; learns to use professional concepts to resolve problems of limited scope and complexity; works on assignments that are initially routine in nature, requiring limited judgment and decision making. Employees at this level are expected to acquire the skills and knowledge to perform more advanced work following an agreed upon time in position, through defined training and development planning. | Professional who applies acquired job skills, policies, and procedures to complete substantive assignments / projects / tasks of moderate scope and complexity; exercises judgment within defined guidelines and practices to determine appropriate action. | Experienced professional who knows how to apply theory and put it into practice with in-depth understanding of the professional field. Independently performs the full range of responsibilities within the function; possesses broad job knowledge; analyzes problems / issues of diverse scope and determines solutions. | Technical leader with a high degree of knowledge in the overall field and recognized expertise in specific areas; problem-solving frequently requires analysis of unique issues / problems without precedent and / or structure. May manage programs that include formulating strategies and administering policies, processes, and resources; functions with a high degree of autonomy. | Recognized organization-wide expert. Has significant impact and influence on organizational policy and program development. Regularly leads projects of critical importance to the organization; these projects carry substantial consequences of success or failure. Directs programs with organization-wide impact (or may have impact beyond the University) that include formulating strategies and administering policies, processes, and resources. Significant barriers to entry exist at this level. |
| Custom Scope | Under supervision applies basic IT security concepts, campus, medical center or Office of the President policies and procedures to resolve routine security problems. Works on problems of limited scope. Follows standard IT security practices and procedures in analyzing situations or data from which answers can be readily obtained. This title is bargaining unit only. There should never be an uncovered position. | Applies moderately complex IT security concepts, campus, medical center or Office of the President policies and procedures to resolve a variety of IT security problems. Works on IT security problems and projects of moderate scope where analysis of situations or data requires a review of a variety of factors. This title is bargaining unit only. There should never be an uncovered position. | Applies skills as a seasoned, experienced IT security professional with a full understanding of industry practices, governmental regulations and campus, medical center or Office of the President policies and procedures to resolve a wide range of complex issues. Demonstrates competency in recommending methods and techniques to obtain results. This title is bargaining unit only. There should never be an uncovered position. | Applies advanced IT security concepts and campus, medical center or Office of the President objectives to resolve broad and / or highly complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Selects methods, techniques and evaluation criteria to obtain results. Typically, the bargaining unit job code should be used for work covered by this title. However, if the position is not covered by the Higher Education Employer-Employee Relations Act (HEERA) due to one of the following reasons—(1) Confidential status, where duties normally require access to confidential information that significantly influences the development of management’s bargaining or grievance positions; (2) employed outside of California at a location with 100 or fewer employees; or (3) Supervisory status, where duties include supervising employees as a regular part of the job—then the position should be listed under the generic title without the “TX” ending. | Having wide-ranging experience in IT security applications, applies professional concepts and campus, medical center or Office of the President objectives to resolve campuswide, medical center or Office of the President, institution-wide and / or multi-institutional security issues, up to and including the most complex, with little or no precedent where analysis of situations and data requires an in-depth evaluation of various factors. Directs the selection of methods, techniques and evaluation criteria to obtain results. Serves in a lead capacity. Considered subject matter expert at this level. Typically, the bargaining unit job code should be used for work covered by this title. However, if the position is not covered by the Higher Education Employer-Employee Relations Act (HEERA) due to one of the following reasons—(1) Confidential status, where duties normally require access to confidential information that significantly influences the development of management’s bargaining or grievance positions; (2) employed outside of California at a location with 100 or fewer employees; or (3) Supervisory status, where duties include supervising employees as a regular part of the job—then the position should be listed under the generic title without the “TX” ending. |
| Key Resp 01 | Implements basic security controls to prevent unauthorized access or changes to campus, medical center or Office of the President information, hardware, software and / or network infrastructure. Assists in researching attempted efforts to compromise security protocols under the oversight of more experienced analysts. May involve basic log review and event classification under guidance. | Implements moderately complex security controls to prevent unauthorized access or changes to campus, medical center or Office of the President information, hardware, software and / or network infrastructure. Researches and analyzes attempted efforts to compromise security protocols and reports findings to higher-level IT Security Analysts. Reviews logs and classifies events. | Implements complex and / or moderate-scale security controls to prevent unauthorized access or changes to campus, medical center or Office of the President information, hardware, software and / or network infrastructure. Independently researches, analyzes and addresses attempted efforts to compromise security protocols. Advises departments on security prevention and best practices. | Implements highly complex and broad-scale security controls to prevent unauthorized access or changes to institutional information, hardware, software and network infrastructure. Responsible for providing research, analysis and solutions to address attempted efforts to compromise security protocols. Proactively mitigates the impact of theft, destruction, alteration, or denial of access to information. Advises IT staff on security prevention, best practices, and secure software. | Implements broad, institution-wide or multi-institutional security controls—up to the most complex—to prevent unauthorized access or changes to mission-critical information, hardware, software, and network infrastructure. Lead the response to the most significant attempted security reaches and most complex threats. Collaborates with senior and IT management to develop security plans to prevent theft, destruction, alteration, or denial of access to information. Serves as an expert on security best practices, secure software, and hardware design. Works to establish institution-wide security policies and standards. |
| Key Resp 02 | Administers security policies to control access to systems in compliance with well-defined procedures and processes, maintains basic security configurations and applies basic encryption methods. | Applies and may configure and maintain security systems. Administers security configurations to control access to systems applying appropriate encryption methods. | Applies, configures and manages complex security systems. Administers security configurations to control access to hardware, software and networks. Applies advanced encryption methods. | Designs and maintains highly complex security systems. Administers security policies and configurations to control access to hardware, software and networks. Applies and recommends advanced encryption methods. | Directs design, maintenance and administration of security systems and policies across the campus, medical center or the Office of the President. Leads the selection and application of encryption methods and participates in relevant security policy committees. |
| Key Resp 03 | Collects information according to incident response procedures. | Assists in analyzing security incidents and applies professional IT security concepts and policies to respond and escalate issues appropriately. | Analyzes security incidents, reports findings to management, and applies advanced security concepts, regulations, and policies to respond to and appropriately escalate complex IT security issues and incidents. | Leads forensic investigations and reports on complex security incidents, ensuring compliance with policies. Applies advanced security concepts, regulations, and institutional procedures to inform and improve incident response processes. | Leads incident response and forensic processes across campus, medical center, or the Office of the President, including managing the Incident Response Team. Collaborates with senior IT management to define incident response procedures. |
| Education | Bachelor’s degree in related area and / or equivalent experience / training | Bachelor’s degree in related area and / or equivalent experience / training | Bachelor’s degree in related area and / or equivalent experience / training | Bachelor’s degree in related area and / or equivalent experience / training | Bachelor’s degree in related area and / or equivalent experience / training |
| Special Condition | Exercise the utmost discretion in managing sensitive information learned in the course of performing their duties. Sensitive information includes but is not limited to employee and student records, health and patient records, financial data, strategic plans, proprietary information, and any other sensitive or non-public information learned during the course and scope of employment. Understands that sensitive information should be shared on a limited basis and actively takes steps to limit access to sensitive information to individuals who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks. The unauthorized or improper disclosure of confidential work-related information obtained from any source on any work-related matter is a violation of these expectations. | Exercise the utmost discretion in managing sensitive information learned in the course of performing their duties. Sensitive information includes but is not limited to employee and student records, health and patient records, financial data, strategic plans, proprietary information, and any other sensitive or non-public information learned during the course and scope of employment. Understands that sensitive information should be shared on a limited basis and actively takes steps to limit access to sensitive information to individuals who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks. The unauthorized or improper disclosure of confidential work-related information obtained from any source on any work-related matter is a violation of these expectations. | Exercise the utmost discretion in managing sensitive information learned in the course of performing their duties. Sensitive information includes but is not limited to employee and student records, health and patient records, financial data, strategic plans, proprietary information, and any other sensitive or non-public information learned during the course and scope of employment. Understands that sensitive information should be shared on a limited basis and actively takes steps to limit access to sensitive information to individuals who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks. The unauthorized or improper disclosure of confidential work-related information obtained from any source on any work-related matter is a violation of these expectations. | Exercise the utmost discretion in managing sensitive information learned in the course of performing their duties. Sensitive information includes but is not limited to employee and student records, health and patient records, financial data, strategic plans, proprietary information, and any other sensitive or non-public information learned during the course and scope of employment. Understands that sensitive information should be shared on a limited basis and actively takes steps to limit access to sensitive information to individuals who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks. The unauthorized or improper disclosure of confidential work-related information obtained from any source on any work-related matter is a violation of these expectations. | Exercise the utmost discretion in managing sensitive information learned in the course of performing their duties. Sensitive information includes but is not limited to employee and student records, health and patient records, financial data, strategic plans, proprietary information, and any other sensitive or non-public information learned during the course and scope of employment. Understands that sensitive information should be shared on a limited basis and actively takes steps to limit access to sensitive information to individuals who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks. The unauthorized or improper disclosure of confidential work-related information obtained from any source on any work-related matter is a violation of these expectations. |
| Special Condition | Must pass a background check. | Must pass a background check. | Must pass a background check. | Must pass a background check. | Must pass a background check. |
| KSA 01 | Ability to read and interpret security logs. | Skilled with reading and interpreting security logs. Experience analyzing logs for security breaches. | Proven ability to read and interpret security logs. Skilled at analyzing logs for security breaches. | Advanced experience using IT security systems and tools. | Expert knowledge of secure hardware, software and network design techniques. Recognized as subject matter expert. |
| KSA 02 | Ability to apply security controls appropriately to computer hardware and operating systems. | Demonstrated skills applying security controls to computer software and hardware. | Demonstrated ability in administering complex security controls and configurations across hardware, software and networks. | Advanced ability to administer complex security controls and configurations across hardware, software, and networks. | Proven expertise in configuring and managing complex security controls across hardware, software, and networks. |
| KSA 03 | Interpersonal skills to collaborate effectively with technical and non-technical personnel. | Interpersonal skills to effectively collaborate with technical and non-technical personnel at all organizational levels. | Strong interpersonal skills enabling effective collaboration with technical and non-technical personnel across the organization. | Excellent interpersonal skills, with the ability to influence stakeholders and collaborate with senior leaders. | Exceptional interpersonal skills to successfully manage IT teams and collaborate with senior management. |
| KSA 04 | Basic knowledge of other related areas of IT. | Experience using IT security systems and tools. Knowledge of data encryption techniques. | Proven experience in selecting and implementing suitable data encryption technologies. | Advanced knowledge in data encryption technologies with proven experience selecting and implementing suitable encryption technologies. | Expert knowledge of data encryption technologies with proven experience in selecting and implementing suitable encryption solutions. |
| KSA 05 | Ability to follow departmental processes and procedures. | Basic knowledge of incident response procedures. | Skilled in incident response and digital forensics including data collection, examination and analysis. | Highly skill in incident response and digital forensics, including data collection, examination, analysis, and interpretation. | Expertise in incident response and digital forensics, including detailed reporting. |
| KSA 06 | Ability to follow departmental processes and procedures. | Knowledge of computer hardware, software and network security issues and approaches. | Highly skilled at analyzing complex security incidents, identifying root causes, and developing targeted mitigation strategies to prevent recurrence. | Expertise in analyzing and proactively preventing high-complexity security incidents with precision and efficacy. | |
| KSA 07 | In-depth knowledge of computer hardware, software and network security issues and approaches. | Expert knowledge of computer hardware, software and network security issues and approaches. | |||
| KSA 08 | Advanced knowledge of secure hardware, software and network design techniques. | Expertise in IT security, including the design and development of comprehensive, complex security policies and procedures. | |||
| KSA 09 | Extensive knowledge of IT systems and technologies, with a deep understanding of their applications and intricacies. | ||||
| Environment | Campus, medical center or other university setting and various external venues. | Campus, medical center or other university setting and various external venues. | Campus, medical center or other university setting and various external venues. | Campus, medical center or other university setting and various external venues. | Campus, medical center or other university setting and various external venues. |