Tallo logoTallo logo

INFORMATION SECURITY ANALYST

Job

The University of Texas Rio Grande Valley

Alamo, TX (In Person)

Full-Time

Posted 1 day ago (Updated 5 hours ago) • Actively hiring

Expires 6/5/2026

Apply for this opportunity

This job application is on an outside website. Be sure to review the job posting there to verify it's the same.

Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
87
out of 100
Average of individual scores

Were these scores useful?

Skill Insights

Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.

Job Description

Posting Details Position Information Posting Number
SRGV8934
Working Title
INFORMATION SECURITY ANALYST
Number of Vacancies 1 Location Rio Grande Valley, Texas Department Information Security FTE 1.0 FLSA Exempt Scope of Job Responsible for assisting with the development, implementation, monitoring and support of digital access control, data confidentiality, system integrity, system reliability, system audit, recovery methods and procedures. Ensures the university is in compliance with UT System policies as well as state and federal statutes and regulations. Description of Duties Assists with the development, implementation, monitoring and support of digital access control, data confidentiality, system integrity, system reliability, system audit, recovery methods and procedures. Analyzes the various security solutions and the identification, investigation and resolution of security events detected by those systems. Supports the university information technology security program for compliance with UTS 165 and TAC 202. Works with information technology network security to resolve incidents and escalates complex issues to management as appropriate. Provides information and consultation to the university community on information security issues related to university information systems to ensure security controls are appropriate and operating as intended. Participates in the response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents. Supports security equipment to ensure proper operation including configurations, upgrades, installations including reviewing all IT procurement to ensure compliance with security provisions and system specifications. Provides standard technical assistance in the selection, configuration, deployment and maintenance of security products as needed. Provides risk assessment assistance for procurements. Keeps current with IT network security, to aid in disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities. Keeps current with advancements in information security related subjects, and participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and provides information for campus departmental IT staff. Assists in developing and preparing documentation, including security policies and procedures, security notifications and alerts. Disseminates timely security sensitive information and security alerts via email to the university community. May participate in new employee orientation to present information on security policies and procedures. Proactively identifies opportunities for improvement in the availability and security of information through process improvement and/or information technology. Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc. Keeps abreast and ensures compliance with any UT System policy changes and or updates as they apply to the institution. Perform other related duties as assigned. Supervision Received General supervision from assigned supervisor. Supervision Given May supervise assigned staff. Required Education Bachelor's degree in information security, information technology, computer sciences, or closely related field from an accredited university. Preferred Education Bachelor's degree in Computer Science, Information Systems, Information Assurance, or related field from an accredited university.
Licenses/Certifications Preferred:
GIAC Security Essentials Certification (GSEC), or Certified Ethical Hacker (CEH), or Security+, or similar certification. Required Experience Two (2) years of relevant IT security, IT operations and/or IT audit experience to include experience with computer hardware and system software, knowledge of host/network common vulnerabilities and exploits (CVEs), hacker methodologies and tactics and tools used, basic networking concepts, protocols (TCP/IP), or Bachelor's degree in unrelated field with three (3) years of the required experience. Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis. Preferred Experience Experience in configuring, deploying, or monitoring security infrastructure or tools. Knowledge of standard concepts, practices, and procedures for security operation centers. Equipment Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment. Working Conditions Needs to be able to successfully perform all required duties. Office environment; some travel and weekend work is required. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Other Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Exceptional planning and organizational skills. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP. To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position. Physical Capabilities N/A Employment Category Full-Time Minimum Salary Commensurate with Experience Posted Salary Commensurate with Experience Position Available Date 04/29/2026 Grant Funded Position No If Yes, Provide Grant Expiration Date Posting Detail Information EEO Statement It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.

Similar remote jobs

Similar jobs in Alamo, TX

Similar jobs in Texas