Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Weld County Government IT Security Analyst in Greeley, Colorado

What does working for Weld County Government offer you, aside from a fun, dynamic, innovative career? As a county, we value work-life balance and you're seen as someone who brings a lot to the table in and outside of being an employee. Join Team Weld help make a difference!

The Weld County Information Technology Department is recruiting for an IT Security Analyst. The IT Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

$93,262.03 - $118,141.55 annually plus benefits (see benefit tab). This position will start at $93,262.03 annually.

This position is exempt from the minimum wage and overtime requirements of the Fair Labor Standards Act and is therefore ineligible for overtime pay.

As an applicant for this position, you should be aware of Senate Bill 19-085, the Equal Pay for Equal Work Act. The act requires employers to announce the pay range for job openings. This range encompasses the nine pay steps that Weld County Government has available should you earn the position and demonstrate satisfactory performance over time.

OPEN UNTIL FILLED

Essential Duties and Responsibilities The following job duties are established to outline the basic duties and responsibilities of the above captioned position. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.

Strategy & Planning (20%): - Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate. - Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate. - Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Security Manager, where appropriate.

Acquisition & Development (10%): - Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. - Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. - Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.

Operational Management (60%): - Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). - Maintain operational configurations of all in-place security solutions as per the established baselines. - Monitor all in-place security solutions for efficient and appropriate operations. - Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution. - Participate in investigations into problematic activity. - Participate in the design and execution of vulnerability assessments, penetration tests, and security audits. - Provide on-call support for end users for all in-place security solutions.

Other Duties as Assigned (10%): - Follow policies and procedures, the Weld County Code of Conduct and adhere to strict confidentiality guidelines and appropriate release of information outlined in both. - Not all duties mentioned may be applicable to every position, and the examples provided do not encompass all possible duties that may exist within this job classification.

Qualifications REQUIRED QUALIFICATIONS: - Bachelor's degree in in the field of computer science or equivalent work experience AND; - 2 years of experience with enterprise information security. - Candidate must pass a background check prior to employment start date.

REQUIRED LICENSES/CERTIFICATIONS: - One or more of the following certifications: CompTIA Security+ EC-Council Certified Ethical Hacker... for full information follow appliation link.

DirectEmployers