Johnson Service Group is hiring: Cybersecurity Analyst Sr in Austin
Johnson Service Group, Austin, TX, US
Job Description
**This is a contract position. If our client wants to hire you, you'll work as an employee of Johnson Service Group hybrid / on-site in Austin, TX.**
· Details:
o Hours M-F 8-5
o Hybrid T/W/Th
o Work involves weekends, holidays and non-standard hours
o Work involves providing 24/7/365 on-call support on a rotating basis
o Work involves traveling and lodging out of town
REQUIRED Experience
- 9+ years of experience in cybersecurity or relevant experience.
- A degree(s) in information technology, computer science or relevant field may be substituted per LCRA guidelines for certain years of experience.
- Driver’s license
REQUIRED Soft Skills
- confidentiality
PREFERRED
- CISSP, GIAC or similar certification Knowledge
- Knowledge of business continuity planning and disaster recovery
- knowledge of anti-virus and anti-spam technologies
- Knowledge of technology asset management
- Knowledge of technology hardware and software platforms and systems
- Skill in analytical and technical documentation
- Skill in verbal and written communication
- Skill in articulating complex, technical information to both technical and non-technical audiences
- Skill in analyzing significant volumes of detailed information and understanding the security implications
- Skill in understanding complex systems across diverse technical platforms
- Intermediate skill level in Microsoft office and software update tools
- Advanced skill level in network security and web filtering software
- Advanced skill level in security vulnerability scanning tools
- Ability to balance and manage competing high priority work demands
- Ability to build relationships and foster teamwork
- Ability to work in a team environment
- Ability to conduct sensitive security investigations and maintain confidentiality
-
Job Description
At a senior level, maintains and operates a variety of security measures and software that perform cybersecurity functions such as access control, monitoring or vulnerability assessment. Provides support to the end-user community and ensures they have up-to-date protection from malicious software and other cyber threats. Tests and recommends security measures to remediate and mitigate risk. Provides reports and other information related to information security issues as requested by management and other groups. Performs evaluation and analysis of security applications and systems and makes recommendations to management. Recommends best practices to ensure system security across the enterprise. This position utilizes in-depth knowledge of best practices and experience in own discipline to provide and improve services. Takes a new perspective to solve complex problems. Works independently and receives minimal guidance. Acts as a resource for colleagues with less experience. May direct the work of other staff members.
- Performs risk assessments and recommends security measures.
- Monitors security systems for possible intrusion.
- Interacts with end users concerning malware, spam, vulnerabilities and any other cybersecurity issues.
- Reviews and creates audit reports on user and system activities.
- Reviews system generated logs for anomalies and takes appropriate actions.
- Actively probes the network for new threats and risks.
- Documents, deploys, reviews and maintains cybersecurity policies, standards, guidelines and procedures.
- Plans and implements cybersecurity technology projects.
- Provides business continuity/disaster recovery and risk analysis expertise.
- Monitors security alerts on the internet and other intelligence feeds and determines whether reported threats could impact LCRA information technology or operational technology systems.
- Provides technical consulting to other groups on cybersecurity requirements.
- Implements and ensures technical security systems including SIEM, VAT, network IDS, antivirus, web and email filters and firewalls.
- Performs cybersecurity incident response activities.
- Documents and maintains objective evidence to demonstrate NERC CIP regulatory compliance.
- Creates and delivers security training materials and classes for asset owners, software developers and system administrators.
- Provides oversight regarding compliance with security regulations, standards and laws.
- Works with the NERC Compliance Department and Cybersecurity Department to ensure that the necessary processes and procedures applicable to each NERC CIP system are developed and implemented within their respective group; reviews projects relating to the NERC CIP systems which may have a regulatory impact, and makes sure the drawings and documents for that system are updated and stored as required; coordinates NERC compliance implementation, communication, and ensures that users of the respective systems have the necessary training; continually monitors implementation efforts and reporting potential violations to the NERC Compliance Manager and respective management; communicates with the Cybersecurity Manager concerning cybersecurity concerns or actual incidents; and maintains documentation of objective evidence, including Reliability Standard Audit Worksheets (RSAWs) to demonstrate NERC CIP regulatory compliance.
Johnson Service Group, Inc. (JSG) is a North American leader in the staffing and consulting services industry, with 40 years of experience investing in people and companies. We are always looking for great people to join our team—we want to see your success here at JSG! We can be found locally in more than 30 offices throughout the United States and Canada. JSG continues to work diligently to offer our clients and candidates world-class service and diversified offerings to fit their evolving needs.
We offer medical, dental, vision, life insurance options, paid time off, sick time, 401(k), weekly pay, and more.
Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law.