Information Security Analyst Law Enforcement & Security - Bloomington, IN at Geebo

Information Security Analyst

Department
UITS ACADEMIC TECHNOLOGY SUPPO (UA-CATS-IUBLA)
Department Information
At University Information Technology Services (UITS) we provide the technology, tools, and services you need to succeed. UITS supports IU's vision for excellence in research, teaching, outreach, and lifelong learning. We ensure a workplace that encourages growth, flexibility, and creativity, as well as a culture that champions inclusion, diversity, and overall employee well-being through programs supported university wide. As an Equal Opportunity Employer, we believe in each person's potential, and we'll help you reach yours.
The UITS Academic Technology Support's College Information Security and Policy Office (CISPO) helps educate, train, and assist in addressing cyber security risks within the College of Arts
Sciences (COLL) and the Office of the Vice President for Diversity, Equity and Inclusion (OVPDEI). CISPO helps to ensure that institutional information technology risks are assessed, prioritized, and managed on an ongoing basis to ensure operational; reputational; and regulatory risks to the institution; institutional assets; and varied stakeholders.
Job Summary
Department Specific Responsibilities
  • Works independently and performs analysis of cybersecurity risk on supported systems, software, and networks.
  • Develops alerts, notifications, and other information products based on that analysis.
  • Collects, analyzes, and disseminates analysis regarding software vulnerabilities, risks to network and systems infrastructure, and relevant threats.
  • Responds to requests for security analysis; write reports, papers, or other products as required.
  • Develops information products.
  • Develops and maintains security processes and supporting tools to improve the field of cybersecurity generally, and within the communities we serve.
  • Gives presentations and trainings, writes papers and other training materials.
  • Responds to cybersecurity incidents that affect supported networks or that have widespread impact.
  • Responds to incidents of computer security breaches and other incidents involving the use of technology and provides advice to and/or participates in the collection of technical evidence as required.
  • Designs and carries out cybersecurity exercises to test responses in simulated scenarios, internal to the University or with external partners.
  • Attends departmental meetings to help guide IT initiatives, collaborating with appropriate teams as needed.
  • Contributes to cybersecurity policies and practices for team members or outside collaborators, understanding the security needs of devices, networks, and software, which may be novel, and communicates relevant information to collaborators who are not themselves cybersecurity experts.
  • Undertakes professional development to advance skills in support of the University activities.
General Responsibilities
  • Performs ongoing experienced analysis and monitoring of technology environments to identify security exposures and potential threats.
  • Assesses and determines level of risk in order to provide threat information, as well as to advise and/or recommend protections and solutions, to security leadership and department decision-makers.
  • Documents information security analysis efforts.
  • Researches and stays abreast of current higher education security environment and trends; stays up-to-date on security analysis and monitoring best practices, tools, and approaches.
  • Responsible for communication, awareness and training efforts for faculty, staff and student population through the creation of informational bulletins, best practices.
  • Works closely with security engineers to ensure exposures and risks are avoided and/or addressed.
  • Contributes to incident response investigations and assists with disaster recovery and business continuity efforts.

Qualifications
This position is posted at the Career Level but may be filled at the Core Level depending on the candidate's qualifications. Although they will be similar, the duties and responsibilities may differ if filled at the lower rank. Please see the qualifications for each level listed below.
Career Level Requirements
Combinations of related education and experience may be considered. Education beyond the minimum required may be substituted for work experience. Work experience beyond the minimum required may be substituted for education.
EDUCATION
Required
  • Bachelor's degree (preferably in computer science or related field)
WORK EXPERIENCE
Required
  • 2 years of information security or related experience
SKILLS
Required
  • Proficient communication skills
  • Maintains a high degree of professionalism
  • Demonstrates time management and priority setting skills
  • Demonstrates a high commitment to quality
  • Possesses flexibility to work in a fast paced, dynamic environment
  • Seeks to acquire knowledge in area of specialty
  • Highly thorough and dependable
  • Demonstrates a high level of accuracy, even under pressure
  • Demonstrates in-depth knowledge of Microsoft Windows or Unix-like operating systems
  • Attention to detail in communicating technical issues and implementing solutions
  • Mental discipline in conducting lengthy investigations
Core Level Requirements
Combinations of related education and experience may be considered. Education beyond the minimum required may be substituted for work experience. Work experience beyond the minimum required may be substituted for education.
EDUCATION
Required
  • Bachelor's degree (preferably in computer science or related field)
WORK EXPERIENCE
Preferred
  • Some experience in information security or related experience
SKILLS
Required
  • Proficient communication skills
  • Maintains a high degree of professionalism
  • Demonstrates time management and priority setting skills
  • Demonstrates a high commitment to quality
  • Possesses flexibility to work in a fast paced, dynamic environment
  • Seeks to acquire knowledge in area of specialty
  • Demonstrates in-depth knowledge of Microsoft Windows or Unix-like operating systems
  • Attention to detail in communicating technical issues and implementing solutions

Working Conditions / Demands
This role requires the ability to effectively communicate and to operate a computer and other standard office productivity equipment. The position involves sedentary work as well as periods of time moving around an office environment and the campus. The person in this role must be able to perform the essential functions with or without an accommodation.
Work Location
This position is a work on campus role with eligibility for some remote work, subject to change in the future based on Indiana University policy and business needs.
Benefits Overview
For full-time staff employees, Indiana University offers a wide array of benefits including:
  • Multiple plan options for medical insurance
  • Dental insurance
  • Health Savings Account with generous IU contribution
  • Life insurance, LTD, and AD&D options
  • Base retirement plan contribution from IU, subject to vesting
  • Additional supplemental retirement plan options
  • Tuition benefit for IU classes
  • 10 paid holidays per year
  • Generous Paid Time Off
  • Paid Parental Leave
  • Employee Assistance Program (EAP)
Learn more about our benefits by reviewing our online Benefits Brochure.
Job Classification
Career Level: Career
FLSA: Exempt
Job Function: Information Technology
Job Family: IT Security & Privacy
Click here to learn more about Indiana University's Job Framework.
Posting Disclaimer
This posting is scheduled to close at 11:59 pm EST on the advertised Close Date. This posting may be closed at any time at the discretion of the University, but will remain open for a minimum of 5 business days. To guarantee full consideration, please submit your application within 5 business days of the Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.