USNLX Ability Jobs

USNLX Ability Careers

Job Information

STATE COMPTROLLER OF PUBLIC ACCOUNTS Comptroller - Security DevOps Analyst III in Austin, Texas

Please paste the following URL into a browser to view the entire job posting in the CAPPS Career Section: https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00044299 You may apply to the job directly through the CAPPS Career Section. It is not necessary to apply both through Work In Texas and CAPPS Career Section

Applications must be filed at:https://capps.taleo.net/careersection/ex/jobdetail.ftl?job=00044299 Please note that this job posting can be closed without notice and earlier than the closing date indicated in the posting if a suitable candidate is found. We encourage applicants to submit and complete the application promptly. Are you ready to grow, make a positive impact?If you are seeking to gain knowledge, build your career, and network among goal-oriented professionals, this is the place for you! Innovation, collaboration, and a commitment to excellence best describes the culture here at the Comptrollers Office. We take pride in the work we do serving as Texas' accountant, tax collector, treasurer, and much more! The Comptrollers office serves virtually every citizen in the state. As Texas chief tax collector, accountant, revenue estimator, treasurer and purchasing manager, the agency is responsible for writing the checks and keeping the books for the multi-billion-dollar business of state government. Our agency workforce is as diverse as the people of Texas we serve. We value our employees and take very seriously our collective commitment to public service.Personal development opportunities are strongly encouraged through available workshops, teambuilding exercises, and on the job training. We offer flexible scheduling that helps employees maintain a healthy work-life balance. Clickhereto see an inside look at the Texas Comptrollers office! ABOUT THE Division General descriptionThe Information Technology division is looking for a DevOps professional interested in a cybersecurity role. This person will join our Security and Planning team, perform security oversight for our container and build pipeline configurations, help develop security practices for software development, contribute to monitoring and analysis, and work within our Vulnerability Management program. The team is looking for someone who is security focused, results-driven and dedicated to solving technical issues that arise on a day-to-day basis. Apply to join if you are motivated, detail-oriented, honest and customer friendly. Work HoursThe position works an eight-hour schedule between 7:00 am and 6:00 pm, 40-hour week, Monday Friday with occasional work schedule variance as necessary. Hours may change based on business need. Teleworking may be considered if certain working conditions are met. The candidate must have permanent residency within the state of Texas and must be able to meet in office requirements, which can vary among different sections (i.e. report to office 1-3 days/week, etc.). Travel reimbursements are not provided for teleworking. Qualifications: Minimum Qualifications Bachelors degree. Six (6) years of experience in cybersecurity analysis, information security analysis, or container orchestration platforms.. Preferred Qualifications Bachelors degree in information technology security, computer information systems, computer science, management information systems, or a related field. Experience in DevOps or DevSecOps with a strong focus on security. Experience in code analysis, API integration or application security testing. Substitutions One (1) additional year of experience in information security analysis work may substitute for thirty (30) semester hours of educational requirement with a maximum substitution of 120 semester hours (four years). Cybersecurity certifications such as, GCSA, CISSP, CDP or any related cybersecurity certificates may substitute for one (1) year of the minimum experience requirement. LICENSES / CERTIFICATIONS (Required)CISSP, GCSA, CCSP, DevSecOps certificates or any related cyb rsecurity certificates. In this role you will: Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and container and container cluster systems. Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use. Monitors network-based application traffic and flow for analysis. Performs cybersecurity incident detection, analysis, and prevention in build pipelines and code analysis. Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses. Researches and analyzes cybersecurity threat indicators and their behaviors, and recommends threat mitigation strategies. Oversees the implementation of continuous automated security compliance capabilities. Oversees the modifications and monitoring of application configuration and data files to incorporate new software and virus protection systems, correct errors, or change individual access status. Monitors and Analyzes cybersecurity alerts and vulnerabilities from regulators, advisories, vendors, and cybersecurity tools. Evaluates network and system security configuration for best practices and risk-based access controls. Develops processes, procedures, monitoring and metrics to measure the effectiveness of security operations activities and leads towards process maturity. Serve as a technical lead on projects as necessary. Identifies and evaluates new cybersecurity technologies to remediate vulnerabilities. Advises management and users regarding security procedures. Implements and maintains enterprise security systems including software composition analysis (SCA), application security orchestration and correlation (ASOC), cloud workload protection platform (CWPP), application security requirements and threat management (ASRTM), vulnerability scanners and ensure integration capabilities with security tools. Deploys and tests security tools applied to information systems intended to protect against cyber threats. Provides system support to prevent security incidents, including coordination of immediate corrective action to systems known to have any security weaknesses or vulnerabilities, including network isolation, re-configuration and installing appropriate patches or upgrades. Troubleshoots systems problems related to network, security, infrastructure, and application information systems. Supports the implementation of computer system security plans with agency personnel and outside vendors. Provide ongoing monitoring of sources of potential threats and vulnerabilities, including hacker web sites, anti-virus vendors, other government agencies and trade publications. Performs related work as assigned. Maximize Your Earnings! At the Comptroller's office, we know potential employees are looking for more than just a paycheck. The agency offers a strong benefits package for you and your family. Insurance, retirement plans, and a flexible work schedule are just the start.See our benefits offering If you are seeking to gain knowledge, build your career, and network among goal-oriented professionals, this is the place for you! Important Note to the Candidate: Salary is contingent upon qualifications. If you are scheduled for an interview and require any reasonable accommodation in our interview process, please inform the hiring representative who calls you to schedule your interview. Whenever possible, please give the hiring representative sufficient time to consider and respond to your request. MILITARY PREFERENCE To receive MILITARY PREFERENCE, you are required to provide proof by attaching the necessary documentationto this job application. http

DirectEmployers