Information Technology Department
Web Site: (new browser window will open)
Job Listing URL: (new browser window will open)
$50,000 - $69,999
ob ID: 3013585
Closing date: 07/28/19
Location: Bismarck, ND
Full/Part Time: Full-Time
Salary Range: $5299-$8831
Hiring Range: $5299-$7065
(Commensurate with experience; compensation package includes employer paid family health care, generous pension plan, paid vacation and sick leave)
Summary of Work
The Cyber Security (CYBER) Analyst III will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations. The CYBER Analyst will perform tasks including The CYBER Analyst should have familiarity with the principals of network and endpoint security, current threat and attack trends, and have a working knowledge of security principals such as defense in depth.
•Monitor logs, review alerts, and identifying and escalating incidents that occur on the network or endpoint that require higher-level support.
•Assess the latest security alerts to determine implications and urgency.
•Collaborate with other teams to assess risk and develop improvement strategies for security posture.
•Stay up-to-date with current vulnerabilities, attacks, and countermeasures.
•Anticipate program challenges and risk scenarios and prepare, lead, and execute proactive response strategies to ensure optimal results.
•Maintain security measures and operate software to protect systems and information infrastructure.
•Participate in projects specific to Security Operations Center roadmap
•Review current security system definitions for correctness; monitor, report and investigate access to determine unauthorized access attempts; provide continuous testing of systems for situations requiring corrective action.
•Leverage understanding of Operating Systems (Windows, Unix/Linux, and OSX) in support of identifying security incidents and to have a proper overview of risk profile.
•Executes analysis of email based threats to include understanding of email communications, platforms, headers, transactions, and identification of malicious tactics, techniques, and procedures.
•Utilize and adhere to defined workflow and processes driving the Threat Monitoring and escalation/handoff actions.
•Analyze potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalation.
•Processes tactical mitigations based on results of analysis and determination of threat validity.
•Follow escalation and handoff procedures to team members and leadership based on defined threat and priority determination.
•Participates in the response to cyber incidents by gathering data and artifacts relevant to the event.
•Complete forensic analysis of computers and other devices in scope to investigations for evidence or artifacts related to incidents.
•Conduct analysis of the enterprise network to discover indicators of a network breach or system compromise.
•Investigate alerts generated by network security controls to prevent data loss and maintain the integrity of corporate information.
•Strong understanding of General IT knowledge, Security Fundamentals, Network Systems, Firewalls, IDS/IPS Systems, Security Email Flow, End-point Security, and, Network Security concepts Windows & Linux Systems Administration, Windows/Linux, and cloud security fundamentals.
•Experience working with both blue and red teams.
•The selectee will be expected to perform additional job duties as needed to support the customer and our company.
Bachelor’s degree in computer or cyber science, computer information systems or related field and five years of current and progressive complex security related work experience within a network and/or systems administration role. Or, an Associate degree in a computer science field and seven years of current and progressive experience as described above. Or, nine years of current and progressive experience as described above.
Preference given to those with an understanding of Network protocols (TCP/IP), Network Security and a blend of experience with Windows and Linux operating systems.
Applicants are screened based on qualifications, successful completion of the interview process and a background and criminal investigation. Applicants must be legally authorized to work in the United States. The Information Technology Department does not provide Sponsorships.
Application package must be received by 11:59 PM on the closing date listed on the opening.
Documents to be submitted:
Applicants who are residents of ND and eligible to claim veteran's preference must attach Form DD214. Claims for disabled veteran's preference must include a current statement of disabled status from the Veteran's Affairs Office with the application for employment.
Anyone needing assistance or accommodations during any part of the application or interview process please contact Darla, Information Technology Department: E-mail: firstname.lastname@example.org phone: (701) 328-1004, fax: (701) 328-3000 or TTY: 1-800-366-6888 or local at (701) 328-3190.
•Learn more about ITD at: >http://www.nd.gov/itd
•Learn more about Employment Benefits at: >https://www.nd.gov/omb/state-employee/employment-and-compensation/benefits
•Visit North Dakota State government: >http://www.nd.gov
Job Announcement Status can be viewed at: >http://www.nd.gov/itd/working-itd
Equal Employment Opportunity
The State of North Dakota and this hiring agency do not discriminate on the basis of race, color, national origin, sex, genetics, religion, age or disability in employment or the provisions of services and complies with the provisions of the North Dakota Human Rights Act.
As an employer, the State of North Dakota prohibits smoking in all places of state employment in accordance with N.D.C.C. § 23-12-10.