Information SecurityAnalyst

23 Jul 2024

Vacancy expired!

Pay Range: $42.55 - $53.96 per hour (TS Teamsters Pay Plan IT45,Step 1-13)

Hiring Range:$42.55 - $45.15 per hour (TS Teamsters Pay Plan IT45, Step 1-4 DOQ)

Job Closing Date: Open Until Filled, with weekly reviews.

There is one Information Security Analyst opening with the Yakima County Technology Services Department. This position is responsible for leading the County’s cyber security initiative and developing and implementing network design for a wide variety of journey level network projects.

APPLY HERE: https://yakimacounty.wd5.myworkdayjobs.com/en-US/YakimaCountyWA/details/Information-Security-AnalystR2253 BEFORE THE JOB CLOSING DATE TO BE FURTHER CONSIDERED FOR THE POSITION.

Benefits included in position:

Health Care Benefits (Medical, Dental, Vision, Basic Life and Basic LTD)

Retirement Benefits

Paid Vacation

Paid Holidays

Paid Sick Leave

Note: This is a Technology Services Teamsters Contract Bargaining Unit Position.

Essential Duties:

Network Security:

Leads the county Cyber-security preparedness initiative. Assesses current preparedness of county cyber environment and determines the best means to mitigate threats in both the short and long term.

Monitors, researches, forecasts and leads the Technology Services team to ensure proper defense and responds to worldwide cyber threats as incident leader when a cyber-attack occurs.

Conducts an after action analysis and determines if any corrective action is required. Researches, drafts and recommends corrective action plans to be implemented by those affected and Technology Services.

Oversees the remediation of virus and malware infections, to maintain security on the network. Intervenes in network or user level connections when necessary to maintain network security and remediate threats such as viruses, malware, etc. Maintains and operates secure encrypted network access systems for all county fire and law enforcement vehicles and vehicles for all customer law enforcement agencies, in order to facilitate fast public safety response and to access to public safety data systems. Provides the same for all county employees working off-site (telework), in order to increase county employee productivity and for vendor access to county systems and equipment.

Creates, develops, and maintains various network documentation, including diagrams, backup equipment configuration information, and security access levels.

Implementation and operations of the CCA 20 Critical Controls for Effective Cyber Defense:

Establish an inventory of authorized devices and software that can be connected to the network in order to prevent unauthorized devices from being attached to the network and to prevent attacks by malware and viruses.

Creates secure configurations for hardware and software on mobile devices, laptops, workstations and servers and network devices such as firewalls, routers, and routers in order to ensure the security of the network. Secures data transmissions and storage, based on the data’s content and associated classification, to ensure against theft.

Performs gap analysis to identify security areas employees are not adhering to, and use this as a basis for implementing a security awareness program. Establishes an incident response and management process with trained resources for dealing with any adverse event or threat to be able to quickly respond to an attack and restore service to the County. Establishes the processes and tools needed to properly back up critical information to restore County business functions. Establishes a process to ensure that network ports, protocols and services are only turned on when needed, to protect against attacks on the network.

Perform continuous vulnerability assessment and remediation to search for security risks and establishes malware defenses to detect/prevent/correct the installation and execution of malicious software on all devices to prevent the corruption and/or theft of County assets. Designs and implements network perimeters and analyzes audit logs to search for successful cyber-attacks. Performs penetration tests and deploys processes such and tools to detect/prevent/correct security weaknesses in web applications, software, wireless local area networks, access points and wireless client systems in order to defend against attacks.

Establishes controls for which persons, computers, and applications have a need and right to access information based on an approved classification, in order to protect County data. Monitors the use of system and application accounts to ensure accounts of former employees and contractors are removed, to protect against unauthorized network access. Audits administrative network privileges to ensure they have been authorized by a senior executive to ensure network security. Determines which systems and protocols need to be developed to maintain and monitor equipment, computer hardware and software to ensure against data theft, malware and viruses that are compatible with current systems and networks.

Determines how to perform gap analysis to identify unsecured areas and to effectively communicate and implement the chosen methods of protection.

Determines how to establish controls for which persons, computers, and applications which have a need and right to access information based on an approved classification.

Network Maintenance:

Administers, implements, organizes, coordinates, monitors and maintains the daily security operations of multiple enterprise level, countywide level, and customer level networks.

Monitors and evaluates countywide network for utilization and other performance parameters to ensure maximum user effectiveness.

Utilizes problem solving techniques and advanced network analysis tools and software to trouble shoot, analyze and resolve network outages and performance issues. Determines the most effective way to complete network maintenance tasks, to ensure minimum downtime of network resources, maximizing county employee and customer effectiveness.

Selects Technology staff, county employees, or outside resources to be involved in maintenance and operational tasks. Assesses predicted maintenance and operational requirements as they relate to county employee and customer work effectiveness and impact. Provides notification to county departments, outside agencies, and customers regarding network maintenance.

Project Design:

Designs countywide and enterprise security and network expansions, improvements and upgrades for multiple sites, interconnections, customers and outside services, including internet, state, and regional networks. Establishes the goals of the project(s) to accommodate the needs, growth, and security of countywide departments, agencies, and network locations. Creates specifications for projects to ensure uniformity in county operations and enable project success. Assists with identification of procurement channels to minimize project costs while maximizing project effectiveness.

Coordinates with the Network Operations Manager, Customer Project Managers and / or agency stakeholders to establish engineering budget, analysis for network upgrades and develop project scope documentation in order to assure that final project design meets the project goals and to ensure accuracy of estimated costs

Evaluates products, vendors, and services for suitability in network upgrades. Prepares network diagrams, equipment lists, and software required for upgrade projects.

When needed, acts as liaison with other departments and agencies, to ensure their network connected systems are installed correctly, securely, and operate smoothly

Disaster Recovery Planning:

Develops and coordinates technology disaster recovery plans, strategic plans, and security plans with management, co-workers and other county stakeholders by determining which network segments and information are critical to have in the event of a disaster. Determines which procedures will need to be performed to rebuild or restore one or multiple network systems and evaluates when it is better to replace the network system rather than repair it, to decrease downtime after a disaster.

Equipment Deployment:

Configures, installs and replaces firewalls, switches, routers, radios, UPS's, physical access control systems, network security systems, performance monitoring systems, virus protection software, new appliance integration, and network management systems. Configures network systems and firewalls for maximum performance, to ensure best use of county resources. This ensures the security of county systems. Coordinates closely with the Technology Services team to ensure that the operation, configuration, and maintenance of complex inter-connected network systems operate in a harmonious and integrated manner.

Training and Consultation:

Provides advanced level network security expertise, and training to other Technology Services staff in network configuration, security systems operation, encryption, and various other technologies. Identifies problems or needs of other TS Department team members, and propose solutions. Advises manager regarding proposed solutions.

Other duties assigned:

Performs other duties as assigned including secondary support and assistance on network assigned as primary responsibilities to co-workers Contribute in TS Department meetings, Team meetings, to facilitate best solutions for the department and the county. Studies various resources to maintain expertise, knowledge level, and provide optimum solutions for the team and the county.

Education and Experience:

Associate degree or two-year technical certificate in Computer Science or Telecommunications AND seven (7) years of full-time network support including application or server hardware support; OR an equivalent combination of experience or training which provides the knowledge, skills and abilities sufficient to successfully perform the essential duties of the job.

Required:

Valid WA State Driver’s License upon appointment and proof of insurance, if requested.

Successful completion of criminal background investigation.

Preferred:

Bachelor's Degree in Computer Science AND five (5) years of full-time network support including application or server hardware support.

Experience in information security or related field.

Experience with computer network penetration testing and techniques.

Understanding of firewalls, proxies, SIEM, antivirus, and IDS/IPS concepts.

Ability to identify and mitigate network, server, and workstation vulnerabilities and explain how to avoid them.

Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact.

Customer service principles and techniques.

Working Conditions: This position is rated as Sedentary Work, exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met.

Environment: excessive noise, moving/mechanical parts, vibration, multiple work locations, field work.

Physical Demands: Handling, sitting, standing, fingering, hearing, talking, and visual acuity.

Equipment Used: Telephone, Copy Machine, Fax Machine, Voice Mail, Computer, PDA, Printer. Scanner

Knowledge:

Computer operations: advanced level of knowledge of network systems: network hardware and software programs including: Microsoft products, Cisco products, Mikrotik products, Netmotion products, APC products; research methods and analysis techniques; advanced level of knowledge of network hardware and software troubleshooting techniques: and customer service principles and techniques.

Principals for securing a technology environment: Knowledge of methods and practices for detecting, isolating and mitigating a cyber-attack. Knowledge of methods and best practices to secure, monitor and maintain a technology environment.

Computer operations: Advanced level of knowledge of server, office computer and network systems with regards to security and threat prevention.

Hardware and software programs including: Microsoft, Cisco, Mikrotik, Netmotion, APC, Fore Scout network analysis tool, Solar Winds and other security tools. Network management tools.

Research methods and analysis techniques: Advanced level of knowledge of network hardware and software troubleshooting techniques

Customer service principles and techniques

Skills and abilities:

Using a personal computer and related software applications; operating basic office equipment; determining priorities and making critical decisions. Developing projects; teaching, and coaching others; developing, writing applying and implementing policies and procedures; resolving problems and conflicts; giving presentations, public speaking and facilitating meetings; researching, and implementing compliance measures related to legislated requirements; time management; establishing and maintaining effective working relationships with staff at all organizational levels and with the public; and oral and written communication sufficient to exchange or convey information.

Ability to lead a cyber-security effort for a mid-sized government technology environment; Skill in establishing cyber controls to enhance an agency’s security stance within a technology environment; Skills to clearly communicate complex technological concepts, in plain language, to executive level management; either in groups or individually; Skill in prioritizing strategic initiatives; working towards a goal that may be years away.

Skills in leading a response team when a security event takes place; Skill in project definition and scope development; Advanced ability to research and forecast the cyber threat environment.

Full-time