You haven't searched anything yet.
Summary of Duties
This security position reports directly to the IT Administrator and is responsible for overseeing and managing TRSL’s cyber security vigilance and response to threats. The position will require a technical background in Systems Networks, Server and Desktop Endpoint security products, Security hardware devices, Security monitoring via software products and log analysis and Security testing.
TRSL is a Substance Abuse and Drug-Free workplace. As an Equal Opportunity Employer, TRSL is committed to a diverse and inclusive workplace prohibiting discrimination on the basis of any non-merit factor.
TRSL is a State as a Model Employer (SAME) agency that supports improved employment opportunities for individuals with disabilities.
All prospective new hires will be subject to employment eligibility verification via the federal government's E-verify system.MINIMUM QUALIFICATIONS:
A baccalaureate degree plus one year of experience in information technology.
SUBSTITUTIONS:
1. An associate’s degree in information technology will substitute for the baccalaureate degree.
2. Two years of experience or training in information technology will substitute for the baccalaureate degree. Candidates without a baccalaureate degree may combine experience or training in information technology and college credit to substitute for the required baccalaureate degree as follows:
30 to 59 semester hours credit will substitute for six months of experience or training in information technology towards the baccalaureate degree.
60 to 89 semester hours credit will substitute for one year of experience or training in information technology towards the baccalaureate degree.
90 or more semester hours credit will substitute for one year and six months of experience or training in information technology towards the
baccalaureate degree.
A maximum of 90 semester hours may be combined with experience or training in information technology to substitute for the baccalaureate
degree.
3. Six years of full-time work experience in any field may be substituted for the required baccalaureate degree. Candidates without a baccalaureate degree may combine work experience in any field and college credit to substitute for the baccalaureate degree as follows:
30 to 59 semester hours credit will substitute for one year of experience towards the baccalaureate degree.
60 to 89 semester hours credit will substitute for two years of experience towards the baccalaureate degree.
90 to 119 semester hours credit will substitute for three years of experience towards the baccalaureate degree.
120 or more semester hours credit will substitute for four years of experience towards the baccalaureate degree.
A maximum of 120 semester hours may be combined with experience to substitute for the baccalaureate degree.
NOTE:
A certification in an approved area may be substituted for the education and/or experience requirements at the time of hire or promotion, provided the appointment is made from a Certificate of Eligibles.
NOTE:
Any college hours or degree must be from an accredited college or university.
FUNCTION OF WORK:
To provide analysis as related to information security activities that are outside of the scope of the Office of Technology Services.
LEVEL OF WORK:
Entry.
SUPERVISION RECEIVED:
Close from an IT Supervisor or IT Manager. Other reporting relationships may be approved by SCS.
SUPERVISION EXERCISED:
May provide guidance to lower-level personnel.
LOCATION OF WORK:
State agencies with information security activities that are outside of the scope of the Office of Technology Services.
JOB DISTINCTIONS:
Differs from other IT Statewide jobs by the presence of tasks relative to information security activities that are outside of the scope of the Office of Technology Services.
Differs from IT InfoSec Analyst 2 by the absence of experienced-level tasks relative to information security activities that are outside of the scope of the Office of Technology Services.
EXAMPLES BELOW ARE A BRIEF SAMPLE OF COMMON DUTIES ASSOCIATED WITH THIS JOB TITLE. NOT ALL POSSIBLE TASKS ARE INCLUDED.
Analyzes InfoSec help desk tickets; provides resolutions or refers tickets to higher-level InfoSec personnel as needed.
Under close supervision, performs information security monitoring, compliance, and tracking tasks.
Gains knowledge of information security and other applicable technical policies, procedures, standards, and guidelines in order to perform technical analyses in accordance with industry standards.
Communicates with users to assist with security processes or to gather more details for pending information security requests.
Takes direction from higher-level InfoSec personnel to support successful InfoSec project implementation and completion as relative to the assigned area. Assists in training agency personnel on preventing information security intrusions; may also provide training to lower-level information technology associates as needed.
Under close supervision, installs security measures and operates software, including firewalls and data encryption programs, to ensure continuity of agency operations and security for sensitive data.
Other
Public Administration
$72k-88k (estimate)
11/22/2023
05/09/2024
louisiana.gov
BATON ROUGE, LA
15,000 - 50,000
Private
BOBBY JINDAL
$10B - $50B
Public Administration
The job skills required for IT Security Analyst 1,2,3 include Information Security, Analysis, Cybersecurity, Security Systems, Incident Response, Security Controls, etc. Having related job skills and expertise will give you an advantage when applying to be an IT Security Analyst 1,2,3. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by IT Security Analyst 1,2,3. Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for IT Security Analyst 1,2,3 positions, which can be used as a reference in future career path planning. As an IT Security Analyst 1,2,3, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary IT Security Analyst 1,2,3. You can explore the career advancement for an IT Security Analyst 1,2,3 below and select your interested title to get hiring information.
If you are interested in becoming an IT Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an IT Security Analyst for your reference.
Step 1: Understand the job description and responsibilities of an Accountant.
Quotes from people on IT Security Analyst job description and responsibilities
They will then help to make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.
02/23/2022: Bellingham, WA
Security analysts monitor, prevent, and stop attacks on private data.
03/24/2022: Scranton, PA
Security analysts may also prepare for and respond to system breaches or attacks.
01/31/2022: Duluth, MN
They document tests, security and emergency policies, and procedures.
04/15/2022: Virginia Beach, VA
IT security analysts protect computer networks from cyberattacks and unauthorized access.
01/30/2022: Macon, GA
Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.
Career tips from people on IT Security Analyst jobs
The most successful analysts are detail-oriented and have an analytical mindset.
02/20/2022: New London, CT
Security analysts must demonstrate adaptability and the ability to grow with their field.
04/15/2022: Waterloo, IA
Typically, most security analysts hold a bachelor's degree at minimum.
02/01/2022: Juneau, AK
Ethical hacking certifications help prepare analysts to understand threats and protect systems.
02/02/2022: Spokane, WA
Faced with a dynamic threat landscape and continuously emerging technologies, both on the defensive and offensive sides, security analysts need to be naturally curious and always willing to learn more.
03/06/2022: Rock Hill, SC
Step 3: View the best colleges and universities for IT Security Analyst.