The University of Texas Medical Branch is seeking a Cyber-Security Analyst to join their Governance, Risk, and Compliance team. This role is crucial for safeguarding sensitive information and ensuring compliance with industry regulations by supporting the development and monitoring of security policies and risk management processes.
Responsibilities:
- Complete CompTIA CySA+ certification training and successfully pass the exam within 90 days of hire
- Work assigned shifts supporting 24x7x365 Tier 1 SOC operations
- Perform alert triage across on-premises and cloud security technologies, including SIEM, IDS, antivirus, cloud services, Windows servers, network infrastructure, DLP, UBA, and user-submitted security reports
- Apply basic security controls to contain malicious activity and prevent unauthorized disclosure of sensitive information
- Escalate alerts to Tier 2 based on severity and priority, supporting follow-on incident response activities
- Contribute to SOC workflow improvements by identifying false positives and recommending process enhancements
- Assist with incident response through resolution and help develop after-action reports
- Participate in ongoing skill development to strengthen investigation and response capabilities
- Adhere to internal controls, reporting structures, and all applicable standards, processes, and procedures
- Perform other related duties as assigned by management
Requirements:
- Bachelor's degree and one (1) year of IT or security experience
- An equivalent combination of education and experience relevant to the role may be considered for this position
- Complete CompTIA CySA+ certification training and successfully pass the exam within 90 days of hire
- Work assigned shifts supporting 24x7x365 Tier 1 SOC operations
- Perform alert triage across on-premises and cloud security technologies, including SIEM, IDS, antivirus, cloud services, Windows servers, network infrastructure, DLP, UBA, and user-submitted security reports
- Apply basic security controls to contain malicious activity and prevent unauthorized disclosure of sensitive information
- Escalate alerts to Tier 2 based on severity and priority, supporting follow-on incident response activities
- Contribute to SOC workflow improvements by identifying false positives and recommending process enhancements
- Assist with incident response through resolution and help develop after-action reports
- Participate in ongoing skill development to strengthen investigation and response capabilities
- Adhere to internal controls, reporting structures, and all applicable standards, processes, and procedures
- Perform other related duties as assigned by management
- 3 years of cybersecurity experience
- Python, Rust, C, C+, Java, and/or PowerShell
- Academic and/or working experience with TCP/IP networking, and networking services such as DNS, SMTP, DHCP, etc
- Windows, MacOS, Linux-variant operating systems, such as the file system structure, system services, and typical behavior of endpoints and servers
- Cloud-based services such as Microsoft Office 365 and Azure productivity tools