MCCB POLICIES

Section 5: Staff Positions

MISSISSIPPI COMMUNITY COLLEGE BOARD POLICIES AND PROCEDURES MANUAL

Title: IT Cyber Security Analyst

Initial Date of Adoption: July 1, 1999

Reference:

Revision Date: October 15, 2010; June 19, 2015; November 18, 2016; June 15, 2018

Code Number: 5.7

1 of 2

Page:

IT CYBER SECURITY ANALYST

Characteristics of Work :

Performs advanced work overseeing activities associated with desktop applications and data center functions. Responsible for designing, testing, implementing and monitoring security measures for desktop computer systems and network servers and systems. Responsibilities include monitoring the use of data files, and regulate access to safeguard information and protect the network. Staying up-to-date on current virus reports and protecting networks from viruses, malware and other vulnerability issues by monitoring and diagnosing malware events and vulnerability issues. Council and train users, promote security awareness, develop policies and procedures, and provide updates and reports to the Chief Information Officer. Support security operations, identifying and documenting potential risks, coordinating and tracking remediation activities with the system and supporting various security technologies. Must be able to function in a dynamic environment subject to impromptu changes in schedules and priorities. Work involves troubleshooting desktop applications and connectivity issues, software installations, server management, customer support, maintaining email listservs, and working closely with Purchasing and Finance for hardware and software purchases, and other IT functions as assigned by the Chief Information Officer. 1. Configure and support security tools such as anti-virus software, patch management systems, etc. 2. Define access privileges, control structures and resources. 3. Oversee and monitor routine security administration. 4. Train fellow employees in security awareness, protocols and procedures. 5. Design and conduct security audits to ensure operational security. 6. Maintain site licenses for department and Agency. 7. Assists users in maximizing use of networks and computing systems. 8. Provide technical support to end users. 9. Create/Administrator/Troubleshoot Active Directory Group Policies. 10. Provide supplemental network and systems administration support to IT team. 11. Strong customer service orientation, proven ability to pay attention to details and proven dependability. 12. Participate in the identification, containment, and remediation of security incidents. 13. Assist with the design and implementation of cyber security campaigns. 14. Acts as first level technical response and serves as escalation point or second level support for information security concerns. 15. Work independently or as lead on escalation of low to medium complexity security concerns. 16. Implement and integrate security tools and services. 17. Support information security policies and awareness program. 18. Monitor security threats, risks, vulnerabilities, and events in host systems and networks. 19. Maintain current and new reporting methods of cyber security intelligence analysis purposes of situational awareness and making cyber intelligence actionable. 20. Participate in MS-ISAC (Multi-State Information Sharing and Analysis Center) cyber security advisory program. 21. Performs related work as assigned. Examples of Work: Experience with desktop and server support. Graduation from an accredited four-year college or university with major course work in computer science, data processing, technology education, or related field is generally preferred. Education and experience may be substituted for one another. Master’s degree in technology education or related field is a plus. Special Experience Preferred : Knowledge of applications including Microsoft Office, Trend Micro, anti-virus and anti-malware, and Cicso Any Connect VPN or other Virtual Private Network experience. Direct experience with MAC OSX administration and applications, Microsoft Windows 7/10, OS configuration and troubleshooting. Knowledge of IT operations and end-point security tools, strong problem-solving/decision making skills, knowledge of cyber security frameworks, such as NIST (National Institute of Standards and Technology).The incumbent should possess proficiency with Abode Directory and Group Policy Management. Related work should include experience with PC based applications and networks, Windows servers and email systems, VMware vSphere management, TCP/IP, computer networking, routing and switching is a plus. Experience in supporting a 24x7 production environment is essential. Minimum Requirements:

Made with FlippingBook Learn more on our blog