You haven't searched anything yet.
Job Description
Class specifications are intended to present a descriptive list of the range of duties performed by employees in the class. Specifications are not intended to reflect all duties performed by individual positions.
JOB SUMMARY
Under general supervision, the Cybersecurity Analyst will be responsible for cybersecurity processes and procedures, assist with cybersecurity architecture, design, requirement validation and verification, and handle the day-to-day cybersecurity duties of the District’s system infrastructure.
This position will also support System Analyst activities as they relate to the District’s enterprise systems. This includes secured implementation and support of host systems, communications, business systems and network infrastructure; also performs technical tasks related to evaluating, introducing, and maintaining information technology systems. A business system in this role includes Geographical Information (GIS) systems, Financial Information (FIS) systems, Customer Service Information (CIS) systems, Maintenance Management (CMMS) system, Utility Billing (UB) systems, and Capital Program Management (CPM) systems (among others).
DISTINGUISHING CHARACTERISTICS
The Cybersecurity Analyst job class is distinguished from the Systems Analyst job class in that the former has a primary focus on all cybersecurity activities for the District’s business systems. Activities include design, implementation, maintenance and continuous improvement to the security posture of all District business systems.
Positions in this class typically have intermediate work experience in the given subject area and past experience in a system analyst capacity. This classification will support and coordinate cybersecurity tasks under general direction. A Cybersecurity Analyst typically works under general supervision while learning job tasks, progressing to direction as procedures and processes of assigned area of responsibility are learned. This classification will work on strategic or project level tasks when directed and interface with vendors on an semi-regular basis.
This position reports directly to the Information Technology Manager.
Essential Functions
ESSENTIAL FUNCTION STATEMENTS
The duties listed below are intended only as illustrations of the various types of work that may be performed. The omission of specific statements of duties does not exclude them from the position if the work is similar, related or a logical assignment to this class.
Requisite Abilities
Ability to:
Knowledge of:
Intermediate to advanced knowledge of secure system analysis. This includes knowledge of best practices in system design, programming, configuration, and security planning. This includes intermediate to advanced level knowledge of networks, database systems, business functional systems, cloud providers, and other hardware and software technology.
Qualifications Guidelines
QUALIFICATIONSAny combination of experience and training that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be:
A bachelor's degree from an accredited college or university in computer science, information systems, engineering, or a related field is preferred (a degree with a focus on information security is a plus) and three years of professional level information technology technical and operational support with an emphasis in cybersecurity is desirable with prior experience or education in information security, disaster recovery, and incident response.
Licenses; Certificates; Special Requirements:
Possession of or the ability to obtain a valid California Class C driver's license and the ability to maintain insurability under the District's vehicle insurance program.
One or more of the following certifications is desirable:
Software and Hardware Experience
Experience with the following technologies is preferred:
Physical Demands
Employees must meet the following requirements, which are necessary to successfully perform the essential functions of this class: sit at a desk on a continuous basis for long periods of time; intermittently twist, reach, bend, and stoop; lift or carry weight up to 25 pounds, and have hearing and vision within normal ranges. The employee is regularly required to sit, walk and stand; talk and hear; use hands to finger, handle, feel or operate objects, tools or controls; reach with hands and arms; perform repetitive movements of hands or wrists; stoop, kneel, bend at the waist. Specific vision abilities required for this job include close vision, color vision and the ability to adjust focus.
Mental Demands
While performing the duties of this class, an employee uses written and oral communication skills; reads and interprets data, information and documents; analyzes and solves problems; uses math and mathematical reasoning; observes and interprets people and situations; learns and applies new information and skills; performs highly detailed work; deals with changing deadlines, constant interruptions and multiple concurrent tasks; and interacts with others encountered in the course of work.
WORK ENVIRONMENT
The employee works in an office environment around other equipment where the noise level is usually quiet.
Job Type: Full-time
Pay: $107,203.20 - $147,784.00 per year
Benefits:
Experience level:
Schedule:
Location:
Work Location: Remote
Full Time
$137k-169k (estimate)
05/03/2024
07/02/2024
smwd.com
San Juan Capistrano, CA
200 - 500
The job skills required for Cyber Security Analyst include Cybersecurity, Information Security, Analysis, CISSP, Security Systems, Network Security, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Security Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Security Analyst. Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for Cyber Security Analyst positions, which can be used as a reference in future career path planning. As a Cyber Security Analyst, it can be promoted into senior positions as a Cyber Security Architect IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Security Analyst. You can explore the career advancement for a Cyber Security Analyst below and select your interested title to get hiring information.
If you are interested in becoming a Cyber Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become a Cyber Security Analyst for your reference.
Step 1: Understand the job description and responsibilities of an Accountant.
Quotes from people on Cyber Security Analyst job description and responsibilities
A cyber security analyst needs to have a broad range of skills to be able to handle malware and security breaches.
01/24/2022: Newport News, VA
Cyber security analysts need to think like a hacker to understand the hacking process.
02/10/2022: Sioux Falls, SD
As cyber attacks and threats become more frequent, the demand for cyber security analysts continue to grow.
03/15/2022: Montgomery, AL
Cyber security analysts help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats.
01/19/2022: Burlington, VT
The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.
03/24/2022: Los Angeles, CA
Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.
Career tips from people on Cyber Security Analyst jobs
Secure systems and ensure business continuity.
01/09/2022: Cleveland, OH
Address legal and regulatory requirements.
01/12/2022: Asheville, NC
General Data Protection Regulation (GDPR).
03/12/2022: Fort Wayne, IN
Aftermath of WannaCry Ransomware.
03/26/2022: Springfield, IL
Threat Response Engineering Consultant.
03/02/2022: Riverside, CA
Step 3: View the best colleges and universities for Cyber Security Analyst.