What are the responsibilities and job description for the Information Security Specialist 2, PUC position at State of Pennsylvania?
Salary : $77,379.00 - $117,536.00 Annually
Location : Dauphin County, PA
Job Type : Civil Service Permanent Full-Time
Job Number : CS-2025-18105-G1518
Department : Public Utility Commission
Division : PU Mis
Opening Date : 02 / 05 / 2025
Closing Date : 2 / 19 / 2025 11 : 59 PM Eastern
Job Code : G1518
Position Number : 00118834
Union : Non-Union
Bargaining Unit : A3
Pay Group : UT09
Bureau / Division Code : 00171803
Bureau / Division : PU Mis
Worksite Address : 400 North Street
City : Harrisburg, Pennsylvania
Zip Code : 17120
Contact Name : Shannon Marciano
Contact Phone : 717.787.8714
Contact Email : ra-puchr@pa.gov
THE POSITION
Are you a cybersecurity professional looking for a leadership opportunity in a challenging and rewarding career? If so, the Security Analyst 2 position at the Public Utility Commission (PUC) is the perfect opportunity for you to showcase your skills by strengthening the cybersecurity posture our organization and managing the vulnerability management program. Bring your skills and ambition to our team as we ensure safe and reliable utility service in Pennsylvania!
DESCRIPTION OF WORK
In this cybersecurity leadership role, you will be responsible for designing, implementing, and maintaining the security systems that protect the PUC's organizational and informational assets. Work includes new and existing projects that help to identify and mitigate security risks, designing and implementing security controls, monitoring and responding to security incidents, and providing technical assistance to users on security matters. You will also act as a liaison with external entities; coordinate with PUC fiscal and procurement organizations; as well as develop and update procedures, processes, and regulations to ensure the PUC's systems and information remain in a secure state. This is a challenging and fast-paced leadership role that gives you a chance make a real difference in the security of the PUC's operations. You will work with a team of highly skilled professionals and have the opportunity to learn and grow your skills.
If you are a motivated and results-oriented individual with a strong passion for cybersecurity, this is the role for you!
The Public Utility Commission offers a friendly work environment, alternate work schedules, telework when approved, and the possibility for free parking.
Work Schedule and Additional Information :
- Full-time employment
- Work hours are 8 : 00 AM to 4 : 30 PM, Monday - Friday, with a 60-minute lunch.
- Telework : Part-time work from home (telework) may be a potential feature of this position. The successful candidate is required to report to the headquarters worksite daily, unless the employee meets eligibility requirements and telework has been approved. Management may discontinue any telework arrangement at any time, for any reason. In order to telework, you must have a securely configured high-speed internet connection. If you are unable to telework, you will have the option to report to the headquarters office in Harrisburg, Pennsylvania.
To be eligible to participate in telework, the employee's alternate (telework) worksite must meet the following requirements :
Within a reasonable travel distance of Harrisburg; and
REQUIRED EXPERIENCE, TRAINING & ELIGIBILITY
QUALIFICATIONS
Minimum Experience and Training Requirements :
Other Requirements :
How to Apply :
Veterans :
Telecommunications Relay Service (TRS) :
If you are contacted for an interview and need accommodations due to a disability, please discuss your request for accommodations with the interviewer in advance of your interview date.
The Commonwealth is an equal employment opportunity employer and is committed to a diverse workforce. The Commonwealth values inclusion as we seek to recruit, develop, and retain the most qualified people to serve the citizens of Pennsylvania. The Commonwealth does not discriminate on the basis of race, color, religious creed, ancestry, union membership, age, gender, sexual orientation, gender identity or expression, national origin, AIDS or HIV status, disability, or any other categories protected by applicable federal or state law. All diverse candidates are encouraged to apply.
EXAMINATION INFORMATION
your score may be lower than deserved.
Learn more about our Total Rewards by watching this short !
See the total value of your benefits package by exploring our
Health & Wellness
We offer multiple health plans so our employees can choose what works best for themselves and their families. Our comprehensive benefits package includes health coverage, vision, dental, and wellness programs.
Compensation & Financial Planning
We invest in our employees by providing competitive wages and encouraging financial wellness by offering multiple ways to save money and ensure peace of mind including multiple retirement and investment plan options.
Work / Life Balance
We know there's more to life than just work! Our generous paid leave benefits include paid vacation, paid sick leave, eight weeks of paid parental leave, military leave, and paid time off for most major U.S. holidays, as well as flexible work schedules and work-from-home opportunities.
Values and Culture
We believe in the work we do and provide continual opportunities for our employees to grow and contribute to the greater good. As one of the largest employers in the state, we provide opportunities for internal mobility, professional development, and the opportunity to give back by participating in workplace charitable giving.
Employee Perks
Sometimes, it is the little "extras" that make a big difference. Our employees receive special employee-only discounts and rates on a variety of services and memberships.
For more information on all of these Total Rewards benefits, please visit and click on the benefits box.
Have you been employed by the Commonwealth of Pennsylvania as an Information Security Specialist 1 for one or more years full-time?
If you are claiming experience in the above question, please list the employer(s) where you gained this experience in the text box below. The employer(s) and a description of the experience must also be included in the appropriate sections of your application if you would like the experience to be considered in the eligibility decision. If you claimed you do not have experience, type N / A in the text box below.
How much full-time experience do you possess performing technical work in information technology security?
If you are claiming experience in the above question, please list the employer(s) where you gained this experience in the text box below. The employer(s) and a description of the experience must also be included in the appropriate sections of your application if you would like the experience to be considered in the eligibility decision. If you claimed you do not have experience, type N / A in the text box below.
How many semester credits of undergraduate college education have you completed with major coursework in information technology? If you are claiming credits / degree, you must upload a copy of your college transcript(s) for this education to be considered in the eligibility decision. Unofficial transcripts are acceptable. You must attach your transcript(s) prior to the submission of your application by using the "Attachments" tab on the left. You will not be able to add a transcript(s) to the application after it has been submitted.
If your education was acquired outside of the United States, you must upload a copy of your foreign credential evaluation report. We can only accept foreign credential evaluations from organizations that are members of the National Association of Credential Services (NACES). A list of current NACES members can be found by visiting and clicking the Evaluation Services Link.
For additional information on foreign education credentials, please visit and click on Other Information.
You must attach your documentation prior to the submission of your application by using the "Attachments" tab on the left. You will not be able to add a document to the application after it has been submitted.
How many semester credits of graduate coursework have you completed in asset security, communication and network security, computer forensics, cryptography, cyber defense, cyber threats, digital forensics, discrete probability, fundamental security design principles, identity and access management (IAM), IT governance, IT infrastructure, network defense, networking technology and protocols, security and risk management, security architecture and engineering, security assessment and testing, security operations, security policy, software development security, and / or IT policy, legal, ethics, and compliance? If you are claiming credits / degree, you must upload a copy of your college transcript(s) for this education to be considered in the eligibility decision. Unofficial transcripts are acceptable. You must attach your transcript(s) prior to the submission of your application by using the "Attachments" tab on the left. You will not be able to add a transcript(s) to the application after it has been submitted.
If your education was acquired outside of the United States, you must upload a copy of your foreign credential evaluation report. We can only accept foreign credential evaluations from organizations that are members of the National Association of Credential Services (NACES). A list of current NACES members can be found by visiting and clicking the Evaluation Services Link.
For additional information on foreign education credentials, please visit and click on Other Information.
You must attach your documentation prior to the submission of your application by using the "Attachments" tab on the left. You will not be able to add a document to the application after it has been submitted.
You must complete the supplemental questions below. These supplemental questions are the exam and will be scored. They are designed to give you the opportunity to relate your experience and training background to the major activities (Work Behaviors) performed in this position. Failure to provide complete and accurate information may delay the processing of your application or result in a lower-than-deserved score or disqualification. You must complete the application and answer the supplemental questions. Resumes, cover letters, and similar documents will not be reviewed for the purposes of determining your eligibility for the position or to determine your score.
All information you provide on your application and supplemental questions is subject to verification. Any misrepresentation, falsification or omission of material facts is subject to penalty. If requested, you must provide documentation, including names, addresses, and telephone numbers of individuals who can verify the validity of the information you provide in the application and supplemental questions.
Read each question carefully. Determine and select which "Level of Performance" most closely represents your highest level of experience / training. List the employer(s) / training source(s) from your Work or Education sections of the application where you gained this experience / training. The "Level of Performance" you choose must be clearly supported within the description of the experience and training information entered in your application or your score may be lowered. In order to receive credit for experience, you must have worked in a job for at least six months in which the experience claimed was a major function.
If you have read and understand these instructions, please click on the "Yes" button and proceed to the exam questions.
If you have general questions regarding the application and hiring process, please refer to our
WORK BEHAVIOR 1 - SECURITY PLANNING
Plans and implements information technology security programs, notably the enterprise vulnerability management program and security awareness initiatives. Recommends and justifies hardware and software upgrades and enhancements to ensure systems and data are appropriately protected.
Levels of Performance
Select the Level of Performance that best describes your claim.
In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you indicated you have no work experience related to this work behavior, type N / A in the box below.
If you have selected the level of performance pertaining to college coursework, please provide your responses to the three items listed below. If you indicated you have no education / training related to this work behavior, type N / A in the text box below.
WORK BEHAVIOR 2 - SECURITY MONITORING AND TESTING
Monitors the network to identify security deficiencies and potential threats. Manages these threats by ensuring corrective actions are implemented to address the associated issues and risks. Collaborates with developers, engineers, and stakeholders to implement security measures into software and systems.
Levels of Performance
Select the Level of Performance that best describes your claim.
In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you indicated you have no work experience related to this work behavior, type N / A in the box below.
If you have selected the level of performance pertaining to college coursework, please provide your responses to the three items listed below. If you indicated you have no education / training related to this work behavior, type N / A in the text box below.
WORK BEHAVIOR 3 - TECHNICAL ASSISTANCE
Addresses escalated security incidents by diagnosing and troubleshooting the underlying issues. Collaborates with both end users and service providers to facilitate the resolution of these problems. Educates business departments on the significance of security threats and their potential implications. Investigates security solutions and informs management of new and emerging technologies.
Levels of Performance
Select the Level of Performance that best describes your claim.
In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you indicated you have no work experience related to this work behavior, type N / A in the box below.
If you have selected the level of performance pertaining to college coursework, please provide your responses to the three items listed below. If you indicated you have no education / training related to this work behavior, type N / A in the text box below.
WORK BEHAVIOR 4 - SECURITY DESIGN AND CUSTOMIZATION
Designs and customizes information technology security programs to ensure the confidentiality, integrity, and availability of systems and data. Develops IT security measures tailored to the needs of the system. Formulates detailed functional and technical specifications to define how programs interact with each other, the operations each program is permitted to execute, the requisite level of protection, and actions to be undertaken if established requirements are not met.
Levels of Performance
Select the Level of Performance that best describes your claim.
In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you indicated you have no work experience related to this work behavior, type N / A in the box below.
If you have selected the level of performance pertaining to college coursework, please provide your responses to the three items listed below. If you indicated you have no education / training related to this work behavior, type N / A in the text box below.
Required Question
Salary : $77,379 - $117,536