Texas Comptroller of Public Accounts
Temporary Position – Summer Internship position will begin June 1, 2020 and end on August 14, 2020 (40 hours per week).
Please note: Interns are responsible for their own housing and transportation. We do not offer housing support however, if you live outside of the Austin area and need assistance with housing referrals or housing search support, contact us at 512-475-3560.
APPLICATIONS MAY BE FILED ONLINE AT:
All applications must contain complete job histories, which includes job title, dates of employment, name of employer, supervisor's name and phone number and a description of duties performed. If this information is not submitted, your application may be rejected because it is incomplete. Resumes do not take the place of this required information.
DIVISION: Information Technology
GENERAL DESCRIPTION: Performs highly complex (senior-level) clerical work regarding cybersecurity analysis. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services. Works under limited supervision, with moderate latitude for the use of initiative and independent judgment.
WORK HOURS: The position works an eight-hour schedule between 7:00 am and 6:00 pm, 40-hour week, Monday – Friday with occasional work schedule variance as necessary. Occasionally work overtime and/or additional hours. Hours may change based on business need.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
- Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.
- Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.
- Monitors network traffic and flow for analysis.
- Performs cybersecurity incident detection, analysis, and prevention.
- Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses.
- Performs forensic analysis of information systems and portable devices and forensic recovery of data using assessment tools.
- Researches and analyzes cybersecurity threat indicators and their behaviors and recommends threat mitigation strategies.
- Researches cybersecurity and privacy legislation, regulations, advisories, alerts, and vulnerabilities.
- Evaluates network and system security configuration for best practices and risk-based access controls.
- Assists in identifying and evaluating new cybersecurity technologies to remediate vulnerabilities.
- Assists in advising management and users regarding security procedures.
- Implement and maintain enterprise security systems including Anti-Virus, DLP, SIEM systems, vulnerability scanners and security information management tools.
- Implement and maintain security controls for infrastructure systems including servers, workstations, web and other applications.
- Support and if appropriate lead incident response activities including coordination of immediate corrective action to systems known to have any security weaknesses or vulnerabilities, including network isolation, re-configuration and installing appropriate patches or upgrades
- Troubleshoots complex systems problems related to network, security, infrastructure and application information systems
- Provide ongoing monitoring of sources of information on potential threats and vulnerabilities, including hacker web sites, anti-virus vendors, other government agencies and trade publications.
- Performs other related duties as assigned
Currently enrolled in an accredited college or university, or recently graduated within the past 6 months
Current enrolled in an accredited college or university with a degree plan in in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems
Professional or academic experience in cybersecurity analysis, information security analysis, or digital forensics
Security+ or GCIA is preferred
The physical demands described here are represented of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
This position requires the incumbent to primarily perform sedentary office work; however, mobility (standing and walking) is routinely required to carry out some duties. It requires extensive computer, telephone and client/customer contact. The job also requires normal cognitive abilities requiring the ability to learn, recall, and apply certain practices and policies. It requires the stamina to maintain attention to detail despite interruptions. Marginal or corrected visual and auditory requirements are required for reading printed materials and computer screens and communicating with internal and external customers. Must be able to lift at least 25 pounds.
KNOWLEDGE SKILLS AND ABILITIES:
- The limitations and capabilities of computer systems and technology.
- The limitations and capabilities of operational support of networks, operating systems (Windows & Linux), Internet technologies, databases, and security infrastructure.
- The limitations and capabilities of cybersecurity and information security controls, practices, procedures, and regulations.
- The limitations and capabilities of incident response program practices and procedures.
- Programming Concepts
- Digital Forensic Analysis
- Malware Analysis
- Principles of Information Systems for Management
- Secure Network Design Principles (i.e. Defense in Depth, Compartmentalization, Segmentation, Weakest Link)
- Strategies to organize and plan how much time should be committed to specific activities to ensure optimal use of resources
- Architecting, implementing and administering security technologies (IPS, DLP, SIEM Applications Scanners, System Scanners)
- Working with others to achieve a common goal (Teamwork)
- Effectively conveying information and encouraging an exchange of ideas (Communication)
- Identifying, defining and solving problems (Problem Solving)
- Communicate effectively and correctly in writing and verbably on a variety of business matters as requested.
- Resolve complex security issues in diverse and decentralized environments.
- Learn new complex and technical concepts and apply appropriately (e.g. Application Whitelisting, Endpoint Detection and Response, Security Incident and Event Management)
- Plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls
- Adjust to changing workplace demands (Adaptability)
- Meet the needs and expectations of internal and external customers (Customer Service)
- Effectively demonstrate skill and ability to perform the specific job duties and tasks as defined by a job description (Technical Competence)
- Be dependable, meet deadlines and produce high-quality work (Workload Management/Productivity)
In order to receive veteran’s preference a copy of your DD214, VA disability rating (if applicable) or a DD1300 must be attached to your application.
Veterans, Reservist or Guardsmen with an MOS or additional duties that fall in the fields of LS, PS, AZ, 15P, 42A, or other related fields pertaining to the minimum experience requirements may meet the minimum qualifications. Please call Human Resources, CPA Veterans Liaison at 512-475-3560/800-531-5441 for more information or assistance.
Go to http://www.texasskillstowork.com, http://www.onetonline.org, or www.careeronestop.org for assistance translating your military experience and training courses into civilian job terms, qualifications/requirements and skill sets.
Additional Military Crosswalk information can be found at: http://www.hr.sao.state.tx.us/Compensation/JobDescriptions.aspx
We fully recognize, honor and enforce the Uniformed Services Employment and Reemployment Rights Act (USERRA) and encourage opportunities to hire Veterans, Reservists and Guardsmen.
IMPORTANT NOTES TO THE CANDIDATE:
Candidates may be asked to participate in a skills demonstration and/or presentation.
Salary is contingent upon qualifications and is subject to salary administration and budgetary restrictions.
CPA employees in the same job classification, if selected, will be laterally transferred with no increase in salary. (An example might be an Accounts Examiner III in Revenue Administration who moves to an Accounts Examiner III in the Enforcement division.)
Complete copies of college transcripts must be furnished to the divisional hiring representative at the time of the interview for positions requiring a college degree, and/or specific educational credits.
Unless otherwise indicated on specific postings, regular attendance is an essential job requirement of all positions. Your application for employment with the Comptroller of Public Accounts may subject you to a criminal background check. All positions requiring a degree and/or licensing require proof of degree and/or license at time of interview. If you are scheduled for an interview and require any reasonable accommodation in our interview process, please inform the hiring representative who calls you to schedule your interview. Whenever possible, please give the hiring representative sufficient time to consider and respond to your request. Only applicants scheduled for interviews will be contacted.
Thank you for considering employment at the Comptroller of Public Accounts! The Comptroller’s office is an equal employment opportunity employer.
Job Types: Full-time, Temporary, Internship
Salary: $2,464.00 /month
- One location
- Health insurance
- Dental insurance
- Vision insurance
- Retirement plan
- Paid time off
- Flexible schedule
- Parental leave
- 1 - 3 months
This Job Is:
- A good job for someone just entering the workforce or returning to the workforce with limited experience and education
- Open to applicants who do not have a college diploma
- Monday to Friday
- Day shift