Under limited supervision the Information Security Analyst (ISA) is responsible to plan, design, document, and implement security measures to protect the Polk County Property Appraiser’s (PCPA) computer networks and systems from cyber-attacks. The ISA will lead PCPA efforts to develop organization wide best practices for Information Technology (IT) security. The Information Security Analyst plays a vital role in keeping PCPA sensitive information secure and will work with all PCPA departments to identify and correct defects in security systems, solutions and programs while recommending and implementing specific measures that can improve the PCPA overall security posture. Salary commensurate with experience.
-
Responsible to ensure PCPA digital assets are protected from unauthorized access by monitoring security access, performing internal and external security audits, and conducting security assessments through vulnerability testing and risk analysis.
-
Aims to expose weak points and identify potential threats that allows the PCPA to protect itself from malicious hackers. This includes penetration testing on networks, computers, web-based applications, and other systems to detect exploitable vulnerabilities.
-
Must organize and coordinate technical vulnerability assessments, including systems and network vulnerability assessments, penetration testing, web application assessments, wireless security assessments and implement secure infrastructure solutions.
-
Recommend the technical direction for managing security incidents, and ensure the integrity of the resulting process and approach.
-
Responsible to update PCPA security policies, create documentation, and plan for all security-related issues, including incident response and disaster recovery planning and testing.
-
Manages daily reporting and follow-up tasks from PCPA Security Event Management (SEM) tools. This tasks includes validating results to remove false positives and ensuring necessary remediation steps are completed.
-
Monitors network traffic to detect potential threats and then responds to these threats promptly.
-
Manages the negative effects of any and all cyber-attacks or breaches, from minimizing the impact to altering security controls for future prevention.
-
Coordination of the Phishing and Security Awareness campaign.
-
Generates reports for IT administrators and business managers to evaluate the efficacy of the security policies in place.
-
Performs PC security audits, executes web application penetration testing, manages and tests Web Content Filtering Solutions, periodically executes/validates vulnerability scans on servers, and presents discovered issues to relevant parties for remediation.
-
Creates training programs and modules to educate employees and users on proper security protocols.
-
Maintains asset inventory and ensures hardware/software license compliance.
-
Verifies the security of third-party vendors and collaborates with them to meet security requirements.
-
Executes Staff Exit Procedures.
-
Must stay up-to-date on the latest trends in cyber security, information technology, and security standards.
-
Develops plans to monitor use of data files and implements protocols to safeguard computer files against accidental or unauthorized access, modification, destruction, or disclosure.
-
Maintains the confidentiality of personal identifying and location information including: names, physical, mailing, and street addresses, parcel ID, legal property description, neighborhood name, lot number, GPS coordinates, or any other descriptive property information that may reveal identity or home address pertaining to parcels owned by individuals that have received exempt / confidential status.
-
Performs other duties as assigned and must participate in departmental meetings, cross-training, educational courses, seminars, and job-sharing / job duty organizational efforts as directed.
Education and/or Work Experience
Any combination equivalent to experience and education that would likely provide the relevant knowledge, skills, and abilities would be qualifying. A typical way to obtain the knowledge and abilities would be:
Education: Bachelor’s degree in computer science, cybersecurity, information technology, programming, database administration, or a related field – OR –
Experience: Level I – Two or more years’ experience in information security, development, network analysis, or related field
Level II – Four or more years’ experience in information security, development, network analysis, or related field
Level III – Six or more years’ experience in information security, development, network analysis, or related field
NOTE: Each year of required education may be substituted by two (2) years of work experience. Each year of required experience may be substituted by two (2) years of additional education.
Certificates, licenses, registrations
Position requires driving and/or securing transportation to worksite, off-site training, field testing applications, and occasional travel to satellite offices on short notice.
PREFERRED: CompTIA A+, CompTIA Net+ certification, CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), CISA (Certified Information Security Auditor), GCIH (GIAC Certified Incident Handler), Certified Information Systems Security Professional (CISSP), Information Systems Security, Architecture/Engineering/Management Professional (CISSP-ISSA/E/MP), or other approved and related IT Security professional certification.