Onsite Network Security Engineer; Local prefer Public Sector exp
Job in
Austin, Travis County, Texas, 78716, USA
Listed on 2025-12-27
Listing for:
TexcelVision Inc.
Full Time
position Listed on 2025-12-27
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Systems Engineer, IT Consultant
Job Description & How to Apply Below
Scope/Description of Services
This position requires at least one day a week in the CISO office.
- Perform advanced (senior level) cybersecurity analysis work essential for TWC Information Technology (IT) to fulfill its mission of service to people who live in Texas.
- Work involves protecting cybersecurity cloud assets and delivering cybersecurity threat assessment, cyber intelligence, software security, and vulnerability assessment services.
- Collaborate with mixed-matrixed or multi-discipline teams across the agency in cybersecurity-related decision-making, providing guidance and oversight in the implementation of improvements.
- Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data.
- Document and address organization’s information security, cybersecurity cloud architecture, and systems security engineering requirements throughout the acquisition life cycle.
- Ensure that acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity cloud architecture guidelines.
- Identify and prioritize critical business functions in collaboration with organizational stakeholders by performing security reviews, identifying gaps in security architecture, and developing security risk management plans and system security plans.
- Evaluate cloud security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
- Monitor IT security related websites, newsgroups, organizations and publications. Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document them appropriately.
- Work under minimal supervision, with extensive latitude for the use of initiative and independent judgment.
- Work may involve occasional travel to other locations/work sites to perform TWC services.
- After hours support may be required to respond to security incidents.
- Perform other duties as assigned to maintain operations.
- 8+ years Graduation from an accredited four-year college or university with major coursework in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems or a related field. Full-time qualifying work experience may be substituted for each year of the required education (one year = 30 semester hours).
- 8+ years Experience in cybersecurity analysis, or information security analysis.
- 8+ years Experience in security and/or enterprise architecture development, implementation, and management.
- 8+ years Experience in conducting security risk assessments and/or audits of policies, standards, procedures, and technical environments within state and federal statutes, regulations, and standards relating to information security and computer crime.
- 8+ years Excellent communication and presentation skills with the ability to articulate technical issues to all levels.
- 8+ years Strong consultative, analytical, and problem-solving skills.
- 8+ years Skills in translating operational requirements into protection needs (i.e., security controls) and to apply cyber security and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation.)
- 8+ years Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- 8+ years Skills in applying network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth); to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
- 8+ years Being self-motivated, proactive, work independently, and effectively manage your time.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×