Lead Information Security Analyst
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Information Security
FLSA Status
Exempt
Earliest Start DateImmediately
SalarySalary commensurate with experience
Hours per Week40.00 Standard from 8:00 AM to 5:00 PM
Hiring DepartmentInformation Security Office
Required Application MaterialsA resume and letter of interest is required to apply. Candidates under final consideration will also be required to submit professional references, college degree information, and employment history to an online third‑party vendor.
About UsFor more than 140 years, The University of Texas System has improved the lives of Texans — and people all over the world — through education, health care, and research. The System consists of nine academic institutions, four health institutions, and The University of Texas System Administration. The institutions of the UT System employ more than 160,000 faculty, health care professionals, researchers, support staff, and student workers.
The UT System Administration is primarily based in Austin, Texas. It supports the missions of the System’s thirteen institutions by providing financial, legal, planning, purchasing, government relations, communications, development, and other central services. Serving a growing state, the UT System Administration strives to provide a welcoming, supportive work environment that embraces different perspectives - not only because it enables the organization to be stronger, creative, and thoughtful, but because it is the right thing to do.
To that end, UT System Administration embraces state laws on military and former foster children employment preferences.
To manage and provide advanced technical expertise in the design, implementation, and maintenance of information security systems and processes. This position safeguards UT System Administration’s IT systems and networks against cyberattacks, intrusions, vulnerabilities, and data breaches. The Lead Information Security Analyst oversees a team of security analysts, directing day-to-day operations and ensuring alignment with the organization’s information security strategy under the direction of the Information Security Officer.
EssentialFunctions
- Supervise, mentor, and evaluate a team of information security analysts; set performance objectives, provide coaching, and foster professional development.
- Maintain, operate, and monitor enterprise security systems and tools; ensure appropriate administration of user access privileges and secure configurations.
- Lead in detecting, analyzing, and responding to cybersecurity incidents, including attacks, breaches, and identified vulnerabilities, and oversee remediation in accordance with security incident management procedures.
- Manage the vulnerability and patch management program, including scheduling scans, interpreting results, prioritizing remediation, and integrating with patching activities.
- Contribute to the development, implementation, and enforcement of security policies, procedures, and guidelines to meet compliance and regulatory requirements.
- Oversee “as is” and “to be” process analyses to identify improvements and support migration to more secure states of operation.
- Perform horizon scanning to evaluate emerging security threats, technologies, and risks, and advise leadership on strategic impact.
- Coordinate projects for security software installations and upgrades, ensuring resource alignment and timely completion.
- Provide second-tier support to IT teams for complex security issues, monitoring, and upgrades.
- Collect and translate business and technical requirements into security initiatives; ensuring alignment with organizational goals.
- Engage stakeholders to understand security needs and concerns, communicate initiatives, and build organizational commitment to security practices.
- Oversee team and individual compliance with UT System policies, standards, and applicable regulatory codes.
- Proven leadership and supervisory skills, including setting objectives, performance management, and team development.
- Advanced ability to detect, analyze, and respond to cybersecurity incidents and vulnerabilities.
- Strong knowledge of information security regulations, compliance standards, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).