Cybersecurity Analyst II
Listed on 2026-01-05
-
IT/Tech
Cybersecurity
Direct message the job poster from Texas Health and Human Services
Nerd Hunter Extraordinaire | Building Strong Talent Pipelines | Fast-Paced Hiring with Lasting ImpactDate:
Dec 20, 2025
Location:
AUSTIN, TX, US, 78751
Join the Texas Health and Human Services Commission (HHSC) and be part of a team committed to creating a positive impact in the lives of fellow Texans. At HHSC, your contributions matter, and we support you at each stage of your life and work journey. Our comprehensive benefits package includes 100% paid employee health insurance for full‑time eligible employees, a defined benefit pension plan, generous time‑off benefits, numerous opportunities for career advancement and more.
Explore more details on the Benefits of Working at HHS webpage.
Functional
Title:
Cybersecurity Analyst II
Job Title: Cybersecurity Analyst II
Agency: Health & Human Services Comm
Department: CISO - DSHS 4.2.5
Posting Number: 11494
Closing Date: 02/19/2026
Posting Audience: Internal and External
Occupational Category: Computer and Mathematical
Salary Group: TEXAS-B-25
Salary Range: $5,797.66 - $7,976.00
Pay Frequency: Monthly
Shift: Day
Additional Shift: Days (First)
Telework:
Travel:
Regular/Temporary: Regular
Full Time/Part Time: Full time
FLSA Exempt/Non-Exempt: Exempt
Facility
Location:
Job Location City: AUSTIN
Job Location Address: 701 W 51ST ST
Other Locations:
MOS Codes: ,,,,,,,,8858,14N,14NX,170A 170B,17A,17B,17C,17C0,17DX,17S,17SX,17X,181X,182X,183X,184X,1B4X1,1D7X1,1N4X1,255A,255N,255S,25B,25D 26A,26B,26Z,514A,5C0X1D,5C0X1N,5C0X1R,5C0X1S,5IX,681X,682X,683X,781X,782X,783X,784X,CTI,CTM,CTR,CWT CYB
10,CYB
11,CYB
12,CYB
13,CYB
14,IS,ISM,ISS,IT,ITS
Job Description
Performs advanced (mid-level) information security analysis work, with a strong focus on cloud security and web application protection. Work involves assisting and monitoring security controls for on-premises and cloud-based information systems and infrastructure to regulate access to information resources and to prevent unauthorized modification, destruction, or disclosure of information. Researches, evaluates, and recommends security controls and procedures for the appropriate protection and reduction of risk for information resources.
Evaluates business objectives and advises business partners on the security and compliance requirements and risks within various business initiatives, particularly those involving cloud migration and web application deployments. Develops, recommends, and evaluates the implementation of plans designed to safeguard information systems and information resources against accidental or unauthorized modification, destruction, or disclosure for agency-administered systems and third‑party administered systems, including the configuration and management of Web Application Firewalls (WAF).
Assists with developing system security plans and corrective action plans to protect information systems and information resources from unauthorized users. Independently interfaces with executive management throughout the agency and enterprise to assist the CISO in delivering the Information Security Program. Works under limited supervision, with considerable latitude for initiative and independent judgment.
This position is open to permanent residents or US citizens only.
Essential Job Functions (EJFs)- (30%) Provides security and risk management services by performing risk identification, assessment, and remediation, as well as regulatory and internal compliance monitoring. Uses established standards and processes to adequately protect HHS personnel, facilities, cloud infrastructure, information, and business operations. Performs risk management through the assessment and evaluation of risk within information resources, technology, and procedures to ensure business operations can deliver services efficiently and effectively.
Activities include cyclical and periodic technology risk assessments of cloud (e.g., Azure, AWS) and on-premises environments, reviews of technology use within business initiatives, web application security analysis, vulnerability analysis, and evaluations of emerging threats. - (30%) Performs needs assessment to identify requirements of…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).