×
Register Here to Apply for Jobs or Post Jobs. X

Security Analyst P68

Job in Bryan, Brazos County, Texas, 77808, USA
Listing for: Texas A&M University
Full Time position
Listed on 2025-12-20
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 3896 - 5416 USD Monthly USD 3896.00 5416.00 MONTH
Job Description & How to Apply Below
Security Analyst I P68 page is loaded## Security Analyst I P68locations:
Bryan, TXtime type:
Full time posted on:
Posted Yesterday job requisition :
R-089808
** Job Title
** Security Analyst I P68
** Agency
* * Texas A&M University System Offices
** Department
* * Cyber Operations
** Proposed Minimum Salary
** Commensurate
* * Job Location
** Bryan, Texas
** Job Type
** Staff
* * Job Description
** The System Offices is one of several system members within the Texas A&M University System representing one of the largest systems of higher education in the nation, with a network of 12 universities, a comprehensive health science center, nine state agencies, and the RELLIS Campus. The Texas A&M University System mission is to provide education, conduct research, commercialize technology, offer training, and deliver services for the people of Texas and beyond.

The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive health benefits; paid vacation, sick leave, and holidays; a defined benefit retirement plan to include an employer contribution through Teachers Retirement System of Texas (TRS); if applicable, a defined contribution retirement plan to include an employer contribution through an approved ORP vendor: additional voluntary tax deferred annuity (TDA) options;

tuition assistance; and wellness programs to promote work/life balance.
** Salary:**$3,896.88 - $5,416.66 per month commensurate with experience.
** Job Description

Summary:

** The Security Analyst I, under general direction, analyze events that occur within the environment for the purpose of mitigating threats. The security analyst's primary focus will be investigating and responding to cyber threats.
** Responsibilities:**  - Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.  - Document and escalate incidents that may cause ongoing and immediate impact to the environment.  - Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.  - Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.  

- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.  - Other duties as assigned.
*
* Education and Experience:

**  - Bachelor’s degree in applicable field or equivalent combination of education and experience.  - Four months of information technology, information security or cybersecurity work experience.
*
* Knowledge, Skills and Abilities:

**  - Knowledge of computer networking concepts and protocols, and network security methodologies.  - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.  - Knowledge of cyber threats and vulnerabilities.  - Knowledge of adversarial tactics, techniques, and procedures.  - Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).  

- Skilled in researching vulnerabilities and exploits utilized in traffic.  - Skilled in using protocol analyzers.  - Skilled in performing packet-level analysis.  - Skilled in technical writing.  - Skilled in preserving evidence integrity according to standard operating procedures or national standards.  - Ability to interpret the information collected by network and host detection tools.  - Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.

- Ability to multi-task and work cooperatively with others.
** Other Requirements:
** This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job application data could result in your application being…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary