×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst

Job in Indianapolis, Hamilton County, Indiana, 46262, USA
Listing for: IN Auditor of State
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 61022 USD Yearly USD 61022.00 YEAR
Job Description & How to Apply Below
Location: Indianapolis

Work for Indiana

Begin a fulfilling career with the State of Indiana by joining one of the largest employers in the state, offering a range of opportunities across 60+ agencies. At the state, you'll find competitive compensation, a robust benefits package and a commitment to work-life balance. Most importantly, you'll have the chance to make a real and measurable impact on the lives of Hoosiers across Indiana.

About

the Family & Social Services Administration (FSSA):

FSSA was established by the Indiana General Assembly in 1991 to consolidate and better integrate the delivery of human services by state government. FSSA is a health care and social services funding agency. Ninety-four percent of the agency’s total budget is paid to thousands of service providers ranging from major medical centers to a physical therapist working with a child or adult with a developmental disability.

The seven care divisions in FSSA administer services to more than 1.5 million Hoosiers. FSSA’s mission is to compassionately serve Hoosiers of all ages and connect them with social services, health care and their communities.

Role Overview :

In this role, you will serve as the primary coordinator for the FSSA Privacy and Security Office (PSO) for activities pertaining to Indiana Executive Order EO-25-19 and as the primary point of contact for the FSSA Privacy and Security Office (PSO) for activities pertaining to use of Artificial Intelligence (AI). In this role, you will perform all procedures necessary to ensure that FSSA client data is secured from potential system, network, application, database, and web service exploitations.

The ideal candidate will have an understanding of requirements for cyber security procedures, strong familiarity with vulnerability management processes and supporting technologies. Knowledge of information security management controls relevant to vulnerability assessments, penetration testing, and SDLC security controls as identified in the National Institute of Standards and Technology NIST) guidelines are a plus. Also, knowledge of relevant state and federal legislation and regulatory laws pertaining to information system security and privacy (e.g. IC 16-39, IC 4-1-10, 45 CFR Parts 160 & 164, 42 CFR Part II, EO-25-19, etc.)

is a plus.

Salary Statement:

The salary for this position traditionally starts at $61,022.00 but may be commensurate with education or work experience.

A Day in the Life:

The essential functions of this role are as follows:

  • Assists in developing plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Monitors current reports of computer viruses to determine when to update virus protection systems.
  • Assists with data transmissions and helps build firewalls to conceal confidential information as it is being transmitted and to keep out corrupt digital transfers.
  • Performs risk assessments and executes tests of data processing systems to ensure functioning of data processing activities and security measures.
  • Assists with modifying computer security files to incorporate new software, correct errors, or change individual access status.
  • Supports violations of computer security procedures and discusses procedures with violators to ensure violations are not repeated.
  • Documents computer security and emergency measures policies, procedures, and tests.
  • Consults with users to discuss issues such as computer data access needs, security violations, and programming changes.
  • Monitors use of data files and regulate access to safeguard information in computer files.
  • Coordinates implementation of computer system plan with establishment personnel and outside vendors.
  • Trains users and promotes security awareness to ensure system security and to improve server and network efficiency.

The job profile is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Other duties, responsibilities and activities may change or be assigned at any time with or without notice.

This position is exempt from overtime compensation for additional work hours…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary