×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Regional Security Operational Center Cybersecurity Analysts -II

Job in San Angelo, Tom Green County, Texas, 76902, USA
Listing for: Angelo State University
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 55000 - 73000 USD Yearly USD 55000.00 73000.00 YEAR
Job Description & How to Apply Below
Position: Regional Security Operational Center Cybersecurity Analysts I-II

Job Title: Regional Security Operational Center Cybersecurity Analysts I-II

Position Number: 977490

Department: Regional Security Operations Center

Salary: $55,000 - $73,000

Remote: No

Overview

Working under the direction of the RSOC Regional Security Operations Center Analyst Team Lead, performs highly complex cybersecurity analysis work. Work involves coordinating and/or planning, implementing, and monitoring security measures for the protection of information systems and infrastructure. Supervises the work of other student analysts. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment. Trains interns and assists in the educational process of the RSOC.

Responsibilities include, but are not limited to training/mentoring employees and student analysts setting work priorities or schedules, and monitoring work. This position is funded by a grant. Continued employment beyond the term of the grant is not guaranteed.

Typical Duties /

Job Duties
  • Assist the Regional Security Operations Center Analyst Team Lead with training of student analysts and performing operations of the RSOC. Responsible for ongoing communication and collaboration with ASU customers, peer team members, ASU leadership, analysts and contractors. Supervises analysts and interns working in the Regional Security Operations Center.
  • Serves as a mentor for future cybersecurity professionals and help develop their careers and leadership potential. Mentor and guide RSOC cybersecurity team members and students to sustain the technology service delivery model and help them achieve their individual career goals. Ensure that overall RSOC services are delivered in a quality manner that meets or exceeds our customers’ needs.
  • Promote communication to the RSOC Manager by soliciting input of current issues and upcoming technical changes from all areas so that the team can develop a communication plan including appropriate channels and timing. Assists in providing oversight on the prioritization, selection, and implementation of cybersecurity services. Provide inputs and guidance in the support of the RSOC to local and regional customers.

    Assist in coordination of institutional and state reporting deadlines including budget, departmental objectives and tasks and DIR reporting requirements. Collaborate with the Information Security Team to ensure security policies and standards are followed and enforced.
  • Promotes a continuous improvement model that utilizes a foundation of best practices that supports ASU’s mission to ensure effective service delivery and customer satisfaction by leveraging the RSOC resources and vendor relationships. Provide guidance and input to teams in the delivery of cybersecurity services through the use of standard project management methodologies. Guide and direct teams to ensure that activities and deliverables are met in a timely fashion and that the customer expectations are met or exceeded for the new service.
  • Provide input and suggestions to help grow ASU Regional Security Operational Center services through collaboration with the ASU community, peer institutions, state requirements, and industry trends. Provide inputs for capacity planning and improving management of the university’s RSOC infrastructure.
  • Perform other duties as assigned.
  • Knowledge,

    Skills and Abilities

    Knowledge

    • Cybersecurity operations processes and essential security program functions, including:
      • Event monitoring and SIEM technologies
      • Risk management
      • Vulnerability scanning and management
      • Access controls and authentication measures
    • Evaluation of systems and procedures to protect data systems and databases from unauthorized access
    • Information security frameworks and cybersecurity frameworks, as well as regulatory/compliance mandates
    • Risk assessment methodologies, IT auditing for compliance requirements, and framework gap analysis
    • Penetration testing, application security testing, vulnerabilities, and exploit techniques
    • Network and security architecture principles, including:
      • Firewall and IDS/IPS fundamentals
      • Endpoint security systems
      • Other security protective/detective systems

    Skills

    • Working independently, establishing…
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary