The State Information Technology (IT) Security Specialist is responsible for determining solutions for network access problems and implementing statewide network security policies and procedures. This position is governed by state and federal laws and agency policy.
The formal education equivalent of a bachelor's degree in computer science, mathematics, or a related field; plus three years of experience in information technology security analysis and development or a related field. ORCompletion of technical training in computer science, data processing, or a related field acquired from a vocational, military or industrial setting; plus three years of experience in information technology security analysis and development or a related field. Additional requirements determined by the agency for recruiting purposes require review and approval by the Office of Personnel Management. OTHER JOB RELATED EDUCATION AND/OR EXPERIENCE MAY BE SUBSTITUTED FOR ALL OR PART OF THESE BASIC REQUIREMENTS, EXCEPT FOR CERTIFICATION OR LICENSURE REQUIREMENTS, UPON APPROVAL OF THE QUALIFICATIONS REVIEW COMMITTEE.
Determines problems and implements solutions for reported network access problems. Ensures network (LAN/WAN, telecommunications, and voice) security access and protects against unauthorized access, modification, or destruction. Trains users and promotes security awareness to ensure system security and to improve server and network efficiency. Monitors use of data files and regulates access to safeguard information in computer files. Analyzes network traffic and security system logs statewide to identify security threats and incidents. Encrypts data transmissions and erects firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. Documents computer security and emergency measures policies, procedures, and tests. Performs other duties as assigned.
Knowledge of LAN/WAN, telecommunications, voice, computer systems design, computer systems administration. Knowledge of writing computer programs for various purposes. Knowledge of security applications analysis, how a security application should work, and how changes in conditions, operations, and the environment will affect outcomes. Ability to determine causes of security software operating errors and determine solutions.
Employer Job Listing Link