General Information


Job Description IT SECURITY ANL 3 Working Title IT Security Analyst
Job Code 007338 Grade 23
Department Name SOM Finance and Admin Dept - D02013 Department Head Simon Linwood
Supervisor Matthew Summerville Effective Date
Position(s) Directly Supervised
Job Code Title FTE

Generic Scope
Experienced professional who knows how to apply theory and put it into practice with in-depth understanding of the professional field; independently performs the full range of responsibilities within the function; possesses broad job knowledge; analyzes problems/issues of diverse scope and determines solutions.

Custom Scope
Applies skills as a seasoned, experienced IT security professional with a full understanding of industry practices, governmental regulations and campus, medical center or Office of the President policies and procedures to resolve a wide range of complex issues. Demonstrates competency in recommending methods and techniques to obtain results.

Department Custom Scope
The IT Security Analyst protects and defends UCR School of Medicine and UCR Health's information technology systems, networks, and data through cyber defense analysis, incident response, and vulnerability assessment and management. This involves analyzing security events and incidents, implementing security controls, configuring and managing security systems, conducting vulnerability scans and assessments, and performing various IT security-related tasks. Identifies anomalous network activity and potential threats to network resources, tracks and documents security incidents from initial detection through final resolution, writes and publishes cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. Works with stakeholders to resolve computer security incidents and vulnerability compliance, performs risk and vulnerability assessments of relevant technology focus areas, and makes cybersecurity recommendations to leadership based on relevant threats and vulnerabilities. Must be proactive in identifying potential security threats and vulnerabilities to maintain the security and integrity of institutional information and infrastructure.

Education & Experience Requirements

Education Requirements
Degree Requirement
Bachelor's degree in related area and/or equivalent experience/training. Required

Experience Requirements
Experience Requirement
4 - 7 years of related experience. Required
Experience completing vulnerability scanning and risk assessments Preferred
Experiencing performing log review and analysis Required
Experience conducting security event triage, incident response, and/or digital forensics Required
Experience conducting security risk assessment Preferred
Experience managing security tools Preferred
Related experience in healthcare industry Preferred

License Requirements
License Requirement
Must possess or obtain a Valid CA Drivers License in acccordance with the California Department of Motor Vehicles, if driving a university/personal vehicle for university related business Preferred

Certification Requirements
Certification Requirement
Information Security certification such as CEH, CASP+, CISSP, etc. Preferred

Educational Condition Requirements
Condition Requirement
If not already held, will obtain Security+ or above certification within 3 months of appointment date Required

Key Responsibilities

Description % Time
Collects, examines, analyzes and reports to management regarding the causes, effects and implications of security incidents. Applies advanced IT security concepts, governmental regulations, departmental and campus, medical center or Office of the President policies and procedures to respond to and appropriately escalate complex IT security incidents.
  • Investigates, analyzes, and responds to immediate and potential threats, using advanced mitigation, preparedness, and response and recovery approaches to maximize survival of life, preservation of property, and information security. Collaborates with other IT professionals to develop and implement incident response plans that address a range of scenarios, such as malware attacks or network intrusions. May conduct a root cause analysis of a security breach to determine the scope of the incident, the impact on the organization, and potential remediation steps. Identifies the causes, effects, and implications of security incidents and applies IT security concepts, governmental regulations, and relevant policies to respond to incidents. Has a thorough understanding of policies and procedures governing the institution and maintains a high level of vigilance to ensure the security of institutional information and infrastructure.
40
Implements complex and/or moderate-scale security controls to prevent unauthorized access or changes to campus, medical center or Office of the President information, hardware, software and/or network infrastructure. Independently researches, analyzes and addresses attempted efforts to compromise security protocols. Advises departments on security prevention and best practices.
  • Performs ongoing monitoring and risk assessments of security databases, such as IA&M, Anti-Virus, Network, DLP, Group Policy, and other security logging systems, to identify vulnerabilities and recommend appropriate controls. Collaborates with other IT professionals to develop and implement security plans and incident response procedures, using tools such as firewalls, intrusion detection and prevention systems, and encryption software. Maintains service standards while resolving security control issues, including troubleshooting network security issues and providing technical support for security-related incidents.
20
Applies, configures and manages complex security systems. Administers complex security configurations to control access to hardware, software and networks. Applies advanced encryption methods.
  • Plan, configure, design, develop, implement, and maintain tools, systems, and procedures to ensure the integrity, reliability, and security of data, systems, and networks. Manage and administer security systems to control access to hardware, software, and networks, and apply advanced encryption methods to ensure the confidentiality and integrity of institutional data. Regularly reviews and assess the effectiveness of security systems and recommend improvements as needed.
15
Conduct vulnerability scans and assessments to identify potential risks to institutional information and infrastructure. Analyze vulnerability data and determine remediation requirements while assessing risk levels. Collaborate with business units and IT stakeholders to understand vulnerabilities and provide detailed vulnerability reports and remediation plans for management. Ensure prompt identification and resolution of potential risks to maintain the integrity and security of institutional information and infrastructure.
15
Performs various IT security-related tasks, including conducting risk assessments, organizing security awareness activities, and developing or updating security policies and procedures, as directed by management or outlined in organizational policies. Being proactive and taking the initiative to identify potential security threats and vulnerabilities is also crucial in maintaining the security and integrity of institutional information and infrastructure. Must be adaptable and flexible to perform additional IT security-related tasks as assigned.
10

Knowledge, Skills & Abilities

Knowledge/Skill/Ability Requirement
Ability to follow department processes and procedures. Required
Experience in incident response and digital forensics including data collection, examination and analysis. Required
Demonstrated skills applying security controls to computer software and hardware. Required
Knowledge of computer hardware, software and network security issues and approaches. Required
Experience using IT security systems and tools. Knowledge of data encryption techniques. Experience analyzing logs for security breaches. Required
Basic skill at reading and interpreting security logs. Required
Knowledge of other areas of IT, department processes and procedures. Required
Interpersonal skills sufficient to work effectively with both technical and non-technical personnel at various levels in the organization. Required
Ability to maintain confidentiality. Required
Demonstrated skill at administering complex security controls and configurations to computer hardware, software and networks. Preferred
Knowledge and experience in implementation of IT Security frameworks, such as CIS Critical Security Controls, NIST 800-66 rev 2, and/or NIST Cybersecurity Framework. Preferred
Demonstrated experience selecting and applying appropriate data encryption technologies. Preferred
Skill in reviewing logs to identify evidence of past intrusions. Preferred
Skill in using security event correlation tools. Preferred
Knowledge of adversarial tactics, techniques, and procedures, different classes of attacks and cyber attack stages, such as protecting a network against malware. Preferred
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy and various data privacy and security standards, including of Personal Health Information (PHI) Preferred
Knowledge of authentication, authorization, and access control methods including host/network access control mechanisms, network access, identity, and access management, and policy-based and risk adaptive access controls. Preferred
Ability to share meaningful insights about the context of an organization?s threat environment that improve its risk management posture. Preferred
Knowledge of computer networking concepts and protocols, and network security methodologies and ability to interpret the information collected by network tools and detect host and network-based intrusions using intrusion detection technologies Preferred

Special Requirements & Conditions
Special Condition Requirement
Must pass a background check. Required
Occasional travel for university related business meetings, conferences and/or professional development. Required
Ability to work periodically outside of Normal Business Hours as assigned. Required
Must be able to participate as part of the on-call rotation schedule for after hours support. Required
Travel Outside of Normal Business Hours Required

Other Special Requirements & Conditions

Level of Supervision Received
General Supervision

Environment

Working Environment
UC Intelli-Center: 14350 Meridian Pkwy, Riverside, CA

Other Requirements

Items Used
  • Standard Office Equipment

Physical Requirements
  • Squat : N/A
  • Stand : Occasionally
  • Bend : N/A
  • Sit : Constantly
  • Climb : N/A
  • Crawl : N/A
  • Walk : Occasionally

Mental Requirements
  • Read/Comprehend : Frequently
  • Write : Occasionally
  • Communicate Orally : Frequently
  • Reason & Analyze : Frequently
  • Perform Calculations : Occasionally

Environmental Requirements
  • Fumes : No
  • Is around moving machinery : No
  • Drives motorized equipment : No
  • Is exposed to marked changes in temperature and/or humidity : No
  • Dust : No
  • Is exposed to excessive noise : No
  • Works in confined quarters : No

Critical Position

Is Critical Position: Yes

More Information

General Campus Information

University of California, Riverside
900 University Ave.
Riverside, CA 92521
Tel: (951) 827-1012

Career OpportunitiesUCR Libraries
Campus StatusMaps and Directions

Department Information

Human Resources
1160 University Ave.
Riverside, CA 92521

Fax: (951) 827-6493
E-mail: jobshelp@ucr.edu

Footer