Educause Security Discussion mailing list archives

Opening for Senior Information Security Analyst at Washington State University


From: "Kunkel, Matthew L" <mattku () WSU EDU>
Date: Sat, 28 Mar 2015 00:16:52 +0000

Washington State University currently has an opening for a Senior Information Security Analyst.  Please feel free to 
share with any relevant parties.

https://www.wsujobs.com/postings/17028

Thanks and have a great weekend.

Matthew Kunkel
Associate CISO
Information Security Services
Washington State University
509.335.0897


Employee Type

AP-Administrative Professional

University Title

Information Systems Technology Strategist

Working Title

Senior Information Security Analyst

College/Area

Information Technology

Department

Vice President of ITS and CTO

Position Number

121047

Hiring Unit

Work Location

Pullman

This position is in a Bargaining Unit

No

Summary of Duties

WSU Information Security Services is looking for a dedicated, innovative, and detail-oriented Senior Information 
Security Analyst. You will lead WSU's operational information security efforts in helping to keep our students, 
faculty, and staff safe and secure online. You'll be an innovative creator who will design and implement processes and 
technologies that will improve the effectiveness, efficiency, and timeliness of operational security capabilities and 
services. You'll be responsible for ensuring that operational security services are provided consistently and within 
established delivery timeframes.
You will work as part of the larger Information Security Services Team to provide expert technical security consulting 
and support both in the central Information Technology Services area and to departmental IT organizations throughout 
the University. You'll also work as part of the larger Information Security Services Team to ensure technical security 
risks are appropriately mitigated during the planning and implementation of new information systems.
You will advise and provide research for Information Technology Services leadership on all aspects of information 
security architecture including emerging technologies, processes, policies, procedures, implementation and architecture 
roadmaps, establishing information system boundaries, technical and operational risk mitigation approaches, security 
alerts, and potential adverse effects of identified vulnerabilities.

Additional Information

Appointment Status

Permanent

Job Appointment (FTE%)

100

Monthly Salary

Commensurate with qualifications and experience





Position Qualifications
Required Qualifications

Positions require a Bachelor's degree and five (5) years professional experience OR a combination of education and 
experience totaling ten (10) years from which comparable knowledge and abilities are acquired.

Additional Requirements

- Working knowledge and experience with information security technologies, implementations, principles, and practices.
- Experience in information security incident response and analysis.
- Ability to analyze business requirements, assess the value of information technologies, and design information 
systems to meet business needs.
- Expert knowledge and understanding of security technologies including intrusion detection/prevention systems, 
firewalls, VPNs, vulnerability scanning, and security information and event management (SIEM) systems.
- Experience with security log review, correlation, and analysis.
- Experience with scripting, e.g. with the Python or Perl languages.
- Demonstrated customer service experience.
- Demonstrated ability to work independently and as a member of a team.
- Excellent verbal and written communications skills.

Preferred Qualifications

- Experience developing operational information security procedures and technical training materials.
- Demonstrated experience with working within formal project management frameworks.
- Experience with the Splunk application, to include developing searches, reports, and other automated routines.
- Experience with security reviews of firewall, file system, and other forms of access control lists.
- Experience with digital forensics software and processes.
- Demonstrated ability to appropriately prioritize multiple tasks, projects, or assignments.
- Expert knowledge of both Windows and Linux operating systems.




Current thread: