Please paste the following URL into a browser to view the entire job posting in the CAPPS Career Section: https://capps.taleo.net/careersection/ex/jobdetail.ftljob=00054788
You may apply to the job directly through the CAPPS Career Section. It is not necessary to apply both through Work In Texas and CAPPS Career Section
Job Posting:00054788Opened:12/10/2025Closes:12/31/2025Position Title:Cybersecurity Analyst III (Security Operations Center (SOC) Analyst)Class/Group:0321/B27Military Occupation Specialty Code:Army 17C, 25D, 170A, 255S; Coast Guard CYB10, CYB11, CYB12; Marine Corps 0681; Air Force 1D7X1, 1N4X1, 3D0X2; Space Force 514A, 5C0X1D, 5C0X1N, 5C0X1SFair Labor Standards Act Status:ExemptNumber of Vacancies:2Division/Section:Chief Operations Office / Cybersecurity OperationsSalary Range:$9,041.07 - $9,458.33 / monthlyDuration:RegularHours Worked Weekly:40Travel:OccasionalWork Location:506 Dolorosa Street / San Antonio, Texas 78204Web site:https://dir.texas.gov/Refer Inquiries to:People and Culture OfficeTelephone:(512) 475-4957 or (512) 463-5920How To Apply:Select the link below to search for this position: https://capps.taleo.net/careersection/ex/jobsearch.ftllang=en
Enter the job posting number 00054788 in the keyword search.You must create a CAPPS Career Section candidate profile or be logged in to apply.Update your profile and apply for the job by navigating through the pages and steps.Once ready, select and#8220;Submitand#8221; on the and#8220;Review and Submitand#8221; page.If you have problems accessing the CAPPS Career Section, please follow the instructions in the Resetting CAPPS Password for Job Candidate desk aid.Special Instructions:Applicants must provide in-depth information in theEXPERIENCE CREDENTIALSsection to demonstrate howthey meet the position qualifications. Incomplete applications may result in disqualification.Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in theEXPERIENCE CREDENTIALSsection of the application.Interview Place/Time:Candidates will be notified for appointments as determined by the selection committee.Selective Service Registration:Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.H-1B Visa Sponsorship:We are unable to sponsor or take over sponsorship of an employment Visa at this time.Equal Opportunity EmployerThe Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability. Please call 512-475-4922 to request reasonable accommodation.Position DescriptionWhat We DoWe are a technology agency powered by people.DIR offers secure, modern, and cost-effective technology to help government entities in Texas serve their constituents.DIR is a fast-paced and collaborative environment with highly motivated, innovative, and engaged employees dedicated to achieving the best value for the state. We have over 325 professionals working at DIR who are honored to serve as the cornerstone of public sector technology in Texas. By joining DIR, you will be an integral part of transforming how Texas government serves Texans.Position SummaryThis role supports Enterprise Cybersecurity Operations at DIR, focusing on protecting data from cyber-related attacks. Employees in this role typically monitor for any trace of invasion or improper access of data by performing threat and incident detection, incident response, and forensics activities. The Cybersecurity Analyst performs highly complex (senior-level) cybersecurity analysis work. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, and software security services. May supervise the work of others. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.and#183; Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems including endpoint detection response tools; Performs cybersecurity incident detection, analysis, and prevention.and#183; Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use, assists in advising management and users regarding security procedures.and#183; Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.and#183; Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.and#183; Performs forensic analysis of network traffic logs and security tools to support incident investigations.and#183; Reviews operational solutions to ensure compliance with approved security practices; Maintains up-to-date knowledge of cybersecurity vulnerabilities, exploits, and threats especially emerging threats.and#183; Works as a first responder and security incident handler to security incidents across DIRand#8217;s shared services programs. Participates in an on-call rotation for security incidents and may occasionally manage multiple projects.and#183; Performs other work-related duties as assigned.
Qualifications: Educationand#183; Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field.and#183; Additional work-related experience may be substituted for each year of formal education. (High School diploma or equivalent certificate required.)Experience and Training Requiredand#183; Five (5) years of progressively responsible experience in the IT industryand#183; Three (3) years of progressively responsible experience in IT security analysis or IT security managementand#183; Experience in security policy or process development and implementationand#183; Experience in implementing security platforms, processes, and toolsand#183; Experience with security tools and platforms such as intrusion detection systems (IDS)/intrusion protection systems (IPS), security information/event management (SIEM), audio/video(A/V), Firewalls, vulnerability scanning, penetration testing, and cloud security services and controls.and#183; Experience with detecting and assessing threats such as network and asset vulnerabilitiesand#183; Experience operating an anti-virus productExperience and Training Preferredand#183; Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), GIAC Security Essentials Certification (GSEC), Certified Ethical Hacker (CEH) or equivalent certification.and#183; Experience in cybersecurity analysis or cybersecurity management in state government or other highly regulated environments.and#183; Experience in security incident handling, investigation, and/or responseand#183; Experience and training in analyzing, recommending, developing, and implementing cogent enterprise-wide cybersecurity policies, standards, and guidelinesand#183; Experience working with state or federal IT regulatory issues and processesand#183; Experience in hands-on support of heterogeneous enterprise class networks (20,000 devices).and#183; Experience with operating an endpoint protection platform such as McAfee or Crowdstrikeand#183; Experience in a l