We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

INFORMATION SECURITY ANALYST-JUNIOR - 04292025- 67377

State of Tennessee
United States, Tennessee, Nashville
Apr 29, 2025

Job Information

State of Tennessee Job Information
Opening Date/Time 04/29/2025 12:00AM Central Time
Closing Date/Time 05/19/2025 11:59PM Central Time
Salary (Monthly) $4,517.00 - $5,638.00
Salary (Annually) $54,204.00 - $67,656.00
Job Type Full-Time
City, State Location Nashville, TN
Department Finance and Administration

LOCATION OF (1) POSITION(S) TO BE FILLED: DEPARTMENT OF FINANCE & ADMINISTRATION, BUSINESS SOLUTIONS DELIVERY DIVISION, DAVIDSON COUNTY

This position is designed as Hybrid.

This position requires CJIS fingerprint check. This position also requires a criminal background check. Therefore, you may be required to provide information about your criminal history to be considered for this position.

Qualifications

Education and Experience: Graduation from an accredited college or university with a bachelor's degree and experience equivalent to one year of experience in 1) information security program design and implementation, or 2) information security risk analysis and mitigation, or 3) information security policy, standards and procedures creation and implementation.
Substitution of Graduate Course Work for Experience: Additional qualifying graduate course work in information security may substitute for the required experience, on a year-for-year basis, to a maximum of one year (e.g. 36 graduate quarters hours in information security may substitute for one year for the required experience)
Substitution of Experience for Education: Qualifying experience in one or a combination of the following area may substitute for the required education, on a year-for-year basis, to a maximum of four years: 1) information security program design and implementation, or 2) information security risk analysis and mitigation, or 3) information security policy, standards and procedures creation and implementation, or 4) computer security incident response.
Necessary Special Qualifications: None.
Examination Method: Education and Experience,100%, for Preferred Service positions.

Overview

Summary: Under direction, is responsible for supporting information security efforts regarding information security risk assessment and mitigation, information security policy promulgation and compliance, security awareness training work of average difficulty and performs related work as required.
Distinguishing Features: An employee in this class participates in the security program for an agency. Work involves security policy promulgation, risk analysis, safeguard and compliance efforts, and incident response. This class differs from that of Information Security Analyst-Senior in that incumbents of the latter are responsible for directing and leading security policy promulgation, risk analysis, safeguard and compliance efforts, and incident response and have responsibility for supervising subordinate employees.

Responsibilities

Identifying Objects, Actions, and Events:
  1. Identify security breaches.
  2. Identifies and analyzes areas of potential risk to assets, resources or success of organization.

Analyzing Data or Information:

  1. Utilize forensic techniques to analyze security events.
  2. Analyze security operations to identify risk or opportunities for improvement.

Interacting With Computers:

  1. Encrypt data transmission to conceal confidential information as it is being transmitted and keep out tainted digital transfers.
  2. Advises, implements and maintains security systems.
  3. Analyzes and investigates intruder detection or other security systems.
  4. Encrypt data at rest to conceal confidential information.

Thinking Creatively:

  1. Mitigate situations that might lead to security breaches.
  2. Recommend ways to conduct assessments to reduce risk.
  3. Identify key risks and mitigating factors of potential investments, such as asset types and values, legal and ownership structures, professional reputations, customer bases or industry segments.

Monitor Processes, Materials, or Surroundings:

  1. Monitors systems to ensure current updates and patch levels are applied.
  2. Monitors use of data files and regulate access to safeguard information in computer resources.

Developing Objectives and Strategies:

  1. Develops or review specifications for design or construction or implementation of security in systems.
  2. Plans and contribute to development of risk management systems.

Training and Teaching Others:

  1. Evaluates and modify training materials to address security weaknesses and vulnerabilities.
  2. Trains users and promote security awareness to ensure systems security and to improve server and network efficiency.

Making Decisions and Solving Problems:

  1. Determine escalation for security events.

Updating and Using Relevant Knowledge:

  1. Recommend improvements in security systems or procedures.

Processing Information:

  1. Conduct security audits to identify potential problems related to physical security, staff safety, or asset protection and to satisfy state and federal regulations.

Evaluating Information to Determine Compliance with Standards:

  1. Performs risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  2. Evaluate security operations to identify risk or opportunities for improvement.
  3. Reviews violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  4. Confer with users to discuss issues such as computers data access needs security violations, and programming changes.
  5. Conduct physical examinations of property to ensure compliance with security, policies and regulations.

Documenting/Recording Information:

  1. Prepares, maintains, or updates security procedures, security system drawings, or related documentation.
  2. Documents and ensure communication of key risk.
  3. Maintain input or data quality of systems.

Establishing and Maintaining Interpersonal Relationships:

  1. Establishes and maintains contact with peers.

Selling or Influencing Others:

  1. Convey the importance of security recommendations, procedures, policies and level of risk to protect state resources.

Judging the Qualities of Things, Services, or People:

  1. Evaluate the knowledge and responsiveness of contractors to accomplish organizational outcomes.

Getting Information:

  1. Gather risk-related data from internal or external resources.
  2. Utilizes helpdesk automated systems.
  3. Utilize communication channels such as, email and messaging.

Communicating with Persons outside Organization:

  1. Notify customers of potential security threats.
  2. Notify customers of security changes that may affect their access.

Interpreting the Meaning of Information for Others:

  1. Produce reports or presentations that outline findings, explain risk positions, or recommend changes.

Inspecting Equipment, Structures, or Material:

  1. Inspects access control.

Competencies (KSA's)

Competencies:
  1. Process Management
  2. Decision Quality
  3. Total Work Systems
  4. Technical Learning
  5. Learning on the Fly
  6. Informing
  7. Standing Alone
  8. Business Acumen
  9. Timely Decision Making
  10. Customer Focus
  11. Dealing with Ambiguity
  12. Strategic Agility

Knowledge:

  1. Clerical
  2. Communication and Media
  3. Basic Knowledge of Computers and Electronics
  4. Customer and Personal Services
  5. Education and Training
  6. Basic Knowledge of Engineering and Technology Systems
  7. Law and Government
  8. Mathematics
  9. Basis Knowledge of Public Safety and Security
  10. Basic Knowledge of Defense in Depth
  11. Computer Operating Systems
  12. Basic Knowledge of Security Best Practices
  13. Regulatory and Statutory Requirements
  14. Telecommunications

Skills:

  1. Equipment Maintenance
  2. Installation of Security Equipment or Software
  3. Operation and Control
  4. Operation Monitoring
  5. Basic Operations Analysis
  6. Programming
  7. Quality Control Analysis
  8. Basic Troubleshooting
  9. Basic System Analysis
  10. Time Management
  11. Active Learning
  12. Active Listening
  13. Critical Thinking
  14. Learning Strategies
  15. Mathematics
  16. Monitoring
  17. Reading Comprehension
  18. Science
  19. Speaking
  20. Writing
  21. Basic Coordination
  22. Instruction
  23. Negotiation
  24. Persuasion
  25. Basic Service Orientation
  26. Basic Social Perceptiveness

Abilities:

  1. Category Flexibility
  2. Deductive Reasoning
  3. Flexibility of Closure
  4. Fluency of Ideas
  5. Inductive Reasoning
  6. Information Ordering
  7. Mathematical Reasoning
  8. Memorization
  9. Number Facility
  10. Oral Expression
  11. Originality
  12. Perceptual Speed
  13. Problem Sensitivity
  14. Selective Attention
  15. Speed of Closure
  16. Time Sharing
  17. Visualization
  18. Written Comprehension
  19. Written Expression
  20. Stress Tolerance

Tools & Equipment

  1. Computer
Applied = 0

(web-94d49cc66-9tddw)