Globe icon Login icon Recap icon Search icon Tickets icon

Careers

Junior Cyber Security Analyst - Texas Rangers (Arlington · TX)

Texas Rangers jobs
Sports Jobs in Arlington · TX
Technical Services: IT Database Management/Services
*In order to be considered for this role, after clicking "apply now" above and being redirected, you must fully complete the application process on the follow-up screen. *

It's fun to work in a company where people truly BELIEVE in what they're doing!

We're committed to bringing passion and customer focus to the business.

JOB SUMMARY:  
The Analyst I performs two core functions for the organization. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may also include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The Analyst I is expected to be fully aware of the organization’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

ESSENTIAL FUNCTIONS OF POSITION INCLUDE, BUT ARE NOT LIMITED TO THE FOLLOWING:
  • Reports directly to the Director or Manager of IT Operations & Application Systems.
  • Participate in the planning and design of enterprise security architecture, under the direction of the Director or Manager of IT Operations & Application Systems and Director of IT Infrastructure, where appropriate.
  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the Director or Manager of IT Operations & Application Systems, where appropriate.
  • Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the Director or Manager of IT Operations & Application Systems and Director of IT Infrastructure, where appropriate.
  • Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
  • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
  • Work with the IT team to deploy, integrate, and configure all new security solutions and any enhancements to existing security solutions in accordance with standard best operating procedures and security documents.
  • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
  • Monitor all in-place security solutions for efficient and appropriate operations.
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
  • Participate in investigations into problematic activity.
  • Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.
  • Provide on-call support for end users for all in-place security solutions.
  • Other duties as assigned.

PREFERRED QUALIFICATIONS:
  • Bachelor or Associate degree in the field of Information Security or Information Technology and/or 3-5 years equivalent work experience.
  • One or more security industry certifications are preferred, but not required
  • Strong understanding of heuristic learning, anti-spam, phishing, and malware detection applications.
  • Strong understanding of security incident and event management tools.
  • Strong working knowledge of mobile device management, multi-factor authentication, SSO, and identity management tools.
  • Strong understanding of IP, TCP/IP, and other network administration protocols.
  • Strong understanding of firewalls, network access control systems, and cloud email systems.
  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues and products as required.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Team-oriented and skilled in working within a collaborative environment.
  • Provide in-person support for games, events, or other special circumstances requiring travel as needed.
  • On-call availability including some weekends, evenings, and holidays as assigned.
  • Sitting for extended periods of time.
  • Lifting and transporting of computers and peripherals up to, but not limited to, 80lbs.

The above statements are intended to describe the general nature and level of work being performed by people assigned to this job.  They are not intended to be an exhaustive list of all responsibilities, duties and skills required of the job.

If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!