About The Position

Are you looking for a rewarding career with an organization that values their staff? The Department of Innovation & Technology (DoIT) is seeking to hire qualified candidates with the opportunity to work in a dynamic, creative thinking, problem solving environment. This position serves as a Security Intelligence Analyst II with responsibilities including, but not limited to, vulnerability management, penetration testing, web application scanning, content management of enterprise security information and event management platform, threat hunting, and cyber threat intelligence. In this role, you will work with the Security Operations Center to respond to advanced threats and cybersecurity incidents impacting State of Illinois agencies. In addition, you will perform adversary emulation to identify potential weaknesses in security controls and gaps in defensive visibility and provide recommendations to best prevent, remediate, and detect potential threats and vulnerabilities.  If you possess these knowledges, skills, abilities and experience, we invite you to apply to join the DoIT team! Why Work for Illinois? Working with the State of Illinois is a testament to the values of compassion, equity, and dedication that define our state. Whether you’re helping to improve schools, protect our natural resources, or support families in need, you’re part of something bigger—something that touches the lives of every person who calls Illinois home. No matter what state career you’re looking for, we offer jobs that fit your life and your schedule—flexible jobs that provide the gold standard of benefits. Our employees can take advantage of various avenues to advance their careers and realize their dreams. Our top-tier benefits and great retirement packages can help you build a rewarding career and lasting future with the State of Illinois.

Requirements

  • Requires knowledge, skill, and mental development equivalent to completion of four (4) years of college with course work in computer science or directly related fields.
  • Requires three (3) years of professional experience in systems services, information security, cyber security, or a related Information Technology field.
  • Requires three (3) years of professional experience identifying systematic security issues through the analysis of vulnerability and configuration data, including evaluating computer systems for security violations, scanning for vulnerabilities, documenting identified weaknesses, and supporting investigative activities related to unauthorized access or system compromise.
  • Requires three (3) years of professional experience utilizing the following network protocols: Transmission Control Protocol/Internet Protocol (TCP/IP) and Dynamic Host Configuration Protocol (DHCP), or directory services such as Domain Name System (DNS)) in support of activities including network monitoring, packet-level traffic analysis, security validation, intrusion detection, and analysis of network behavior to identify anomalies or indicators of compromise.
  • Requires three (3) years of professional experience identifying and working with system and application security threats and vulnerabilities, including buffer overflow, mobile code, cross-site scripting, PL/SQL injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code, as a part of identifying weakness, performing adversary-style analysis, and recommending appropriate remediation measures.

Nice To Haves

  • Three (3) years of professional experience identifying systematic security issues through the analysis of vulnerability and configuration data, including evaluating computer systems for security violations, scanning for vulnerabilities, documenting identified weaknesses, and supporting investigative activities related to unauthorized access or system compromise.
  • Three (3) years of professional experience utilizing network protocols (e.g., Transmission Control Protocol/Internet Protocol (TCP/IP) and Dynamic Host Configuration Protocol (DHCP), or directory services (e.g., Domain Name System (DNS)) in support of activities including network monitoring, packet-level traffic analysis, security validation, intrusion detection, and analysis of network behavior to identify anomalies or indicators of compromise.
  • Three (3) years of professional experience identifying and working with system and application security threats and vulnerabilities, including buffer overflow, mobile code, cross-site scripting, PL/SQL injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code, as a part of identifying weakness, performing adversary-style analysis, and recommending appropriate remediation measures.
  • Three (3) years of professional experience identifying network attacks and the relationship of those attacks to threats and vulnerabilities, including recognizing anomalous activity, monitoring for unauthorized access, and assessing risks associated with disruptions or misuse of information systems.
  • Three (3) years of professional experience detecting host and network-based intrusions using intrusion detection technologies, such as Snort, including monitoring alerts, logs, and indicators of compromise.
  • Ability to perform packet-level analysis using appropriate tools, such as Wireshark and tcpdump to identify intrusions, troubleshoot network problems, detect malware activity, verify expected traffic behavior, and identify potential data exfiltration.
  • Ability to analyze data logically and exercise sound judgment in defining and evaluating problems of an operational or procedural nature.
  • Ability to gain and maintain effective working relationships with associates, vendors, clients, and others.
  • Developed verbal and written communication skills to present technical information clearly and precisely to diverse audiences, including business users, development teams, and agency executives.
  • Certifications in one or more of the following: EC Council Certified Ethical Hacker, Offensive Security Certified Professional (OSCP), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) or SANS GCIH Certification.

Responsibilities

  • Under administrative direction, serves as a Security Intelligence Analyst II for the Department of Innovation & Technology (DoIT), performing complex professional and advisory functions in System Services for the Cyber Intelligence Unit, including collaborating with the Security Operations Center to respond to advanced threats and cybersecurity incidents impacting the State of Illinois agencies.
  • Performs security validation to identify methods of gaining access to state agencies' computer systems by using common tools and techniques.
  • Identifies and assesses DoIT and other state agencies' computer system vulnerabilities and develops and recommends measures to safeguard systems before and after they are compromised.
  • Monitors network traffic by utilizing intrusion detection devices and other technologies to provide management with reports and system studies of operation, including performing security monitoring to confirm security practices and controls in place are being followed and are effective.
  • Participates in investigations of alleged computer security incidents and handles electronic evidence.
  • Keeps abreast of new developments in the information technology field by continuing education through online training platforms, meetings, training sessions, seminars, and conferences to increase familiarity with and remain current on products, vendors, techniques, and procedures.
  • Performs other duties as required or assigned which are reasonably within the scope of duties enumerated above.

Benefits

  • Competitive Group Insurance benefits including health, life, dental and vision plans
  • Flexible work schedules (when available and dependent upon position)
  • 10-25 days of paid vacation time annually (10 days for first year of state employment)
  • 12 days of paid sick time annually which carryover year to year
  • 3 paid personal business days per year
  • 13-14 paid holidays per year dependent on election years
  • 12 weeks of paid parental leave
  • Pension plan through the State Employees Retirement System
  • Deferred Compensation Program – voluntary supplemental retirement plan
  • Optional pre-tax programs -Medical Care Assistance Plan (MCAP) & Dependent Care Assistant Plan (DCAP)
  • Tuition Reimbursement Program and Federal Public Service Loan Forgiveness Program eligibility
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service