Senior Cybersecurity Analyst

The University of Texas at AustinAustin, TX
1d

About The Position

The Senior Cybersecurity Analyst serves as an advanced-level professional who leads the design, development, implementation and ongoing enhancement of complex cybersecurity programs and processes to protect organizational systems, networks, and data. Reporting to the Manager of Enterprise IT Security and Operations, this role provides leadership for strategic initiatives and program development within one or more assigned cybersecurity domains (e.g., incident response, vulnerability management, threat intelligence, risk management). The Senior Cybersecurity Analyst develops policies, procedures, playbooks/runbooks, and automation to strengthen the organization’s security posture. This role ensures alignment with regulatory frameworks such as HIPAA, FERPA, PCI DSS, GDPR, ISO 27001, and NIST and collaborates with IT and business leaders to integrate security into the SDLC and operational processes. Additionally, the Senior Cybersecurity Analyst mentors analysts and supports a risk-aware environment through outreach and education.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • 5 years of proven experience developing security incident response programs, and associated tooling.
  • Demonstrated expertise in security incident detection, investigation, and response.
  • Demonstrated knowledge of network protocols, operating systems, SIEM tools, and ITIL processes.
  • Experience with compliance frameworks including NIST CSF, NIST 800-53, and HITRUST.
  • Relevant education and experience may be substituted as appropriate.

Nice To Haves

  • Master’s degree in Cybersecurity or a related field.
  • 8 years of experience with network scanning, cloud security, Risk Management Frameworks (RMF), threat intelligence programs, vulnerability management programs, and security orchestration, automation, and response (SOAR) platforms.
  • 4 years of experience in a healthcare environment with demonstrated knowledge of healthcare mission, HIPAA regulations, and medical device security considerations.
  • Experience with ServiceNow Security Operations and Security Incident Response modules or similar ITSM platforms.
  • Professional certifications such as GIAC Certified Incident Handler (GCIH), Certified Incident Handler (ECIH), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), or CompTIA Security+ Certification.

Responsibilities

  • Designs and Leads Cybersecurity Programs Leads the design, development, implementation, and ongoing enhancement of enterprise-level complex cybersecurity programs for assigned domains (e.g., incident response, vulnerability management, threat intelligence, risk management). Creates policies, procedures, playbooks/runbooks, and automation to support program execution. Oversees program governance, maturity roadmaps, and continuous improvement initiatives. Partners with the campus Information Security Office on security architecture, tooling, and enterprise-wide initiatives. Leads real-time response and resolution for critical security events across assigned domains. Leads response to complex security incidents (detection, analysis, containment, eradication, recovery) using advanced threat hunting techniques and collaborating with the campus Information Security Office, who owns and manages the SIEM/SOAR/other security tools.
  • Directs Governance, Risk, and Compliance Establishes and enforces security policies, standards, and procedures aligned with regulatory mandates. Monitors adherence to HIPAA, FERPA, PCI DSS, GDPR, ISO 27001, and NIST frameworks. Manages risk registers, evaluates control effectiveness, and leads remediation planning for high-risk findings. Oversees internal and external audits; prepares compliance reports, attestations, and evidence. Conducts third‑party and vendor security assessments to ensure compliance with organizational standards and regulatory requirements.
  • Operationalizes Threat Intelligence and Risk Management Collects and applies threat intelligence to enhance detection, prevention, and response capabilities. Identifies control gaps and recommends improvements to security architecture and processes. Automates workflows for threat enrichment, triage, and reporting to improve efficiency. Integrates threat intelligence into SIEM/SOAR platforms and detection use cases. Conducts proactive analysis and advanced techniques to identify and mitigate emerging risks across domains.
  • Develops Metrics and Reporting Establishes cybersecurity KPIs and dashboards (e.g., MTTR, vulnerability SLAs). Aggregates data for executive and board-level reporting. Provides actionable recommendations based on trend analysis and performance metrics. Communicates findings effectively to technical and non-technical stakeholders.
  • Mentors and Trains Analysts Guides analysts on advanced techniques, tools, and best practices. Reviews casework and provides constructive feedback to improve quality. Develops training materials and assists on tabletop exercises; promotes knowledge sharing within the team.
  • Promotes Security Awareness Supports enterprise-wide security awareness initiatives and outreach. Contributes content for campaigns, briefings, and learning sessions. Helps cultivate a risk-aware environment through education and engagement.
  • Leads Cybersecurity Projects and Initiatives Leads discrete security projects, risk assessments, and implementation of new solutions. Collaborates with IT and cross-functional teams to integrate security into SDLC and strategic initiatives. Manages projects and ensures alignment with organizational objectives.
  • Marginal or Periodic Functions: Helps with updates to disaster recovery and incident response plans. Represents the organization during cybersecurity audits and external assessments. Participates in professional development, advanced training, and conferences. Adheres to internal controls and reporting structure. Performs related duties as required.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service