Stephen F. Austin State University is hiring an Information Security Specialist I or II. The role involves defending the university's network against hacking attempts by supporting and managing intrusion detection systems, coordinating incident responses, and assisting with security policies and procedures under the supervision of the Chief Information Security Officer.
Highlights
Support and monitor intrusion detection hardware, software, and network monitoring tools.
Assist or coordinate responses to security incidents, evidence gathering, and remediation.
Develop, review, and maintain information security policies and procedures.
Manage firewalls, penetration testing, vulnerability scans, and endpoint protection solutions.
Knowledge required in network systems, firewalls, routers, DNS, DMZ, VPN, and security technology.
Familiarity with laws and regulations including TAC 202, DIR, PCI, FERPA, HIPAA, and NIST 800 standards.
Information Security Specialist I requires at least two years of related experience; Specialist II requires five years plus system administration experience.
Associate's degree or two years of college coursework in computer science or related field required; experience may substitute for education.
Position is security, safety, and IT sensitive, subject to background and drug testing.
Eligible for participation in the Teacher Retirement System of Texas (TRS).
Information Security Specialist I or II Full Description
Job Title | Information Security Specialist I or II Full Time/Part Time | Full Time FLSA | Exempt General Job Description | Information Security Specialist I: This is a technical position responsible for assisting with efforts to defend against hacking and other malicious attempts to penetrate the university’s network. Responsible for assisting in supporting intrusion detection hardware, software, and monitoring tools on the network that will detect intrusions and penetration attempts. Works under general supervision, with moderate latitude for the use of initiative and independent judgment. Reports to the Chief Information Security Officer.
Information Security Specialist II: This is a technical position responsible for coordinating efforts to defend against hacking and other malicious attempts to penetrate the university’s network. Responsible for supporting intrusion detection hardware, software, and monitoring tools on the network that will detect intrusions and penetration attempts. Assists in developing, creating, and maintaining policies and procedures related to the area of responsibility. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment. Reports to the Chief Information Security Officer. Essential Job Functions | Information Security Specialist I: 1. Assists in supporting firewalls, physical security, encryption, authentication, and other security related tools. 2. Monitors the external and internal network, intrusion detection system reports, and real time information. 3. Assists in coordinating risk assessment; compiles reports. 4. Assists in coordinating computer incident response efforts, including investigation, evidence gathering, recovery assessment, patch updates, and CERT notifications. 5. Tracks security patches and incidents and relays relevant information to departmental management. 6. Assists in maintaining departmental website. 7. Assists in the management of the Endpoint Protection solution for the university. 8. Performs periodic scans of campus systems and advises administrators of system vulnerabilities. 9. Provides security documentation related to the area of responsibility. 10. Assists in developing, supporting, and implementing departmental and university policy. 11. Assists coordinating with the campus network administrator on projects affecting core services.
Information Security Specialist II: 1. Assists with developing and defining the general information systems security strategy.2. Monitors the external and internal network, intrusion detection system reports, and real time information.3. Manages the firewall, including creating an auditing firewall rules.4. Coordinates responses to information security incidents on campus, including investigation, evidence gathering, and remediation.5. Assists in creating, reviewing, and maintaining university and departmental policies in accordance with applicable laws and security standards.6. Manages the external controlled penetration test scans and web application vulnerability scans for the university; performs periodic internal scans on sections of the network.7. Assists in creating, maintaining, and implementing the information security program, data standards, and security control standards catalog for the university.8. Coordinates risk assessment and compiles reports for executive management.9. Performs reporting to the state for security incidents, annual risk assessments, and the information security program.10. Assists in the creation and management of the data categorization process for the university.11. Assists with PCI audits and general IT audits.12. Manages the security information event management systems, file integrity monitoring systems, data loss prevention systems, and endpoint protection solution for the university.13. Tracks security patches and incidents and relays relevant information to the appropriate parties on campus.14. Assists in maintaining departmental disaster recovery plan.15. Analyzes and evaluates software and hardware solutions in conjunction with the Project Management Office for compliance with university information technology policies and security best practices. Non-Essential Job Functions | Performs other related duties as assigned. Required Knowledge, Skills, and Abilities | The individual must possess the following knowledge, skills, and abilities or be able to explain and demonstrate that the individual can perform the essential functions of the job, with or without reasonable accommodation.
Information Security Specialist I: 1. Knowledge of, or the ability to learn, university policies and procedures. 2. Knowledge of, or the ability to learn, federal, state, and local laws, statutes, regulations, codes, and standards related to the area of responsibility, including TAC 202, DIR, PCI, FERPA, HIPAA, and NIST 800. 3. Knowledge of network systems and network integration, including: firewalls, routers, DNS, DMZ, and VPN. 4. Knowledge of security technology and security policies and procedures related to the area of responsibility. 5. Knowledge of authentication, authorization, access control, detection, and auditing as it relates to the area of responsibility. 6. Ability to communicate effectively in both oral and written form. 7. Ability to maintain effective relationships. 8. Ability to work successfully as a member of a team and independently with moderate supervision.
Information Security Specialist II: 1. Knowledge of, or the ability to learn, university policies and procedures.2. Knowledge of federal, state, and local laws, statutes, regulations, codes, and standards related to the area of responsibility, including TAC 202, DIR, PCI, FERPA, HIPAA, and NIST 800.3. Knowledge of network systems and network integration, including: firewalls, routers, DNS, DMZ, and VPN.4. Knowledge of security technology and security policies and procedures related to the area of responsibility.5. Knowledge of authentication, authorization, access control, detection, and auditing as it relates to the area of responsibility.6. Organizational skills in managing projects simultaneously while maintaining a satisfactory work product.7. Ability to communicate effectively in both oral and written form.8. Ability to establish and maintain a good rapport with university faculty and staff, students, and the general public.9. Ability to identify problems, evaluate alternatives, and recommend effective solutions.10. Ability to work successfully as a member of a team and independently with limited supervision.11. Ability to supervise others. Physical Demands | Required Education | Information Security Specialist I/II: Completion of at least two years of college coursework or an Associate’s degree in computer science or a related field is required. Related experience may be substituted for required education on a basis set forth by the Department of Human Resources. Required Experience and Training | Information Security Specialist I: Two years of related experience is required. Experience working on network hardware and software including experience with TCP/IP at the protocol level and Ethernet is required.
information Security Specialist II: Five years of related experience is required. Experience managing network equipment or security appliances is required. Experience working on network hardware and software including substantial experience with TCP/IP at the protocol level and Ethernet is required. Experience in system administration is required. Preferred Qualifications | Information Security Specialist I: Experience in system administration is preferred.
Information Security Specialist II: Experience in higher education is preferred. Special Conditions for Eligibility | This is a security-sensitive position subject to criminal record check. This is a safety-sensitive position subject to drug and alcohol testing. This is an IT-sensitive position subject to the Computer and Network Security policy. Min Pay Rate | Mid Pay Rate | Salary Information | Salary Grade - 57 or 55, Commensurate with Experience Specific Job Requirements/Duties for this Posting | Is Background Check Required? | Yes Benefit and Retirement Eligibility | This position is eligible for participation in the Teacher Retirement System of Texas (TRS) retirement plan, subject to the position being at least 20 hours per week and at least 135 days in length. EEO Statement | Stephen F. Austin State University, an Equal Employment Opportunity and Affirmative Action Employer and Educator, is committed to excellence. All qualified applicants will receive consideration for employment without regard to sex, race, creed, color, age, national origin, religion or physical or mental disability as required by law. If, because of an impairment or disability, you need accommodation during any part of the employment process, please contact Human Resources at 936-468-2304.
Posting Detail Information
Posting Number | S2025-110 Candidates Eligible to Apply | Open to all qualified applicants Number of Positions Available | 1 Posted Date | 07/03/2025 Review Start Date | Close Date | Work Schedule | Open Until Filled | Yes Special Instructions to Applicants | Posting Quick Link | https://careers.sfasu.edu/postings/13132
Contact Information
Contact Name | Brandon Stringfield Contact Phone | (936)468-5178 Contact Email | stringfibl@sfasu.edu Contact Information |
Supplemental Questions
Required fields are indicated with an asterisk (*).
* Which of the following best represents your education background?
Completed High School Diploma or GED
Completed some college
Completed Associates Degree
Completed Bachelor's Degree
Completed Master's Degree
Completed Doctoral Degree or ABD
If you completed a college degree, please indicate your major field of study. (Open Ended Question)
* Which of the following best represents the number of years experience you possess relating to the job to which you are applying?
Less than two years
Two to three years
Four to five years
Six to seven years
Eight to nine years
Ten or more years
* Do you have experience working on network hardware and software including experience with TCP/IP at the protocol level and Ethernet?
Yes
No
Please list any licenses or certifications that you currently hold. If you are currently in the process of completing a license or certificate, please list it along with the estimated date of completion. (Open Ended Question)