Cybersecurity Analyst III (SOC Analyst)
Texas Comptroller of Public Accounts.com
108k - 114k USD/year
Office
San Antonio
Full Time
Organization
: DEPARTMENT OF INFORMATION RESOURCESPrimary Location
: Texas-San AntonioWork Locations
: Network Security Operation CTR 1001 W NORTH LOOP Austin 78756Other Locations
: Texas-AustinJob
: Computer and MathematicalEmployee Status
: RegularSchedule
: Full-time Standard Hours Per Week: 40.00 State Job Code: 0321 Salary Admin Plan: B Grade: 27Salary (Pay Basis)
: 9,041.07 - 9,458.33 (Monthly)Number Of Openings
: 2Overtime Status
: ExemptJob Posting
: Dec 10, 2025, 9:37:50 PMClosing Date
: Jan 1, 2026, 5:59:00 AMDescription
Job Posting:
00054788
Opened:
12/10/2025
Closes:
12/31/2025
Position Title:
Cybersecurity Analyst III (Security Operations Center (SOC) Analyst)
Class/Group:
0321/B27
Military Occupation Specialty Code:
Army 17C, 25D, 170A, 255S; Coast Guard CYB10, CYB11, CYB12; Marine Corps 0681; Air Force 1D7X1, 1N4X1, 3D0X2; Space Force 514A, 5C0X1D, 5C0X1N, 5C0X1S
Fair Labor Standards Act Status:
Exempt
Number Of Vacancies:
2
Division/Section:
Chief Operations Office / Cybersecurity Operations
Salary Range:
$9,041.07 - $9,458.33 / monthly
Duration:
Regular
Hours Worked Weekly:
40
Travel:
Occasional
Work Location:
506 Dolorosa Street / San Antonio, Texas 78204
Web Site:
Refer Inquiries To:
People and Culture Office
Telephone:
(512) 475-4957 or (512) 463-5920
How To Apply:
- Select the link below to search for this position: https://capps.taleo.net/careersection/ex/jobsearch.ftl?lang=en
- Enter the job posting number 00054788 in the keyword search.
- You must create a CAPPS Career Section candidate profile or be logged in to apply.
- Update your profile and apply for the job by navigating through the pages and steps.
- Once ready, select “Submit” on the “Review and Submit” page.
- If you have problems accessing the CAPPS Career Section, please follow the instructions in the Resetting CAPPS Password for Job Candidate desk aid.
Special Instructions:
- Applicants must provide in-depth information in the EXPERIENCE & CREDENTIALS section to demonstrate how they meet the position qualifications. Incomplete applications may result in disqualification.
- Resumes may be uploaded as an attachment but are not accepted in lieu of the information required in the EXPERIENCE & CREDENTIALS section of the application.
Interview Place/Time:
Candidates will be notified for appointments as determined by the selection committee.
Selective Service Registration:
Section 651.005 of the Government Code requires males, ages 18 through 25 years, to provide proof of their Selective Service registration or proof of their exemption from the requirement as a condition of state employment.
H-1b Visa Sponsorship:
We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Equal Opportunity Employer
The Department of Information Resources does not exclude anyone from consideration for recruitment, selection, appointment, training, promotion, retention, or any other personnel action, or deny any benefits or participation in programs or activities, which it sponsors on the grounds of race, color, national origin, sex, religion, age, or disability. Please call 512-475-4922 to request reasonable accommodation.
Position Description
What We Do
We are a technology agency powered by people.
DIR offers secure, modern, and cost-effective technology to help government entities in Texas serve their constituents.
DIR is a fast-paced and collaborative environment with highly motivated, innovative, and engaged employees dedicated to achieving the best value for the state. We have over 325 professionals working at DIR who are honored to serve as the cornerstone of public sector technology in Texas. By joining DIR, you will be an integral part of transforming how Texas government serves Texans.
Position Summary
This role supports Enterprise Cybersecurity Operations at DIR, focusing on protecting data from cyber-related attacks. Employees in this role typically monitor for any trace of invasion or improper access of data by performing threat and incident detection, incident response, and forensics activities. The Cybersecurity Analyst performs highly complex (senior-level) cybersecurity analysis work. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, and software security services. May supervise the work of others. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.
- Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems including endpoint detection & response tools; Performs cybersecurity incident detection, analysis, and prevention.
- Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use, assists in advising management and users regarding security procedures.
- Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.
- Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of data security breaches, and recommends threat mitigation strategies.
- Performs forensic analysis of network traffic logs and security tools to support incident investigations.
- Reviews operational solutions to ensure compliance with approved security practices; Maintains up-to-date knowledge of cybersecurity vulnerabilities, exploits, and threats especially emerging threats.
- Works as a first responder and security incident handler to security incidents across DIR’s shared services programs. Participates in an on-call rotation for security incidents and may occasionally manage multiple projects.
- Performs other work-related duties as assigned.
- Graduation from an accredited four-year college or university with major coursework in information technology security, computer information systems, computer science, management information systems, or a related field.
- Additional work-related experience may be substituted for each year of formal education. (High School diploma or equivalent certificate required.)
- Five (5) years of progressively responsible experience in the IT industry
- Three (3) years of progressively responsible experience in IT security analysis or IT security management
- Experience in security policy or process development and implementation
- Experience in implementing security platforms, processes, and tools
- Experience with security tools and platforms such as intrusion detection systems (IDS)/intrusion protection systems (IPS), security information/event management (SIEM), audio/video(A/V), Firewalls, vulnerability scanning, penetration testing, and cloud security services and controls.
- Experience with detecting and assessing threats such as network and asset vulnerabilities
- Experience operating an anti-virus product
- Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), GIAC Security Essentials Certification (GSEC), Certified Ethical Hacker (CEH) or equivalent certification.
- Experience in cybersecurity analysis or cybersecurity management in state government or other highly regulated environments.
- Experience in security incident handling, investigation, and/or response
- Experience and training in analyzing, recommending, developing, and implementing cogent enterprise-wide cybersecurity policies, standards, and guidelines
- Experience working with state or federal IT regulatory issues and processes
- Experience in hands-on support of heterogeneous enterprise class networks (>20,000 devices).
- Experience with operating an endpoint protection platform such as McAfee or Crowdstrike
- Experience in a leadership or supervisory role
- Knowledge of relevant DIR IT Security Services and regulations including Texas Government Code Chapter 2059, Texas Administrative Code § 202, and other related security codes, documentation, and best practices
- Knowledge of Information Technology Infrastructure Library (ITIL) processes and standards
- Knowledge of standard concepts, practices, and procedures for cybersecurity operations or command centers
- Knowledge of security incident investigative best practices
- Knowledge of benchmarking activities and expectations
- Knowledge of generally accepted information technology audit standards and practices; of information technology security and control practices; and of information technology management practices preferred.
- Knowledge of the limitations and capabilities of computer systems and technology; technology across all mainstream networks, operating systems, and application platforms; operational support of networks, operating systems, Internet technologies, databases, and security applications and infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; incident response program practices and procedures; and information security practices, procedures, and regulations preferred.
- Good understanding of VPN management and trouble resolution.
- Good understanding of Windows and Unix Operating Systems
- Good understanding of State information security framework to include TAC 202, Agency Security plans, and Texas Cybersecurity Framework which is based on NIST.
- Skill in configuring, deploying, and monitoring security infrastructure
- Skill in collecting and analyzing complex data; in evaluating information and systems; in drawing logical conclusions; in assessing the effectiveness of internal controls over key information technology risks; in identifying significant exposures; in analyzing transactions and management information; in detecting changes in key risks and/or control effectiveness; in developing appropriate recommendations to address exposures; and in using analytical software tools, data analysis methods, and other computer applications preferred
- Strong verbal and written communication skills.
- Ability to take ownership of systems and processes and work both independently and in collaboration with team members, and to support and contribute to a cohesive team environment
- Ability to quickly adapt to rapidly changing business needs and operational directives and deliver superior results
- Ability to oversee and/or supervise the work of others.
- Ability to adapt information delivery based on target audience
- Ability to resolve complex security issues in diverse and decentralized environments
- Ability to assist executives, through discussion and facilitation, in the process of evaluating and implementing security architecture and policies
- Ability to establish and maintain effective and cordial working relationships at all organizational levels, including agency management, direct supervisors, co-workers, internal and external customers
- Ability to communicate both verbally and in writing, in a clear and concise manner
- Ability to work independently and as part of a team, and to support and contribute to a cohesive team environment
- Ability to understand, follow, and convey brief oral and/or written instructions
- Ability to work occasional overtime and/or a flexible schedule as needed to meet required deadlines
- Ability to work under pressure and exacting schedules to complete assigned tasks
- Ability to travel as necessary
- Ability to comply with all agency policy and applicable laws
- Ability to comply with all applicable health and safety rules, regulations, and standards
- Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; and to communicate effectively.
- Ability to maintain the security and integrity of any critical infrastructure researched, worked on, or accessed for work purposes.
- Proficiency in the use of a computer and applicable software necessary to perform work assignments e.g., word processing, spreadsheets (Microsoft Office preferred).
- Regular and punctual attendance at the workplace.
- Criminal background check.
- Frequent use of personal computer, copiers, printers, and telephone
- Frequent standing, sitting, listening, and talking
- Occasional bending and stooping
- Frequent work under stress, as a team member, and in direct contact with others
- Infrequent lifting and climbing
- May work extended or on-call hours
