IT Security Consultant
Job Description
Why work for TRSL?
- Service – All Louisianans have benefited from teachers that inspire and encourage us. At TRSL we give back to our state’s teachers by providing retirement security and excellent service.
Culture – We value and support employees through open communication, professional development, recognition, and by creating a sense of community.
Growth – TRSL encourages professional growth in a number of ways including professional development plans and career progression groups through SCS. We also offer financial assistance for professional certifications and postsecondary/graduate-level courses.
Benefits – TRSL offers a generous benefits package including: a defined benefit pension plan, health insurance that is also available post retirement, at least 10 paid holidays, sick and annual leave that rolls over from year to year, paid or time off accrued for hours worked over 40 per week, a deferred compensation plan, a flexible benefits plan, alternate work schedules, etc. Work from home may be an available benefit for certain TRSL positions upon meeting the requirements of TRSL’s telework policy.
Location – TRSL is conveniently located near the I-10 / I-12 split on Essen Lane, away from the congestion of downtown Baton Rouge.
This vacancy may be filled as a Probational, Promotion, or Detail to Special Duty. Current classified permanent status employees may be required to accept a Probational Appointment.
This position has a Special Entrance Rate (SER) of $2,611.20 bi-weekly.
S ummary of Duties
This is an advanced level position responsible for engineering highly complex information security systems required to secure mission critical TRSL systems and data. This work supports the efforts of TRSL to provide a secure virtual environment at TRSL’s data center, disaster recovery and remote work sites. This work is also critical to prevent external or internal network attackers gaining unauthorized access to TRSL's confidential information, and to ensure that TRSL’s systems are secured so that services can be provided to customers consistently and without interruption.
Examples of Work
Works to ensure system and security product updates are adhered to.
Works with IT sections to ensure respective security protocols are in place and adhered to.
Works with users to ensure training and cyber awareness are ongoing and effective.
Proactively monitors and responds to security alerts and reported incidents.
Mentors and guides IT sections on best security practices.
Manages security-based project work under direction and guidance of IT Management.
Able to produce clear and concise written security reports at a technical and non-technical level.
Able to present to groups of technical and non-technical staff on security matters.
Required Attributes
Strong analytical skills.
Strong technology skillset with emphasis on cyber security.
Good communication skills written and verbal.
Collaborative and team oriented working style.
A solid understanding of systems security and current cyber threats.
Ability to work independently while possessing a strong sense of accountability.
How to Apply
No Civil Service test score is required in order to be considered for this vacancy.
To apply for this vacancy, click on the “Apply” link above and complete an electronic application, which can be used for this vacancy as well as future job opportunities. Applicants are responsible for checking the status of their application to determine where they are in the recruitment process. Further status message information is located under the Information section of the Current Job Opportunities page.
Applications submitted without the education and/or work experience sections completed will be considered incomplete and will not be considered. Resumes will not be accepted in lieu of an application listing complete work experience and education.
Applicants with international degrees must provide an equivalency evaluation and a copy of their transcript at the time of application. The equivalency evaluation and transcript can be added as an attachment to your online application or may be faxed, mailed, or emailed to the contact information below and must be received by the closing date of this posting.
If you are applying for this position prior to receipt of your baccalaureate degree, you may apply 90 days prior to receipt of your degree; however, the effective date of the appointment cannot be prior to your graduation date.
TRSL will consider candidates who have obtained Optional Practical Training (OPT) or meet the H1B qualifications by the U.S. Department of Labor.
For further information about this vacancy contact:
Additional TRSL Job Postings can be found HERE.
All prospective new hires will be subject to employment eligibility verification via the federal government’s E-verify system.
TRSL is a Substance Abuse and Drug-Free workplace. As an Equal Opportunity Employer, TRSL is committed to a diverse and inclusive workplace prohibiting discrimination on the basis of any non-merit factor.
TRSL is a State as a Model Employer (SAME) agency that supports improved employment opportunities for individuals with disabilities.
MINIMUM QUALIFICATIONS:
A baccalaureate degree plus five years of experience in information technology.
SUBSTITUTIONS:
1. An associate’s degree in information technology will substitute for the baccalaureate degree.
2. Two years of experience or training in information technology will substitute for the baccalaureate degree. Candidates without a baccalaureate degree may combine experience or training in information technology and college credit to substitute for the required baccalaureate degree as follows:
30 to 59 semester hours credit will substitute for six months of experience or training in information technology towards the baccalaureate degree.
60 to 89 semester hours credit will substitute for one year of experience or training in information technology towards the baccalaureate degree.
90 or more semester hours credit will substitute for one year and six months of experience or training in information technology towards the
baccalaureate degree.
A maximum of 90 semester hours may be combined with experience or training in information technology to substitute for the baccalaureate
degree.
3. Six years of full-time work experience in any field may be substituted for the required baccalaureate degree. Candidates without a baccalaureate degree may combine work experience in any field and college credit to substitute for the baccalaureate degree as follows:
30 to 59 semester hours credit will substitute for one year of experience towards the baccalaureate degree.
60 to 89 semester hours credit will substitute for two years of experience towards the baccalaureate degree.
90 to 119 semester hours credit will substitute for three years of experience towards the baccalaureate degree.
120 or more semester hours credit will substitute for four years of experience towards the baccalaureate degree.
A maximum of 120 semester hours may be combined with experience to substitute for the baccalaureate degree.
4. A baccalaureate degree with twenty-four semester hours in computer science, management information systems (MIS), quantitative business analysis-computer science, electrical engineering, information systems and decision sciences, computer engineering, mathematics, telecommunications, or computer information systems will substitute for up to one year of required experience.
5. A master's degree will substitute for up to one year of required experience.
NOTE:
Multiple specialized degrees and/or master's degrees will substitute for a maximum of one year of required experience.
NOTE:
A certification in an approved area may be substituted for the education and/or experience requirements at the time of hire or promotion, provided the appointment is made from a Certificate of Eligibles.
NOTE:
Any college hours or degree must be from an accredited college or university.
FUNCTION OF WORK:
To engineer highly complex information security systems that are outside of the scope of the Office of Technology Services.
LEVEL OF WORK:
Expert.
SUPERVISION RECEIVED:
General from an IT Manager. Other reporting relationships may be approved by SCS.
SUPERVISION EXERCISED:
May provide functional supervision over lower-level personnel. Other reporting relationships may be approved by SCS.
LOCATION OF WORK:
State agencies with information security activities that are outside of the scope of the Office of Technology Services.
JOB DISTINCTIONS:
Differs from IT InfoSec Specialist 2 by the presence of responsibility for engineering highly complex information technology security systems that are outside of the scope of the Office of Technology Services.
Differs from IT InfoSec Architect by the absence of responsibility for architecting enterprise information technology security systems and solutions that are outside of the scope of the Office of Technology Services.
EXAMPLES BELOW ARE A BRIEF SAMPLE OF COMMON DUTIES ASSOCIATED WITH THIS JOB TITLE. NOT ALL POSSIBLE TASKS ARE INCLUDED.
Designs and develops highly complex system solutions to support information security needs and continuity of operations. Develops system design and plans testing activities.
Performs system maintenance activities and ensures seamless integration across all components. Provides updates on project statuses to management personnel.
Evaluates requests and projects in other technical areas as needed to assess the impact to information security; provides recommendations for favorable outcomes.
Meets with agency management and/or vendors to determine needs, outline parameters, and evaluate results. Develops work plans for lower-level personnel to ensure project goals are met.
Applies an expert understanding of the information security system landscape in order to ensure successful outcomes.
Responds to highly complex information security system troubleshooting requests and emergencies. Provides incident response and guidance to lower-level personnel as needed.
Serves as a liaison for information technology vendors, technology users, and agency management relative to the assigned systems.
Researches and evaluates new information security technologies; provides recommendations to management to improve system performance and align with the agency's goals and objectives.