Salary Group B30

Class No. 0326



Performs highly advanced (senior-level) cybersecurity analysis work providing direction and guidance in strategic operations and planning. Work involves overseeing cybersecurity programs and environments; the prevention, detection and remediation of cybersecurity threats and intrusions; cybersecurity policies and monitoring protocols; and leading the development of a security plan, with an emphasis on technical infrastructure and long-term risk mitigation. Plans, assigns, and/or supervises the work of others. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment.


Directs the deployment of cybersecurity infrastructure and protects critical infrastructure services.

Directs and/or conducts research related to cybersecurity trends and technology; and evaluates cybersecurity trends, tools, and techniques for potential application to infrastructure and research areas.

Oversees cybersecurity management initiatives.

Oversees detection activities and advises on cybersecurity threats and vulnerabilities.

Oversees the initiation, implementation, and development of incident response plans and recovery programs; the evaluation and obtainment of forensics tools; the review of intrusion and misuse detection reports; and the guidance for corrective action.

Develops and implements appropriate safeguards to ensure system resiliency.

Develops cybersecurity awareness training programs for employees, contractors, and users; and facilitates cyber preparedness exercises.

Represents the agency at business meetings, hearings, trials, legislative sessions, conferences, and seminars or on boards, panels, and committees.

Plans, assigns, and/or supervises the work of others.

Performs related work as assigned.


Experience and Education

Experience in cybersecurity analysis work, with emphasis on security operations, incident management, intrusion detection, firewall deployment, and security event analysis. Graduation from an accredited four-year college or university with major coursework in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems, or a related field is generally preferred. Experience and education may be substituted for one another.

Knowledge, Skills, and Abilities

Knowledge of local, state, and federal laws and regulations relevant to cybersecurity, privacy, and computer crime; of the principles and practices of public administration and management; of the limitations and capabilities of computer systems; of technology across all network layers and computer platforms; of operational support of networks, operating systems, Internet technologies, databases, and security applications; of cybersecurity controls, procedures, and regulations; and of incident response program practices and procedures.

Skill in the use of a computer and applicable software; and in configuring, deploying, and monitoring security infrastructure.

Ability to manage and oversee the development, monitoring, and maintenance of cybersecurity processes and controls; to identify problems, evaluate alternatives, and implement effective solutions; to develop and evaluate policies and procedures; to prepare reports; to implement cybersecurity best practices and awareness; to communicate effectively; and to plan, assign, and/or supervise the work of others.

Registration, Certification or Licensure

May require certification as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified in Risk and Information Systems Control (CRISC).

State Auditor’s Office

Added 9-1-15