Cybersecurity Analyst (Cybersecurity Analyst III)

Job #: 2026-43

  • TWC Job #: 16954001
  • Travel Required: 5%
  • Monthly Salary: $7,500.00 - $11,299.50
  • Position Location: Austin, TX
  • Group Step: B27
  • Class: 0321
  • Status: Open

Cybersecurity Analyst – Austin, Texas

The Office of the Governor is looking for a Cybersecurity Analyst (Cybersecurity Analyst III) to work in the Administration Division.

Who We Are

The Office of the Governor works to build a healthier, safer, freer, and more prosperous future for all Texans. We are located primarily within the Texas State Capitol Complex in Austin.

What You’ll Earn

The salary is $7,500.00 - $11,299.50 a month ($90,000.00 - $135,594.00 a year).

Benefits include medical insurance, sick leave, and vacation leave. Also, State of Texas employees are eligible for a defined retirement plan. Learn more: https://www.ers.texas.gov/Active-Employees/Health-Benefits

What You’ll Do

This position performs highly complex (senior-level) cybersecurity and information security analysis to safeguard critical systems and data. Work involves planning, implementing, and monitoring security measures to protect information systems and infrastructure. The position focuses on defending cybersecurity assets and delivering services such as incident detection and response, threat assessment, cyber intelligence, software security, and vulnerability management.

  • Performs technical risk assessments and reviews of account permissions, data access requirements, security violations, programming changes, and new or existing applications and systems, including physical security and environmental controls for data centers.

  • Performs cybersecurity incident detection, analysis, response coordination, and prevention activities.

  • Conducts network and application vulnerability scans to assess security effectiveness and identify weaknesses.

  • Performs forensic analysis of information systems and portable devices, including forensic data recovery using specialized assessment tools.

  • Monitors systems and procedures to protect data systems and databases from unauthorized access or misuse.

  • Monitors and analyzes cybersecurity alerts from security tools, network devices, and information systems.

  • Supports the implementation of computer system security plans with agency personnel and external vendors.

  • Develops plans to safeguard system configurations and data files against accidental or unauthorized modification, destruction, or disclosure, and ensures emergency data processing capabilities.

  • Modifies and monitors system configurations and data files to incorporate new software, virus protection systems, correct errors, or adjust individual access privileges.

  • Implements continuous automated security compliance capabilities.

  • Researches and analyzes cybersecurity threat indicators and behaviors to prevent, detect, contain, and correct data security breaches; recommends threat mitigation strategies.

  • Trains users and promotes security awareness to ensure system security and improve application, server, and network efficiency.

  • Coordinates agency policies for data encryption and defines firewall configurations to protect confidential information in transit.

  • Designs, develops, modifies, tests, and integrates database or hardware systems to protect against cyber threats.

  • Designs, automates, manages, and deploys security applications and infrastructure program activities.

  • Participates in the development of information technology disaster recovery and business continuity plans.

  • Researches and implements new security risk mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.

  • Assists in advising management and users regarding security procedures and best practices.

  • Maintains security documentation, reports, and audit logs to support compliance with state and federal cybersecurity standards.

  • Collaborates with internal teams and external partners, including law enforcement or regulatory bodies, during investigations and incident response activities.

  • Supports security measures for cloud-based environments and emerging technologies.

  • Develops and reviews cybersecurity awareness training for OOG.

How You’ll Qualify

  • Bachelor's degree from an accredited college or university in cybersecurity, information technology security, computer engineering, computer information systems, computer science, or management information systems; and

  • Seven (7) years of experience in cybersecurity, information technology security, computer engineering, computer information systems, computer science, or management information systems.

Note: Experience and education may be substituted for one another on a year-for-year basis.  

You’re a Great Fit with

  • Master’s Degree from an accredited college or university in Cybersecurity, Information Technology Security, Computer Engineering, Computer Information Systems, Computer Science, Management Information Systems, or a related field.

  • Certifications such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), Certified Information Systems Auditor (CISA), CompTIA Security+, Certified Information Security Manager (CISM), and Certified Information Systems Security Professional (CISSP).

  • Experience producing detailed cyber threat intelligence reports and presenting findings to technical and non-technical audiences.

  • Experience with Vulnerability Management Systems (e.g., Rapid7, Tenable/Nessus Scanning, Qualys).

  • Experience with Endpoint Detection and Response (EDR) tools (e.g., EndGame, Crowdstrike, CyberReason).

  • Experience with Email Threat Management solutions (e.g., Proofpoint, MimeCast, Microsoft).

  • Experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, Rapid7, SumoLogic).

  • Experience with Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and modern cloud security architectures such as Secure Access Service Edge (SASE) or Security Service Edge (SSE) (e.g., Symantec, Microsoft, Netskope, Zscaler, Palo Alto Networks).

  • Experience with Cloud Enterprise Network Security solutions (e.g., Cisco Umbrella, Palo Alto, ZScaler).

  • Experience with compliance frameworks and regulatory requirements (e.g., NIST, ISO 27001, HIPAA, PCI DSS, CJIS).

  • Experience supporting incident response and forensic investigations in cloud and hybrid environments.

Other Things to Know and When You Should Apply

It’s a great job for a professional who monitors, detects, and responds to security threats. Apply now by submitting a state of Texas application. Applications are reviewed daily.

Valid Texas Driver’s License or be willing to obtain a valid Texas Driver’s License within 90 days if moving from another state.

Veterans

Veterans, Reservists, or members of the Guard can compare this position to Military Occupations (MOS) at the Texas State Auditor's Office


How to Apply

Applications are received only through Work In Texas. The OOG requires all sections of the state application to be completed. Omission of data on the state application is grounds for disqualification of the application. Requests for accommodation should be made to the Human Resources office as early as possible in the application/employment process. 

Apply Online at Work in Texas

Equal Opportunity Employer

The Office of the Governor is an Equal Opportunity Employer. The Immigration Reform and Control Act of 1986 requires all new employees to present proof of eligibility to work in the United States within three (3) days of being hired. The Office of the Governor participates in E-Verify and will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee’s Form I-9 to confirm work authorization. Male candidates between 18 and 25 years of age are required to show proof of Selective Service registration (or exemption) prior to an offer of employment being extended. Such proof is not required to be filed with an application but must be provided upon request by the Human Resources office. For additional information pertaining to Selective Service registration, you may visit www.sss.gov. View a copy of the Agency's Equal Employment Opportunity Utilization Report.

Notice to Applicants Who May Require Reasonable Accommodation in the Interview Process

Applicants with disabilities who may need to discuss special accommodations during the interview process should email the OOG’s Reasonable Accommodation Program Manager or call 512-463-8315 in the Human Resources Department. If reasonably possible, please call at least 48 hours in advance to afford our representative and the hiring division sufficient time to properly review and coordinate your request.

Contact Human Resources

(512) 463-5873

Send Us a Message