This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Technical Security Risk & Governance Analyst supports the state’s cybersecurity program by performing risk assessments, control testing, and governance activities across enterprise systems, applications, networks, and cloud services. This role partners with IT, business owners, and audit teams to ensure security controls are designed, implemented, and operating effectively in alignment with state policy, NIST CSF/800-53, and other regulatory frameworks (e.g., CJIS, IRS Pub 1075, HIPAA, PCI DSS). The Analyst develops pragmatic recommendations, tracks remediation, and produces metrics for leadership and regulatory reporting.
Job Responsibility:
Conduct technical security risk assessments for on‑prem, cloud (IaaS/PaaS/SaaS), and hybrid solutions
document risks, likelihood/impact, and recommended mitigations
Perform control design/operating‑effectiveness testing against NIST CSF/800‑53, CIS Controls, ISO/IEC 27001, and agency security standards
Support Authority to Operate (ATO) processes, security attestations, and continuous monitoring
Facilitate threat modeling and security architecture reviews
advise on secure patterns (network segmentation, IAM, least privilege, encryption, logging)
Maintain security policies, standards, procedures, and control libraries
align updates with legislative or regulatory changes
Map agency controls to relevant mandates (e.g., CJIS, IRS 1075, HIPAA, FERPA, PCI DSS, state statutes/policies) and track compliance gaps
Coordinate internal/external audits
lead evidence collection, responses, and remediation plans
Administer or contribute to GRC tooling for issues, exceptions, and risk registers
Establish governance for vulnerability management (SLAs, exception management, risk acceptance)
monitor patching and remediation progress
Perform vendor/security reviews (SaaS, MSPs, cloud providers), evaluate SOC 2/ISO certifications, and negotiate security clauses with procurement/legal
Review data protection, encryption, and privacy risks in new procurements and major system changes
Develop and maintain dashboards and performance indicators (risk posture, control maturity, vulnerability closure rates)
brief leadership on trends and priorities
Produce clear, actionable reports for technical teams and non‑technical stakeholders
Promote security awareness and targeted training (e.g., secure configuration, privacy by design, third‑party onboarding)
Provide risk-informed guidance during incident response (root cause, control gaps, corrective actions)
Review change requests for security impacts
ensure appropriate testing, logging, and rollback plans
Requirements:
Bachelor’s degree in Information Security, Computer Science, Information Systems, or related field
OR equivalent experience
1–3 years in information security, risk management, audit, or related technical role
Knowledge of security frameworks and regulations: NIST CSF/800‑53, CIS Controls, ISO 27001
familiarity with CJIS, IRS Pub 1075, HIPAA, FERPA, PCI DSS, and state policy
Knowledge of core security domains: identity and access management (IAM), network security, endpoint security, vulnerability management, logging/SIEM, encryption/PKI, secure DevOps
Knowledge of cloud security concepts (shared responsibility, CSPM, workload protection, KMS/CMKs, conditional access, zero trust)
Skills in technical assessment and control testing
ability to validate configurations and interpret scan results
Skills in risk analysis and documentation
creating practical risk treatment plans and exceptions with compensating controls
Skills in using GRC platforms
building workflows, control libraries, and risk registers
Skills in data analysis and dashboarding (Excel/Power BI), concise report writing, and presentation to executives
Ability to translate technical findings into business risk terms and prioritized actions
Ability to collaborate across IT, operations, legal, procurement, and program areas
influence without authority
Ability to handle multiple assessments and deadlines
maintain confidentiality and sound judgment
Ability for continuous learning and adapting to new threats, technologies, and mandates
Background check per state policy
may require CJIS/IRS Pub 1075 clearance depending on data systems
Occasional travel to agency sites or data centers
Participation in after‑hours change windows or incident support as needed