Qureos

Find The RightJob.

Information Security Operations Engineer

Security Sensitive Position?
Yes

Hours of Work
8:00 AM - 5:00 PM M-F

Position Details

Position Information

Posting Number
TSU203725

Official TSU Title
Information Security Operations Engineer

Grant Title
N/A

Job Description Summary / TWC Summary
The role of the Information Security Operations Engineer is to drive the implementation of security strategy, identify and mitigate emerging threats and vulnerabilities, and provide protection for our organization’s interests. You will align security and technology solutions with business objectives. Collaborate with and inform members of the campus’ information security program, including developing and implementing security standards, conducting risk assessments, and gather and report on security performance metrics. As a member of the OIT department this position strives to ensure consistency in communications, actions, and alignment to the strategic plan of the university. This position is also responsible for supporting the mission of the university by delivering technology, services, solutions and guidance to the students, faculty, staff, and the community in a professional, exemplary, service oriented collaborative manner.

Essential Duties Summary
Operational Support:
  • Responsible for daily oversight of the University’s security posture ensuring the security and integrity of the University’s IT infrastructure.
  • Proactive monitoring and mitigation of security threats and vulnerabilities within the University’s enterprise infrastructure, end points and applications.
  • Coordination with the Information Security Leadership and report on technical aspects of security and identity management.
  • Responsible for vendor oversight to comply with university security compliance standards and service-level agreements.
  • Coordinate with change management, incident management and knowledge management to ensure consideration of security controls and testing procedures.
  • Compliance oversight of information security and identity and access management governance processes.


Strategic Support:
  • Develop a SecOps program of security and identity, addressing risks and business requirements.
  • Coordination with state programs and agencies for information security oversight
  • Integrate new technologies and automation to ensure agility and security.
  • Define metrics and reporting strategies to measure progress and identify optimization opportunities in the security and identity program.

Policy and Compliance Oversight:
  • Monitor and report on compliance with security policies and enforce policies within the
  • University.
  • Propose changes to existing policies and procedures for operational efficiency and regulatory compliance.

Security and Identity Liaison:
  • Assist resource owners and IT staff in understanding and responding to audit risks.
  • Provide University communication, awareness, and education.
  • Oversight of security controls within contracts and service-level agreements with vendors and internal departments.

Architecture/Engineering Support:
  • Consult with IT and University staff to incorporate security and identity management into hardware, application, and software evaluation, selection, installation, and configuration.
  • Recommend and coordinate the implementation of technical controls to enforce policies.

KEY RESPONSIBILITIES AND PERFORMANCE STANDARDS:
All Information Technology staff – regardless of their unique position – are expected to perform their assigned duties in a manner consistent with professional standards, with full awareness of responsibilities toward managing personal and institutional data, with priority regard to delivering customer service, with an understanding of the 24/7 nature of IT and the responsibilities that create for them as individuals, and in a constructive and effective collaboration with colleagues.

% FTE
1.0

Hiring Range
$87,339.81 - $111,358.25

Education
Bachelor’s degree in information systems or related field, or equivalent work experience.

Required Licensing/Certification
Certifications for this role include Azure Security, CISSP, CISM, and CPP

Knowledge, Skills, and Abilities
  • Knowledge of network and system security, including firewalls, intrusion detection and prevention systems, and encryption technologies.
  • Experience with security tools and technologies, such as Azure Entra and Sentinel, Cisco Umbrella and vulnerability scanners.
  • Familiarity with security standards and regulations, such as TAC202, NIST and HIPAA.
  • Understanding of cloud security, including cloud infrastructure and application security. Work planning and delivery of information security program.
  • Ability to think critically and analytically to identify, analyze, and resolve complex problems and security-related issues within the organization’s IT environment.
  • Proficiency in employing a systematic approach to break down problems and develop effective solutions.
  • Demonstrated understanding of high-level policies, regulations, and industry best practices related to information security and the ability to apply them to daily responsibilities.
  • Proven ability to work proactively and independently, taking ownership of assigned tasks and projects related to security operations.
  • Capacity to identify potential risks and vulnerabilities, anticipate security needs, and implement proactive measures to mitigate them.
  • Ability to exercise sound judgment and make informed decisions based on available information and established security protocols.
  • Capability to assess risks and prioritize actions to ensure the protection of sensitive data and systems.
  • Excellent verbal, written, and interpersonal communication skills, enabling clear and concise communication with various stakeholders including IT teams, leadership, and business personnel.
  • Proficiency in translating technical security concepts into understandable terms for non- technical audiences.

Work Experience
  • Five (5) years of progressive IT experience, including at least five (2) years in information security or identity management.
  • A solid understanding of industry-standard security frameworks and requirements to include TX-RAMP, NIST, COBIT and GLBA.
  • Ability to maintain the security or integrity of critical infrastructure, which may include communications systems, computer networks and systems, cybersecurity systems, electrical grid, hazardous waste treatment or water treatment system

Working/Environmental Conditions
  • Routine office environment.
  • Sitting or standing in one location much of the time.
  • Some stooping, lifting, or carrying objects lightweight may be required. Use of video display terminal.

Desired start date

Position End Date (if temporary)

Posting Detail Information

UA EEO Statement
It is the policy of Texas Southern University to provide a work environment that is free from discrimination for all persons regardless of race, color, religion, sex, age, national origin, individuals with disability, sexual orientation, or protected veteran status in its programs, activities, admissions or employment policies. This policy of equal opportunity is strictly observed in all University employment-related activities such as advertising, recruiting, interviewing, testing, employment training, compensation, promotion, termination, and employment benefits. This policy expressly prohibits harassment and discrimination in employment based on race, color, religion, gender, gender identity, genetic history, national origin, individuals with disability, age, citizenship status, or protected veteran status. This policy shall be adhered to in accordance with the provisions of all applicable federal, state and local laws, including, but not limited to, Title VII of the Civil Rights Act.

Close Date
05/27/2026

Open Until Filled (overrides close field)
No

Special Instructions to Applicants
Open to all applicants.

Similar jobs

No similar jobs found

© 2026 Qureos. All rights reserved.