Skip to content
  Tuesday 20 January 2026
Trending
September 27, 2023CyberSecurity Intern November 1, 2023Scientists Uncover Extensive Puma’s Secret URL Trimming Platform January 30, 2024ChatGPT Accused of Privacy Violations by Italian Data Protection Watchdog December 17, 20237 Tasks Where Humans Outperform Robots and AI April 15, 2025Siemens Mendix Runtime | CISA May 6, 2025<h3>Kelly Benefits Hack: Victim Count Skyrockets Once More!</h3> March 10, 2025Program Cybersecurity Lead July 23, 2024Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia April 22, 2024Artificial Intelligence /Cybersecurity Researcher March 15, 2025Cybersecurity Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Analyst/Engineer
Careers

Cybersecurity Analyst/Engineer

SecuredyouadmSecuredyouadm—August 2, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Position InformationRequisition Number S4629P
Home Org Name CIO-VP IT and IT Administration
Division Name CIO Information Technology
Position Title Cybersecurity Analyst/Engineer
Job Class Code MA39/MA40
Appointment Status Full-time
Part-time FTE
Limited Term No
Limited Term Length
Job SummaryThe Office of the Chief Information Security Officer at Auburn University is seeking applicants for a cybersecurity position. Under minimal supervision, the Governance, Risk, and Compliance (GRC) Security Analyst or Engineer will be a subject matter expert on assessing and documenting the institution’s risk and compliance posture related to IT assets. This position will entail engaging third parties and reviewing documentation of application security architecture and design solutions to produce security recommendations for application developers and project teams. Responsibilities include working with vendors and campus users to assess security controls and requirements. Other duties involve a range of activities-such as assisting in developing security standards, participating as a security liaison on enterprise application teams, and vetting software purchases.Working onsite is a requirement of the job. May work up to 2 days hybrid remote in local area with supervisor’s approval.The ideal candidate applies systems thinking, possesses superior interpersonal and communication skills, is self-motivated, and is a life-long learner.
Essential Functions

  • Conduct cybersecurity risk assessments to identify and evaluate potential threats and vulnerabilities. Assist in maintaining cybersecurity risk registers.
  • Manage and implement risk mitigation and third-party risk management strategies.
  • Assist in the creation and maintaining of documentation such as System Security Plans (SSPs), Standard Operating Procedures (SOPs), Plan of Action & Milestones (POAMs), standards, and guidelines.
  • Serve as a security advisor by participating in application development projects and vetting requests for vendor software purchases.
  • Assist in the implementation and management of cloud security technologies utilized by the cybersecurity team.
  • Keep up to date with the latest developments and emerging trends in information security technology.
More stories

Cybersecurity Analyst – Top Secret Clearance

August 6, 2025

Cybersecurity Risk Management Senior Lead

May 13, 2025

Platinion Senior Consultant, Cybersecurity

October 6, 2023

IT Cybersecurity Specialist

December 20, 2024

Why Work at Auburn?

  • Life-Changing Impact: Our work changes lives through research, instruction, and outreach, making a lasting impact on our students, our communities, and the world.
  • Culture of Excellence: We are committed to leveraging our strengths, resources, collaboration, and innovation as a top employer in higher education.
  • We’re Here for You: Auburn offers generous benefits, educational opportunities, and a culture of support and work/life balance.
  • Sweet Home Alabama: The Auburn/Opelika area offers southern charm, vibrant downtown scenes, top-ranked schools, and easy access to Atlanta, Birmingham, and the Gulf of Mexico beaches.
  • A Place for Everyone: Auburn is committed to fostering an environment where all faculty, staff, and students are welcomed, valued, respected, and engaged.

Ready to lead and shape the future of higher education? Apply today! War Eagle!Minimum QualificationsMinimum QualificationsCybersecurity Analyst (MA39)Highschool Diploma – 11 years relevant experience required ORAssociate’s Degree – 7 years relevant experience required ORBachelor’s Degree – 3 years relevant experience requiredCybersecurity Engineer (MA40)High School/GED – 13 years relevant experience required ORAssociate’s degree – 9 years relevant experience required ORBachelor’s degree – 5 years relevant experience requiredRelevant IT experience in administering security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.Minimum Skills, License, and CertificationsMinimum Skills and Abilities

  • Knowledge of generally accepted information/cybersecurity principles and practices with the ability to apply that knowledge to perform complex and non-routine specialized information technology (IT) security analysis functions such as troubleshooting, advanced analysis, research and problem solving.
  • Ability to remain up-to-date with privacy and security regulations
  • Ability to recognize, analyze, and solve a variety of problems
  • Ability to effectively communicate technical concepts to a non-technical audience

Minimum Technology Skills
Minimum License and CertificationsCybersecurity Analyst: None required. Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), GIAC (SANs), or ISC2 preferred.Cybersecurity Engineer: Industry recognized cybersecurity certification required within six (6) months of hire date. Recognized certifications include the Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), CompTIA Security+, and Risk and Information Systems Control (CRISC) and others as deemed appropriate by the CISO of Auburn University.Desired QualificationsDesired Qualifications

  • Experience with system administration of servers and workstations
  • Experience with virtualized environments (Microsoft Azure)
  • Experience with the following Operating Systems is recommended but not required: Windows, Linux distributions (Ubuntu, Red Hat), MAC OS (current versions)
  • Knowledge of laws, regulations, and standards affecting information technology security in higher education environments, including but not limited to, PCI-DSS, HIPAA, GLBA, FERPA, and DMCA
  • Strong analytical and problem-solving skills and works well in a team environment
  • Willingness to acquire in-depth knowledge of network and security technologies and products and continuously improve these skills
  • Higher Education experience preferred

Posting Detail InformationSalary Range $57,830 – $141,200
Job Category Information Systems/Technology
Working Hours if Non-Traditional
City position is located in: Auburn
State position is located: Alabama
List any hazardous conditions or physical demands required by this position
Posting Date 07/28/2025
Closing Date
Equal Opportunity Compliance StatementIt is our policy to provide equal employment and education opportunities for all individuals without regard to race, color, national origin, religion, sex, sexual orientation, gender identity, gender expression, pregnancy, age, disability, protected veteran status, genetic information, or any other classification protected by applicable law. Please visit their to learn more.
Special Instructions to Applicants
Quick Link for Internal PostingsDocuments Needed to ApplyRequired Documents * Resume

  • Cover Letter

Optional Documents * Other
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Azure VM Not Loading? July Patch from Microsoft Could Be the Culprit!

Cybersecurity Advisor
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures