Skip to Main Content

IT Security Consultant

Below you will find the details for the position including any supplementary documentation and questions you should review before applying for the opening.  To apply for the position, please click the Apply for this Job link/button.

If you would like to bookmark this position for later review, click on the Bookmark link. If you would like to print a copy of this position for your records, click on the Print Preview link.

PLEASE NOTE: Mozilla Firefox® is the preferred Browser, version 3.5 and later

Position Information

Position Information

Posting Title IT Security Consultant
Job Requisition Number COA077742
Position Number 108188
Job Type Full-Time
Division Name CTECC IT Support
Minimum Qualifications

Graduation with a Bachelor’s degree from an accredited college or university with major course work in a field related to the job, plus four (4) years related experience


Experience may substitute for education up to four (4) years.


Licenses or Certifications:

Notes to Applicants

Public Safety IT is looking for a highly technical self-starter to come in and implement and manage critical public safety infrastructure.

When completing the City of Austin employment application:
• Please be sure to detail on the application all previous employment that you wish to be considered as part of your qualifications.
• A detailed, complete employment application is required. It helps us to better evaluate your qualifications and will be used to determine salary if you are selected for this position. Be sure to provide job title and employment dates for all jobs you wish to be considered.
• A résumé is required, but will not substitute for a complete employment application. Incomplete applications will not be considered. Please include contact information from previous employers.

If you are selected to interview:
• Military/Veterans must provide a copy of their DD214 at the time of initial interview to receive military/veteran interview preference.
•A skill-based assessment may be administered at the time of interview

If you are selected for hire:
• You must provide proof of education which may include your official college transcript, High School diploma, GED or equivalent degree and your professional licenses.
• This position requires a criminal background investigation.

Pay Range

$38.60 – $51.01


Regular hours are 8:00 AM to 5:00 PM Monday through Friday.
There is a 24×7 rotating on call obligation.
Some evenings and weekends may be required.
Days and hours may vary depending on the needs of the business.

Job Close Date
Type of Posting External
Department Communication & Tech Mgmt
Regular/Temporary Regular
Grant Funded or Pooled Position Not Applicable
Category Technical
Location 5010 Old Manor Rd. Austin, Texas 78723
Preferred Qualifications

Intermediate to advanced-level experience in the following areas/technologies:
• Development of security policies
• Application and Infrastructure (on-premises and cloud) security auditing using industry-standard tools
• One or more Next Generation Firewall products (Cisco FirePOWER, Fortinet, Palo Alto etc.)
• One or more Advanced Authentication products (RSA SecurID, Gemalto, etc.)
• One or more Security Information and Event Management products (Splunk, LogRhythm, etc.)

CISSP Certification

Duties, Functions and Responsibilities

Essential duties and functions, pursuant to the Americans with Disabilities Act, may include the following. Other related duties may be assigned.

1. Plan, design, implement, monitor risk mitigation and compliance of security measures, and policies and procedures
2. Manage response to high-level information security issues
3. Provide security program leadership in designing, procuring and implementing secure IT solutions for enterprise-wide application and infrastructure-related projects including business continuity and disaster recovery plans
4. Develop, maintain and publish documentation for enterprise-wide information technology security standards, procedures and guidelines.
5. Maintain awareness of security industry trends and identify areas where existing information or physical security infrastructure requires change or development
6. Provide risk assessments and security briefings to advise on critical issues that may affect security of enterprise infrastructure or business process
7. Perform computer security incident response to possible security breaches or policy violations.
8. Perform information and physical security investigations
9. Develop security awareness and compliance training programs
10. Consult on projects or project manage security implementations and development 

Responsibilities- Supervision and/or Leadership Exercised:
May provide leadership, work assignments, evaluation, training, and guidance to others

Knowledge, Skills and Abilities

Must possess required knowledge, skills, abilities and experience and be able to explain and demonstrate, with or without reasonable accommodations, that the essential functions of the job can be performed.

Knowledge in networking, wireless, databases, applications and system operations and how they interact with each other
Knowledge of enterprise information security systems and implementation
Knowledge of securing different types of systems 
Knowledge of industry and department best practices, requirements and policies and procedures
Skills in security assessments and recommendations
Skill in analyzing and investigation of information security trends
Skill in mentoring and monitoring daily work activities of others
Skill in selecting and using training/instructional methods and procedures
Skill in documenting and maintaining complex application and process or configuration information
Skill in identifying complex problems and implementing solutions
Ability to educate various personnel regarding information security
Ability to identify trends as well as isolated events
Ability to accurately identify/determine customer needs and take appropriate actions and/or steps to address identified needs
Ability to recognize, value, and include different perspectives, experiences, approaches, and cultures in achieving organizational goals
Ability to gain and maintain the trust and confidence of others and the organization through consistency and reliability

Does this job require a criminal background investigation? This position requires a criminal background investigation

City of Austin is committed to compliance with the American Disabilities Act. If you require reasonable accommodation during the application process or have a question regarding an essential job function, please call (512) 974-3210 or TTY (512) 974-2445.

Information For City Employees: If you are an employee within the department, are in good standing and meet both the minimum and preferred qualifications, then you will receive an initial interview.

Supplemental Questions

Required fields are indicated with an asterisk (*).

  1. Position requires graduation from an accredited four-year college or university with major course work in a field related to the job, plus four (4) years related experience. Experience may substitute for education up to four (4) years. Do you meet these minimum qualifications?
    • Yes
    • No
  2. If identified as the top candidate, do you agree to a Criminal Background Investigation?
    • Yes
    • No
  3. This position will require you to be part of a an "on call" rotation as part of the team. Being on call may require work outside of the scheduled work day, as you may need to respond to "call back" assignments. Are you willing and able to fulfill an "on call" assignment in addition to the regular 40 hour work week?
    • Yes
    • No
  4. How many years of experience do you have implementing and administering Information Systems Security Policy controls and process?
    • 1
    • 2-4
    • 5-7
    • 7 plus
  5. Briefly explain your experience with providing application and Infrastructure (on-premises and cloud) security auditing using industry-standard tools.

    (Open Ended Question)

  6. Describe your experience administering firewalls. Assess your level of proficiency.

    (Open Ended Question)

  7. What is your experience with Security Incident Event management systems?
    • none
    • research and testing only
    • managed a single sensor SIEM device in a corporate environment
    • Installation of a small SIEM environment in a corporate environment
    • Design and installation of a SIEM with over 3 sensors in a corporate environment
  8. Are you a Certified Information Systems Security Professional (CISSP®)?
    • Yes
    • No
  9. Briefly describe your experience with Advanced Authentication products such as RSA SecurID, Gemalto, etc.

    (Open Ended Question)

Optional & Required Documents

Required Documents
  1. Resume
Optional Documents