The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately halfway between the minimum and the maximum and represents an employee that possesses full job knowledge, qualifications and experience for the position. In the normal course, employees will be hired, transferred or promoted between the minimum and midpoint of the salary range for a job.
Note: Applications will be accepted until 11:59 PM on the Posting End Date.
Job End Date
At UBC, we believe that attracting and sustaining a diverse workforce is key to the successful pursuit of excellence in research, innovation, and learning for all faculty, staff and students. Our commitment to employment equity helps achieve inclusion and fairness, brings rich diversity to UBC as a workplace, and creates the necessary conditions for a rewarding career.
Job Summary
The Cybersecurity Network Analyst II is responsible for designing, implementing, configuring, automating, and maintaining network security solutions based on business, security, and privacy needs. This position monitors and responds to threats and vulnerabilities by implementing protective measures using existing network security solutions and working on new network protection solutions.
A fixed schedule is set for this role but flexibility is required as some work must be performed outside of regular business operating hours. This position may be required to act in an on-call capacity in the event of a cybersecurity incident or major service disruption.
Organizational Status
Works independently and jointly within the Cybersecurity Operations and Identity Management team. Collaborates with management and staff from all sections of the Chief Information Security Officer portfolio, Information Technology, other administrative and academic offices, and faculty to coordinate application support. Interacts directly with other University technology professionals.
Work Performed
The Cybersecurity Network Analyst II is responsible for designing, implementing, configuring, automating, and maintaining network security solutions based on business, security, and privacy needs. This position monitors and responds to threats and vulnerabilities by implementing protective measures using existing network security solutions and working on new network protection solutions.
A fixed schedule is set for this role but flexibility is required as some work must be performed outside of regular business operating hours. This position may be required to act in an on-call capacity in the event of a cybersecurity incident or major service disruption.
Organizational Status
Works independently and jointly within the Cybersecurity Operations and Identity Management team. Collaborates with management and staff from all sections of the Chief Information Security Officer portfolio, Information Technology, other administrative and academic offices, and faculty to coordinate application support. Interacts directly with other University technology professionals.
Work Performed
Responsible for the design of, implementation, automation, and ongoing management of security solutions, including Cisco NGFW's, network access control, remote access solutions (VPN), and other network protection tools, supporting systems, and infrastructure. Work is undertaken in support of enterprise-wide security and privacy standards.
Responsible for the development, sustainment, and communication of technical documentation, including operational procedures and guides, network diagrams, data flow diagrams, and knowledge base articles.
In adherence with industry best practices, develops, tests, and deploys policies and rules for implementation in security protection solutions; the incumbent is accountable for creating outcomes that mitigate identified vulnerabilities and respond to new or observed threats.
Designs, leads, and implements solutions for automated monitoring of external threat and vulnerability feeds to identify risks directly applicable to applications and application platforms in use by the University.
Develops, deploys, and supports custom internal-facing tools and applications to meet specific cybersecurity needs.
Analyzes functional and business requirements, system features, integration requirements, security requirements, and scalability and performance requirements. Provides subject matter expertise to the review and analysis of network vulnerability and threat risk assessments.
Lead the integration of newly developed or procured solutions with existing cybersecurity infrastructure and solutions.
Leading small to medium-sized projects.
Provides input and researches new or enhanced cybersecurity solutions to meet current and future network protection requirements.
Correlates events using information gathered from various sources to gain situational awareness and determine the effectiveness of an observed attack.
Develops technical communication materials and participates in strategy planning aimed at educating members of the UBC community on established network security best practices and greater UBC Information Security Standards.
Collaborates with peers/team members to identify, analyze, and implement changes that will improve the security and privacy of existing information systems.
Maintains appropriate professional designations and up-to-date knowledge of current cybersecurity techniques and tools.
Investigates and remains current with industry technology trends in the Network Security field such as Cisco NGFW's, network access control, remote access solutions (VPN), and other network protection tools, etc
Consequence of Error/Judgement
Effective network security is essential for UBC to deliver secure services to the broad UBC community. Decisions and actions taken by the incumbent will have a direct impact on how quickly the Cybersecurity team can respond to a rapidly changing network threat landscape, how secure UBC systems are from attackers, how available they are to the community, and a secondary impact on how UBC systems perform and function. Errors in judgment, poor analysis, or failure to act decisively could have a detrimental effect on the security and availability of these systems. Insecure systems could lead to system downtime or a data breach. In addition to damaging the reputation of Information Technology and UBC, a breach could also adversely impact the University community, including the large majority of students, faculty and staff, and could have a significant impact on funding and revenue.
Supervision Received
Works under the general direction of the Manager, Security Operations, and may receive direction from senior technical staff as assigned. The Cybersecurity Analyst II must be able to work independently as well as contribute actively and collaborate openly as a team member. Must demonstrate the ability to work effectively under pressure with minimum supervision.
Supervision Given
No direct supervision is required but is expected to assist team members as required. Also, to work on a project basis with Cybersecurity and other IT professionals.
Minimum Qualifications
Undergraduate degree in a relevant discipline. In-depth knowledge of applications and the business requirements supporting them. Minimum of five years of related experience, or the equivalent combination of education and experience.
- Willingness to respect diverse perspectives, including perspectives in conflict with one's own
- Demonstrates a commitment to enhancing one's own awareness, knowledge, and skills related to equity, diversity, and inclusion
Preferred Qualifications
Strong knowledge of Cisco NGFWs and network management experience.
Demonstrated experience with the following tools and technologies: Netflow, VPN and DNS.
Strong knowledge of IDS/IPS, security event monitoring, vulnerability assessment, ACL's and IT Forensics
Experience with incident, request, and change management in a large, complex environment is required.
Experience with Layer 2 (STP) and Layer 3 routing protocols such as OSPF and BGF
Proficient knowledge of Cisco command line and network administration.
Demonstrated, advanced level experience with network automation and deployment using scripting or tools.
Ability to demonstrate high levels of initiative in day-to-day work and approach to challenges.
Ability to work independently, as part of a team, and cross-functionally.
Ability to effectively manage multiple tasks and priorities and work under pressure to meet time-sensitive and mission-critical deadlines.
Collaboration - Actively solicits ideas and opinions from others to efficiently and effectively accomplish specific objectives targeted at defined business outcomes. Openly encourages other team members to voice their ideas and concerns. Shows respect for differences and diversity, and disagrees without personalizing issues. Utilizes the strength of team members to achieve optimal performance.
Communication for Results - Conducts discussions with and writes memoranda to all levels of colleagues and peer groups in ways that support troubleshooting and problem-solving. Seeks and shares relevant information, opinions, and judgments. Handles conflict empathetically. Explains the context of interrelated situations, asks probing questions, and solicits multiple sources of advice prior to taking action when appropriate
Problem-Solving - Applies problem-solving methodologies and tools to diagnose and solve operational and interpersonal problems. Determines the potential causes of the problem and devises testing methodologies for validation. Shows empathy and objectivity toward individuals involved in the issue. Analyzes multiple alternatives, risks, and benefits for a range of potential solutions. Recommends resource requirements and collaborates with impacted stakeholders.
Analytical Thinking - Coordinates the information gathering and reporting process. Reviews trends and compares them to expectations. Conducts research to define problems and prepares responses to anticipated questions. Prioritizes multiple issues and opportunities. Identifies relationships and linkages within several information sources. Anticipates issues that are not readily apparent on the surface. Identifies root causes and effects. Defines priorities within performance objectives. Reports and identifies areas that need guidance in order to resolve complex issues. Anticipates the possible outcome of potential solutions.
Information Systems Knowledge - Resolves escalated problems of technical support. Identifies root
causes. Sets up and integrates new and enhanced information systems. Identifies customer needs and determines the appropriate approach to apply and ensures resolution. Solicits the input of appropriate technical experts and managers as required.
Thoroughness - Demonstrates operational agility. Uses organizational systems that result in multiple
critical activities to be identified and completed on time. Renegotiates priorities as necessary. Puts
systems in place and uses them to monitor and detect errors and problems. Tests and inspects outputs and applies quality checks prior to work submission.