Data Security Analyst Intern 2

Overview

On Site
Part Time
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 960 Hour(s)

Skills

Python
Bash
PowerShell
networking protocols
operating systems
problem-solving skills.

Job Details

Due Date: 09/17/2025

Here is a new opportunity in DIR TX (30226ITSEISIntern2) - Data Security Analyst Intern 2


Note: The attached forms are mandatory to submit a candidate.

Department: Office of the Attorney General of Texas

Location: 300 W. 15th St. Austin, TX 78701

Hybrid On Site and Telework

No of Positions: 01

Submission Limit: 01

Duration: 960 Hours

Job Description:

Office of the Attorney General of Texas requires the services of 1 Data Security Analyst Intern 2, hereafter referred to as Candidate(s), who meets the general qualifications of Data Security Analyst Intern 2, Security and the specifications outlined in this document for the Office of the Attorney General of Texas.

All work products resulting from the project shall be considered "works made for hire" and are the property of the Office of the Attorney General of Texas and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Office of the Attorney General of Texas will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).

Responsibilities may include, but are not limited to:

1. Assist in analyzing data security incidents: Collaborate with the cybersecurity team to investigate and analyze potential security incidents using Crowdstrike and other technologies. Help identify the root cause, impact, and recommended actions to mitigate threats.

2. Support incident response efforts: Aid in the coordination and execution of incident response plans. Assist in incident containment, evidence gathering, and forensic analysis to ensure timely and effective response to security incidents.

3. Conduct vulnerability assessments: Assist in conducting regular vulnerability assessments of critical systems and applications using appropriate tools and techniques. Help identify vulnerabilities and recommend remediation measures to enhance the security posture.

4. Monitor and analyze security events: Work with the team to monitor security event logs, alerts, and reports from various security tools. Assist in identifying potential threats, security breaches, or unusual activity and help develop strategies to address them.

5. Collaborate with stakeholders: Collaborate with internal teams and external partners to gather security requirements, provide recommendations, and assist in implementing data security controls.

6. Documentation and reporting: Contribute to the development and maintenance of documentation, including incident reports, standard operating procedures (SOPs), and security guidelines. Assist in generating periodic reports on security incidents, vulnerabilities, and risk assessments.

7. Stay updated with emerging technologies and threats: Continuously expand knowledge of the latest cybersecurity trends, technologies, and threats. Assist in researching and evaluating new security tools, frameworks, and methodologies to enhance the team's capabilities.

II. CANDIDATE SKILLS AND QUALIFICATIONS

Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

Years

Required/Preferred

Experience

3

Required

Currently pursuing a bachelor's or master's degree in computer science, information security, or a related field.

2

Required

Proficient in scripting or programming languages such as Python, PowerShell, or Bash.

2

Required

Excellent analytical and problem-solving skills.

2

Required

Strong communication and interpersonal skills.

2

Required

Ability to work effectively both independently and as part of a team.

2

Required

Ability to follow all organizational standard operating procedures relative to approvals and review.

1

Preferred

Strong interest in data security, incident response, and threat intelligence.

1

Preferred

Familiarity with Crowdstrike and other cybersecurity tools is preferred.

1

Preferred

Self-motivated and eager to learn new technologies and methodologies.

1

Preferred

Basic understanding of networking protocols, operating systems, and security concepts.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Stellar IT Solution