Skip to Main Navigation. Each navigation link will open a list of sub navigation links.

Skip to Main Content

Apply to the University of Wyoming apply now

Global Resource Navigation

Visit Campus
Download UW Viewbook
Give to UW

Classification Description

Employees Human Resources - Classification Compensation

Classification Description

This is a description of a staff position at the University of Wyoming, not a job opening announcement. Current job openings can be found at the Prospective Employees page. The following statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities required.

Applications Security Analyst

Reports to: Designated Supervisor

UW Job Code: 3752

UW Job Family: 38

SOC Code: 15-1071

Pay Grade: 24

Date: July 01, 2004

Job Purpose:

Design, implement, and administer privacy/security/fraud solutions for University information and telephone data; maintain security across multiple database systems and platforms. Investigate application database security violations and fraudulent activity.

Minimum Qualifications


Bachelor's Degree


3 years work-related experience

Knowledge, Skills, and Abilities

Knowledge of:

  • Current technological trends and developments in the area of information security.
  • Current trends in computer security infringement, as well as intrusion strategies and techniques.
  • A broad range of relevant systems platforms, to include Unix, PC, and Mainframe.
  • A broad range of relevant applications, to include, but not limited to PeopleSoft, Advance, Axis, CollegeNet, and so on.
  • IT database security products and techniques, network infrastructure, applications, and equipment pertinent to a large, distributed, heterogeneous computing environment.
  • Advanced concepts and basic operating principles of data communications and information systems hardware and software.
  • Operating System architecture.
  • University and state and federal regulations effecting database security and access management.

Skills and Abilities to:

  • Appropriately identify and assess user work patterns, information usage and requirements, as well as IT security constraints.
  • Plan, implement, test, and monitor database security solutions.
  • Organize resources and establish priorities.
  • Plan, design, develop, and manage integrated application database solutions to organizational requirements.
  • Work effectively with a wide range of constituencies in a diverse community.
  • Develop and write applications security policies, documentation, and guidelines for technical staff and users.
  • Provide technical guidance and leadership to professional personnel in area of expertise.
  • Effectively analyze information and pay attention to detail.
  • Recognize security breaches to systems and applications.
  • Resolve conflict.
  • Communicate effectively, both verbally and in writing.
  • Work under time pressure, exhibit flexibility, and adapt to change.
  • Function as a member of a team and independently.

Characteristic Duties and Responsibilities

Essential Functions:

Install and maintain application database security procedures for IDMS and Oracle databases including creating user identification and granting proper access to specific system resources; create data set, class, program and other profiles; create database accounts, roles and permission lists.

Monitor accesses to enterprise and application databases.

Respond to access violations, stop violations, contact appropriate personnel to resolve violations; adhere to applicable University and governmental regulations and laws.

Respond and correct access failures/problems with production computing and telephone systems on a 24-hour call-out basis.

Provide research and analyses for potential fraud and application database exposures; investigate violations.

Act as central point of contact for annual audits, and provide database access consulting services to campus community.

Perform monthly reconciliation of telemanagement system and telecommunication vendor reports; maintain telemanagement system including personal computer hardware, software, backups, and restores; maintain in-depth knowledge of routing, trunking and translation intricacies of the telephone system.

Supplemental Functions:

Promote application database privacy, security and fraud awareness through seminars and training.

Research literature; attend meetings or conferences to stay informed and knowledgeable about new technology advances or potential application database security/fraud problems.

Perform special projects, as assigned.

Working Conditions:

Standard office environment; constant repetitive keyboarding and video terminal display exposure; regular visual concentration at close proximity to computer screen; occasional exposure to electrical or mechanical hazards.

Authorized by Classification/Compensation, Human Resources

Employees may be requested to perform job-related tasks other than those specifically presented in this description. Participating in the University's hazardous waste minimization program is part of the job of each employee who uses (or may come in contact with) hazardous materials. Fair Labor Standards Act (exempt/non-exempt) is designated by position. University of Wyoming actively supports Americans with Disabilities Act and will consider reasonable accommodations.

Share This Page:

1000 E. University Ave. Laramie, WY 82071
UW Operators (307) 766-1121 | Contact Us | Download Adobe Reader

Twitter Icon Youtube Icon Instagram Icon Facebook Icon

Accreditation | Virtual Tour | Emergency Preparedness | Employment at UW | Gainful Employment | Privacy Policy | Accessibility Accessibility information icon