Some of the content on this website requires JavaScript to be enabled in your web browser to function as intended. While the website is still usable without JavaScript, it should be enabled to enjoy the full interactive experience.

Skip to Main Navigation. Each navigation link will open a list of sub navigation links.

Skip to Main Content

Classification Description|Employees Human Resources - Classification Compensation

Contact Us

Classification Compensation
Mark Bercheni, Manager
Campus: 139 Wyoming Hall
Mail: Dept 3422
1000 E University Ave
Laramie, WY 82071-2000
Phone: 307.766.5606
Fax: 307.766.5607
Email: c-comp@uwyo.edu
Office Hours
Regular: 8:00am - 5:00pm
Summer: 7:30am - 4:30pm
Monday - Friday

This is a description of a staff position at the University of Wyoming not a job opening announcement. Look for current job openings at the following link: http://www.uwyo.edu/hr/hremployment/listjobs.html. The following statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of personnel so classified.

Applications Security Analyst

Reports to: Designated Supervisor

UW Job Code: 3752

UW Job Family: 38

SOC Code: 15-1071

Pay Grade: 24

Date: July 01, 2004

Job Purpose:

Design, implement, and administer privacy/security/fraud solutions for University information and telephone data; maintain security across multiple database systems and platforms. Investigate application database security violations and fraudulent activity.

Minimum Qualifications

Education:

Bachelor's Degree

Experience:

3 years work-related experience

Knowledge, Skills, and Abilities

Knowledge of:

  • Current technological trends and developments in the area of information security.
  • Current trends in computer security infringement, as well as intrusion strategies and techniques.
  • A broad range of relevant systems platforms, to include Unix, PC, and Mainframe.
  • A broad range of relevant applications, to include, but not limited to PeopleSoft, Advance, Axis, CollegeNet, and so on.
  • IT database security products and techniques, network infrastructure, applications, and equipment pertinent to a large, distributed, heterogeneous computing environment.
  • Advanced concepts and basic operating principles of data communications and information systems hardware and software.
  • Operating System architecture.
  • University and state and federal regulations effecting database security and access management.

Skills and Abilities to:

  • Appropriately identify and assess user work patterns, information usage and requirements, as well as IT security constraints.
  • Plan, implement, test, and monitor database security solutions.
  • Organize resources and establish priorities.
  • Plan, design, develop, and manage integrated application database solutions to organizational requirements.
  • Work effectively with a wide range of constituencies in a diverse community.
  • Develop and write applications security policies, documentation, and guidelines for technical staff and users.
  • Provide technical guidance and leadership to professional personnel in area of expertise.
  • Effectively analyze information and pay attention to detail.
  • Recognize security breaches to systems and applications.
  • Resolve conflict.
  • Communicate effectively, both verbally and in writing.
  • Work under time pressure, exhibit flexibility, and adapt to change.
  • Function as a member of a team and independently.

Characteristc Duties and Responsibilities

Essential Functions:

Install and maintain application database security procedures for IDMS and Oracle databases including creating user identification and granting proper access to specific system resources; create data set, class, program and other profiles; create database accounts, roles and permission lists.

Monitor accesses to enterprise and application databases.

Respond to access violations, stop violations, contact appropriate personnel to resolve violations; adhere to applicable University and governmental regulations and laws.

Respond and correct access failures/problems with production computing and telephone systems on a 24-hour call-out basis.

Provide research and analyses for potential fraud and application database exposures; investigate violations.

Act as central point of contact for annual audits, and provide database access consulting services to campus community.

Perform monthly reconciliation of telemanagement system and telecommunication vendor reports; maintain telemanagement system including personal computer hardware, software, backups, and restores; maintain in-depth knowledge of routing, trunking and translation intricacies of the telephone system.

Supplemental Functions:

Promote application database privacy, security and fraud awareness through seminars and training.

Research literature; attend meetings or conferences to stay informed and knowledgeable about new technology advances or potential application database security/fraud problems.

Perform special projects, as assigned.

Working Conditions:

Standard office environment; constant repetitive keyboarding and video terminal display exposure; regular visual concentration at close proximity to computer screen; occasional exposure to electrical or mechanical hazards.

Authorized by Classification/Compensation, Human Resources

Employees may be requested to perform job-related tasks other than those specifically presented in this description. Participating in the University's hazardous waste minimization program is part of the job of each employee who uses (or may come in contact with) hazardous materials. Fair Labor Standards Act (exempt/non-exempt) is designated by position. University of Wyoming actively supports Americans with Disabilities Act and will consider reasonable accommodations.

Share This Page:

Footer Navigation

University of Wyoming Medallion
 
1000 E. University Ave. Laramie, WY 82071 // UW Operators (307) 766-1121 // Contact Us // Download Adobe Reader