Information Technology Auditor; Austin
Listed on 2025-12-30
-
IT/Tech
Cybersecurity
About the Texas Workforce Commission
Texas Workforce Commission connects people with careers across the state. While we are based in Austin on the north lawn of the Texas State Capitol, we have offices statewide. We’re a Family Friendly Certified Workplace with great work‑life balance, competitive salaries, extensive opportunities for training and development, and fantastic benefits. This position is located at 1117 Trinity Street, Austin, Texas, in the Chief Info Security Officer department.
EligibilityTWC is not considering applications from individuals who require sponsorship for an employment visa, including those currently on student or postgraduate visas. You must be a Texas resident to work for the Texas Workforce Commission or be willing to relocate to Texas.
What You Will DoIn this role you will perform advanced (senior‑level) audit analysis work, under the direction of the Governance, Risk, and Compliance Manager, to support TWC’s mission of serving Texas residents. Responsibilities include assessing agency assets, delivering cybersecurity control compliance monitoring, threat assessment, cyber intelligence, managing Plan of Actions and Milestones (POAMs), conducting vulnerability assessments, responding to security incidents after hours, and providing occasional travel to other sites as required.
You will work with limited supervision, exercising independent judgment and initiative.
- Collaborate with cross‑functional teams across the agency to ensure understanding and implementation of cybersecurity requirements.
- Manage Plan of Action and Milestones (POAM) tracking.
- Perform information technology security reviews and general information technology or application control reviews, as needed, to address audit objectives.
- Prepare and review audit reports dealing with complex and sensitive issues in a timely manner for internal and external audiences.
- Review and recommend information technology control elements to mitigate information technology risks regarding the confidentiality, integrity, and availability of business information.
- Participate in the response to cybersecurity incidents through forensic analysis of information systems and forensic recovery of data using assessment tools. Document incident response actions and results during and after response. Participate in post‑incident review and analysis to improve agency protection, detection and response efforts.
- Perform other duties as assigned.
- Graduation from an accredited four‑year college or university with major coursework in information systems, accounting, business administration, finance, economics, public affairs/administration, or a related field; plus four years of full‑time experience in information systems, program or Information Technology auditing, control, or security work; or in management information systems analysis, business process analysis, contract monitoring, or positions that provided extensive knowledge of agency budgetary controls or administrative procedures and related state and federal regulatory laws, one year of which must have been in a supervisory or administrative management capacity.
- A license to practice as a Certified Public Accountant (CPA) in Texas satisfies the educational requirement and two years of the nonsupervisory or non‑administrative management experience.
- A certificate to practice as a Certified Internal Auditor (CIA) or as a Certified Information Systems Auditor (CISA) satisfies the educational requirement and two years of the nonsupervisory or non‑administrative management experience.
- One year of full‑time qualifying experience may be substituted for each year (30 semester hours) of education.
- Experience conducting audits and security assessments of policies, standards, procedures, and technical environments within state and federal regulatory frameworks.
- Strong understanding of cybersecurity program implementation, control effectiveness monitoring, and risk management.
- Experience evaluating IT controls and analyzing complex security issues in decentralized environments to identify areas for improvement.
- Proficiency in technical…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).