Cybersecurity Compliance Analyst
Listed on 2026-01-13
-
Security
Cybersecurity
Commitment to Mission
This job carries the obligation to uphold the Mission of Lone Star College (LSC) in carrying out the duties of the position. A commitment to positive interpersonal behaviors, professional communication, integrity, leadership, stewardship, respect and accountability to LSC students and employees is essential.
Cultural Beliefs- One LSC
- Student Focused
- Own It
- Foster Belonging
- Cultivate Community
- Choose Learning
The Chronicle of Higher Education’s Great Colleges to Work For® is designed to recognize colleges that have been successful in creating great workplaces and to further research and understanding of the factors, dynamics and influences that have the most impact on organizational culture at higher education institutions. Lone Star College has been recognized in multiple categories.
Campus Marketing StatementLone Star College offers high‑quality, low‑cost academic transfer and career training education to 80,000+ students each semester. LSC has been named a 2023 Great Colleges to Work For® institution by the Chronicle of Higher Education. LSC consists of eight colleges, seven centers, eight Workforce Centers of Excellence and Lone Star Corporate College. The location address is 20515 SH 249 (SH 249 and Louetta Road) Houston, Texas 77070‑2607.
Job DescriptionPurpose and Scope
:
The Cybersecurity Compliance Analyst is a hybrid role that combines responsibilities in both compliance validation and security operations, making it a key position in strengthening Lone Star College’s security posture and ensuring alignment with regulatory requirements. They are responsible for providing regular updates to the Executive Directory Cybersecurity, and prepare board level reporting.
- Stay abreast of current and proposed compliance‑related legislation and enforcing regulations to support the department in mitigating legal challenges, recommending new procedures, current trends, best practices, and complying with legal requirements.
- Continuously review, analyze, and evaluate the posture of cybersecurity framework and regulated security control compliance.
- Develop relevant statistical and narrative reporting, as needed, including data and records maintenance, retention and analysis for institutional requirements in compliance with federal, state and local laws as the College’s policies and procedures.
- Validate and assess compliance of security controls against frameworks such as NIST 800‑53, CSF, and/or Texas RAMP requirements.
- Perform gap analyses and document findings, including control deficiencies, remediation plans, and timelines.
- Support audit and assessment activities, including internal/external audits, by gathering and providing evidence for control effectiveness.
- Collaborate with internal auditors and cross‑functional teams to remediate identified control deficiencies and ensure documentation for processes and procedures are aligned with audit requirements.
- Investigate and respond to public information requests in compliance with applicable laws while ensuring confidentiality and data protection.
- Monitor real‑time alerts using SIEM platforms (i.e. Splunk, Microsoft Sentinel, Checkpoint) and data security platforms (i.e. Varonis) to detect, analyze, and respond to security incidents.
- Investigate email and data security incidents (e.g., phishing, spoofing, malicious attachments,) using email filtering tools.
- Perform triage of security alerts, correlate logs and data across platforms, and elevate incidents as needed.
- Assist in incident response activities, including containment, eradication, recovery, and root cause analysis.
- Maintain and improve security operations playbooks and standard operating procedures (SOPs).
- Review and validate SOPs to ensure they align with operational requirements and effectively support the remediation of compliance security control deficiencies.
- Conduct threat intelligence gathering and analysis to identify emerging risks and incorporate findings into detection strategies.
- Participate in vulnerability management processes, ensuring findings are addressed in alignment with policy and compliance mandates.
- Contribute to continuous compliance monitoring…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).