Desired Skills and Experience

  • Identifies security vulnerabilities in applications.
  • Creates custom integration software for applications monitoring.
  • Develops tools for conducting data analyses on collected data sets, including review of computer logs and messages, to identify and report potential security related issues, or violations of security.
  • Develops prototypes using the functional specifications for software projects, and experience with test-driven development.
  • Hands on experience in designing web/systems applications.
  • Researches, design, and writes new software programs that include code that is well designed, efficient, as well as testable.
  • Develops new, and updates existing, security software tools.
  • Integrates new software platforms, potentially incompatible, with existing software products supported by the University.
  • Vulnerability and penetration testing of applications.
  • Documents and demonstrates solutions by developing documentation, flowcharts, layouts, diagrams, charts, code comments and clear code.
  • Develops software call graphs and data flow diagrams.
  • Conducts security code review, provides feedback on improvements to the solution, and documents/reports findings.
  • Follows, and provides feedback on, applicable software development processes, policies, procedures, and coding standards.
  • Familiar with full-stack development, to include software engineering methodologies.
  • Knowledge of Relational Databases, SQL and ORM technologies.
  • Develops and maintains records of security events as mandated by the UT Systems or Texas State departments.
  • Develops and documents the University’s Information Technology infrastructure.
  • Complies with all Federal, State and University policies.
  • Other duties or related functions may be assigned including special projects, as needed.

Apply