Desired Skills and Experience
- Identifies security vulnerabilities in applications.
- Creates custom integration software for applications monitoring.
- Develops tools for conducting data analyses on collected data sets, including review of computer logs and messages, to identify and report potential security related issues, or violations of security.
- Develops prototypes using the functional specifications for software projects, and experience with test-driven development.
- Hands on experience in designing web/systems applications.
- Researches, design, and writes new software programs that include code that is well designed, efficient, as well as testable.
- Develops new, and updates existing, security software tools.
- Integrates new software platforms, potentially incompatible, with existing software products supported by the University.
- Vulnerability and penetration testing of applications.
- Documents and demonstrates solutions by developing documentation, flowcharts, layouts, diagrams, charts, code comments and clear code.
- Develops software call graphs and data flow diagrams.
- Conducts security code review, provides feedback on improvements to the solution, and documents/reports findings.
- Follows, and provides feedback on, applicable software development processes, policies, procedures, and coding standards.
- Familiar with full-stack development, to include software engineering methodologies.
- Knowledge of Relational Databases, SQL and ORM technologies.
- Develops and maintains records of security events as mandated by the UT Systems or Texas State departments.
- Develops and documents the University’s Information Technology infrastructure.
- Complies with all Federal, State and University policies.
- Other duties or related functions may be assigned including special projects, as needed.
Apply