Overview Johnson County Government is seeking a skilled and experienced Security Analyst II to join our team. In this role, you will play a critical part in maintaining and enhancing our security posture, with a strong emphasis on securing SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems) environments. You will assist with security projects, support the continuous improvement of our security practices, and safeguard our valuable information assets by designing, implementing, and monitoring information protection activities. This position bridges the gap between traditional IT security and the unique challenges of securing Operational Technology (OT) environments. The ideal candidate will possess a deep understanding of both domains and be capable of applying cybersecurity principles across converged IT/OT infrastructures. This position is currently eligible to work in a hybrid work environment with both onsite and remote work. Residency within the Kansas City-Overland Park-Kansas City, MO-KS Combined Statistical Area, which generally includes the Kansas counties of Johnson, Wyandotte, Leavenworth, Miami, and Linn, and the Missouri counties of Jackson, Clay, Platte, Cass, and Ray, is required. Job Description Key Responsibilities Strengthen Johnson County’s security posture through technology evaluation, process improvement, and secure architecture design. Assist in threat identification and analysis for current and evolving risks and vulnerabilities and work to minimize or neutralize security weaknesses. Conduct and analyze penetration tests and vulnerability scans, taking corrective action as needed to address security weaknesses efficiently and effectively. Perform risk assessments and security reviews of SCADA/ICS systems and propose changes to ensure operational continuity and compliance. Support the deployment of new technologies and coordinate security projects. Monitor, analyze, and respond to security incidents, advisories, and alerts affecting both enterprise and industrial networks. Conduct reporting and auditing of Identity and Access Management. Work with end users and operational teams to ensure secure functionality and promote security awareness. Maintain technical documentation of security procedures, standards, and strategies. Utilize forensic tools to collect and analyze data related to security events. Participate in on-call rotation. Collaborate with both IT and OT teams to develop and implement unified security strategies that protect enterprise and industrial control systems. Design and enforce security controls that are tailored to the distinct needs of OT environments (e.g., availability and safety) while aligning with IT governance and compliance standards. Serve as a liaison between IT security, SCADA engineers, and operational stakeholders to ensure cohesive risk management and incident response across all technology layers.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
1,001-5,000 employees