The Information Security Analyst II will play a crucial role in safeguarding the company's assets and ensuring the confidentiality, integrity, and availability of our information systems and data. The Information Security Analyst II will be responsible for monitoring, analyzing, and responding to security threats and vulnerabilities, while actively contributing to the enhancement of our cybersecurity posture. In addition, the Information Security Analyst II will proactively monitor the ever-evol... more details
Information Security Analyst Salary Range: $115k to $130k
Job Summary
The Information Security Analyst II will play a crucial role in safeguarding the company's assets and ensuring the confidentiality, integrity, and availability of our information systems and data. The Information Security Analyst II will be responsible for monitoring, analyzing, and responding to security threats and vulnerabilities, while actively contributing to the enhancement of our cybersecurity posture.
In addition, the Information Security Analyst II will proactively monitor the ever-evolving threat landscape to ensure the company maintains relevant security controls to mitigate any potential risks.
Essential Functions
Security Governance - Establish and maintain self-audits, policies, and procedures to provide assurance that information security strategies are aligned with applicable laws and regulations through adherence to internal controls.
Understand the security landscape and contribute to the development and review of security policies and procedures to address new regulations, threats, or best practices.
Stay abreast of Audit requirements and assist with the management of self-audits and Internal/External audits.
Contribute to the development of end user security training and awareness program.
Threat Management - Ability to understand security threats and their risk to the organization.
Assist with periodic security assessments, vulnerability, and pen tests.
Assist with the tracking of any remediation required due to security assessments / tests.
Review security tool logs to look for any potential security issues or breaches.
Security Roadmap – Ability to guide the organization in the development of the Security Program Roadmap.
Contribute to the development of the Security Program Roadmap.
Security Engineering - Architects and implements security technologies.
Assist with identifying potential security technologies and researching their capabilities.
Contribute to the design and implementation of security solutions.
Supplemental Duties and Responsibilities
Pursues training and development opportunities; strives to continuously build knowledge and skills
Assist personnel in other technology departments to resolve technical and/or application issues
Participate and assist in the coordination of both internal and external audits
Participate in On-Call rotation
Other duties as requested
Required & Preferred Qualifications
Bachelor’s Degree or equivalent work experience in a related field required
3+ years’ experience in an Information Security role to include experience in assessing and recommending internal application and infrastructure controls required
Professional security management certification, such as a CompTIA Security+ is highly desirable
Must be self-motivated and able to work independently, with minimal supervision and as part of a team
Knowledge and hands-on experience with a Security Incident and Event Monitoring (SIEM) tool, performing log analysis, correlation, and incident response, required.
Experience in the monitoring and the development of new rules to address detection gaps, required
Experience in utilizing vulnerability management tools to identify, assess, and collaborate with other teams to remediate security risks highly desired
Experience in utilizing, managing, and optimizing a centrally managed EDR/XDR solution, highly desired
Knowledge and experience with common information security management frameworks and best practices, specifically the National Institute of Standards and Technology (NIST) frameworks and Center for Internet Security (CIS) Critical Security Controls desired
Knowledge and experience with security infrastructures and networking concepts (e.g. Basic routing, NT, Firewalls, IDS/IPS, VPN, Secure Email Gateways, Web Content Filters, Proxies, DLP) preferred.
General understanding of technical infrastructure (Virtualization, Active Directory, Applications, various Operating Systems, etc.)
Understanding of authentication concepts, SSO, encryption, ciphers, certificates, and various MFA technologies
Detail oriented with excellent interpersonal communication skills
Expected to partner, collaborate, and mentor effectively with other teams on an ongoing basis
Strong analytical skills and the ability to present information in an easily consumable format
Strong organizational skills and ability to multi-task in an enterprise business environment.
Ability to manage and track completion of projects and remediation tasks
Proficient technical documentation skills
Strong written, verbal, and presentation communication skills and ability to communicate at all levels within an organization
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.