Information Security Analyst

Overview

On Site
USD 80,000.00 - 85,000.00 per year
Full Time

Skills

Profit And Loss
Endpoint Protection
Writing
Security Operations
IT Security
KPI
Network
Vulnerability Management
Social Engineering
Artificial Intelligence
Threat Analysis
Evaluation
Security Controls
Risk Assessment
Risk Management
Business Process
Security Awareness
Cloud Computing
Reporting
Leadership
Training
Python
Windows PowerShell
Version Control
Technical Writing
Servers
Internet
Scheduling
Performance Metrics
QoS
Soft Skills
Research
Technical Analysis
Presentations
Continuous Improvement
Analytical Skill
Problem Solving
Conflict Resolution
Incident Management
Root Cause Analysis
Documentation
Communication
SAFE
Agile
Supervision
Computer Science
Cyber Security
CISSP
SSCP
CISM
Vulnerability Scanning
Management
Network Administration
Regulatory Compliance
Firewall
Proxies
SIEM
IDPS
.NET
Sales
NATURAL
Product Design
Merchandising
Scripting
Information Security
Taxes
Life Insurance
SEP
Collaboration
Partnership
Business Transformation
Law

Job Details

Job Title: Information Security Analyst

Top Skills Details
A Bachelor's degree, or someone who is on track to complete a Bachelor's degree is required
2-3+ years of experience within Cybersecurity in Security Operations and Vulnerability Management
Most Important
  • Policy & Metrics: Collaborate on developing security policies, procedures, standards, and plans. Help establish and track performance metrics (KPIs/KRIs).
  • Risk Assessment: Participate in risk assessments for technologies, analyze and quantify risks, and help prioritize vulnerabilities.
  • Security Awareness: Support security training programs, help run phishing campaigns, and track/report training metrics.
  • Scripting & Automation: Develop foundational skills in Python, PowerShell, etc., and contribute to automating security tasks.

Worksite Address: 1 Persnickety Pl,Plymouth,WI,USA,53073-3544

Workplace Type
Hybrid - ideally someone who is willing to come onsite 1-3 days per week.

Product Contract to Hire (Will Convert FTE after 6 months on contract)
Base Salary conversion - $80-85K
Pay Rate for Contract duration: $35.00-40.00/hr
Day to Day and types of experience we would like to see include:
Developing policies vulnerability management, security assessments,
Email protection, endpoint protection, threat intelligence
Understanding of firewall proxy/Security Operations
Writing security procedures and standards
Leveraging scripting for automation would be a plus
Security awareness training
Security operations - addressing alerts in tools
Phishing campaigns - running them
Metrics - they will do reporting on the metrics they have established
As an Information Security Analyst, you will be responsible for identifying,
reporting and remedying cybersecurity
vulnerabilities, identifying and documenting IT security risks, and assisting
the Information Security team in security event
triage, investigation, containment, and root cause analysis. Maintains
information security standards, procedures, reports,
and metrics and assists in evaluating and implementing security technologies
and tools.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following: other duties may
be assigned.
TECHNICAL SKILLS
Collaborate with team members in developing and maintaining policies,
procedures, standards, and associated plans
for information security, following industry-standard best practices.
Contribute to establishing and maintaining performance
metrics, KPIs, and KRIs for reporting and tracking the security program\'s
performance and effectiveness.
Administer the Vulnerability Management system, executing vulnerability
scanning assessments on software, operating
systems, and network devices. Create and maintain vulnerability management
reports under the guidance of team
members.
Administer email protection systems, ensuring day-to-day operational
effectiveness. Implement and enforce established
protection policies. Conduct research on social engineering threats,
contributing insights to enhance protection policies.
Assist in the creation and refinement of protection policies. Contribute to the
assessment and implementation of AI-driven
solutions for potential integration. Provide support in the development and
implementation of automated response actions.
Participate in conducting risk assessments for current and new technologies,
identifying potential security risks and
vulnerabilities. Contribute to the analysis and quantification of risks,
providing insights into the potential impact and
likelihood of scenarios. Assist in identifying and prioritizing
vulnerabilities, contributing to efforts in reducing overall
security risk. Collaborate with the Information Security Manager on assessing
threat intelligence relevance. Support the
evaluation of existing security controls and propose basic improvements based
on risk assessments. Contribute to reports
for executive leadership, providing insights into the organization\'s risk
posture. Begin collaborating with other departments
to integrate security risk management into business processes. Actively engage
in cross-functional teams to address security
risks effectively.
Support the overall Security Awareness and Training program, contributing to
the execution of strategies and initiatives.
Perform in the administration of the Security Awareness and Training
cloud-based platform. Participate in the design and
execution of company-wide and focused phishing test campaigns based on trending
threats and user risks. Contribute to the
design and scheduling of training campaigns. Contribute to the development and
tracking of phishing and training metrics
and report preparation for leadership. Engage in continuous learning to stay
abreast of evolving cybersecurity threats and
training methodologies.
Develop foundational scripting and coding skills in Python, PowerShell, or
other relevant scripting languages. Begin
leveraging scripting and automation for foundational security tasks, including
basic threat hunting, vulnerability
assessments, and response automation. Contribute to initiatives aimed at
introducing automation to security processes within
the IT environment. Follow scripting best practices, including version control
and documentation. Collaborate with IT teams
to understand and support basic automation strategies.
Participate in planning and contributing to the design, building, and
implementation of security solutions. Contribute to
ensuring the protection of company information, emphasizing availability,
integrity, confidentiality, and availability. Assist
in developing technical documentation and procedures for securing systems,
servers, networks, and Internet systems, under
guidance.
Collaborate with advanced team members to research emerging products, services,
protocols, and standards to enhance security.
Support in recommending, scheduling, and participating in security
improvements, upgrades, and/or purchases.
Coordinate small projects or project task related to medium, and large
projects, working alongside internal and external
resources and consulting partners. Contribute to developing and implementing
performance metrics, ensuring projects align
with specific Statements of Work. Support efforts to maintain the expected
quality of service while managing project costs
effectively.
SOFT SKILLS
Assist in the research to the research on technologies, contributing to
providing analysis and a breakdown of advantages
and disadvantages for each option, including recommendations with cost
analysis. Develop the ability to explain technical
ideas and concepts in a clear manner to both technical and non-technical team
members. Learn and practice communication
skills to participate in crucial conversations to resolve conflict or
differences of opinion of a technical nature. Listen and
participate as directed in the interaction with vendors/partners, offering
questions to understand the vendor and their
offerings. Develop technical analysis and provide explanations other technical
resources using examples, diagrams, and
presentations.
Engage in inter-team and cross-team discussions on technical issues and process
development and assist in troubleshooting
sessions. Learn and understand the value of continuous improvement for the
environment and the value of self-improvement
in technical and non-technical skills. Develop and practice verbal and
electronic communication skills and the importance
of the productive delivery of information and ideas within your team. Listen
and engage with others to better understand
ideas and positions from others, asking questions to understand differing
perspectives better.
Develop foundational skills in using troubleshooting tools and techniques for
effective problem resolution. Build basic
analytical and problem-solving skills to contribute to identifying and
resolving security issues. Actively participate in
incident response activities, providing support for basic security incidents
and contributing to basic root cause analysis.
Learn and apply basic documentation practices for troubleshooting processes and
solutions. Develop basic communication
skills for collaboration with team members and effective information
conveyance.
Understand and explain SAFe Agile methodology, terminology, roles, and
responsibilities of the Agile TRAIN to agile and
non-agile personnel. Understand the value of agile in planning and practice
across increments and program increments; be
able to explain stories, features, and initiatives from a feature perspective.
Recommend and construct fully developed stories,
including acceptance criteria, understand dependencies, and participate in
discussions with supporting teams; suggest
features to the PO with acceptance criteria and business outcomes.
Must be willing to work outside of regular work hours for special projects and
on-call responsibilities. Responsible for
reacting to all off-hour calls regarding system problems promptly and
reasonably.
SUPERVISORY RESPONSIBILITIES
This job has no supervisory responsibilities.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each
essential duty satisfactorily. The requirements
below represent the required knowledge, skill, and/or ability. Reasonable
accommodations may be made to enable
individuals with disabilities to perform essential functions. The applicant
must be authorized to work in the USA legally.
EDUCATION and/or EXPERIENCE
Bachelor\'s degree in Computer Science, Information Security, Cybersecurity,
or any IT-related field
3+ years of relevant Cybersecurity, Information Security, IT, or IT System
Administration experience.
CISSP, SSCP, CISM certification is preferred.
Experience in vulnerability scanning and management tools are a plus.
Expereince in systems and network administration is highly desirable.
Understanding of Governance, Risk and Compliance.
Knowledgeable with NIST CSF or CIS Controls
Understanding of firewalls, proxies, XDR, SIEM, EPP and IDPS concepts

EVP
Culture: ;br>Benefits: ;br>(would not be available until converted)
With over 2,400+ employees and net sales of nearly $1.8 billion, Sargento is a
family-owned company that has been a leader in cheese for more than 70 years.
We created the world's first, successful pre-packaged sliced and shredded
natural cheeses. Sargento is based in Plymouth, Wisconsin, where we manufacture
and market shredded, sliced and snack natural cheese products, as well as
ingredients and sauces. Sargento is known for the exceptional quality of our
products and for product design, packaging and merchandising innovations that
have transformed our industry.

Work Environment
team of around 5-6 focused on security

Additional Skills & Qualifications
scripting for automation a nice to have

Interview Information
1. Virtual Interview with Manager
2. Onsite with Team

Business Challenge:
This role is responsible for mitigating information security risk for the organization

Pay and Benefits
The pay range for this position is $35.00 - $39.00/hr.
Eligibility requirements apply to some benefits and may depend on your job
classification and length of employment. Benefits are subject to change and may be
subject to specific elections, plan, or program terms. If eligible, the benefits
available for this temporary role may include the following:
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long-term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Plymouth,WI.
Application Deadline
This position is anticipated to close on Sep 29, 2025.
>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.

The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.

About TEKsystems and TEKsystems Global Services

We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.

The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About TEKsystems c/o Allegis Group