Information Security Analyst

Active Directory, telephone, mobility, Windows server and PC, Palo alto firewall, IDS/IPS, O365, SHAREPOINT, phishing, malware forensics, remediation
Full Time
Depends on Experience
Travel not required

Job Description

Job Description

Summary: Full time position (min 40 hours).  This position reports directly to the Senior Director of IT.  As an Information Security Analyst, you will design and implement IT security systems to protect the organization's computer and user networks from cyber-attacks. You will also help develop organization wide best practices for IT security. You will monitor computer networks for security issues, install security software and document all security issues or breaches. You need to be proficient with Microsoft, O365, Apple and Linux platforms.  Experience with penetration testing and techniques and installing security software and documenting security issues. In addition, you will have excellent written and oral communication skill and understand patch management and firewalls, antivirus and IDPS concepts.

Essential Duties and Responsibilities include the following, but not limited to:

  • Install security measures and operate software
  • Upgrade systems to enable security software
  • Install and upgrade antivirus software
  • Test and evaluate new technology
  • Perform penetration testing
  • Analyze IT requirements and provide objective advice on the use of IT security requirements
  • Gather feedback from end users to continue to improve systems
  • Design, analyze and implement efficient IT security systems
  • Analytical ability
  • Administering Information Security Software and Controls
  • Analyzing Security System Logs, Security Tools, and Data
  • Communicating Up, Down, and Across All Levels of the Organization
  • Creating, Modifying, and Updating Intrusion Detection Systems (IDS) 
  • Creating, Modifying, and Updating Security Information Event Management (SIEM) 
  • Experience with Intrusion Prevention Systems and Tools
  • Understanding of Risk Management Frameworks
  • Defining Process for Managing Network Security
  • Detail Oriented
  • Discovering Vulnerabilities in Information Systems 
  • Evaluating and Deconstructing Malware Software
  • Familiarity with Security Regulations and Standards
  • Implement and Maintain Security Frameworks for Existing and New Systems
  • Information Technology Knowledge
  • Improving Security Efficiency
  • Maintaining Security Records of Monitoring and Incident Response Activities
  • Monitoring Compliance with Information Security Policies and Procedures
  • Network and System Administration Experience
  • Remediating Security Issues
  • Responding to Requests for Specialized Cyber Threat Reports
  • Performing Cyber and Technical Threat Analyses
  • Performing Security Monitoring
  • Preventing Hacker Intrusion
  • Producing Situational and Incident-Related Reports
  • Problem-Solving
  • Mobile Device Security
  • Vulnerability Management
  • Cyber Forensics
  • Disaster Recovery Planning
  • Providing Host-Based Forensics
  • Providing Timely and Relevant Security Reports
  • Responding to Security Events
  • Self-Motivation
  • Staying One Step Ahead of Cyber Attacks
  • Strong Technical Background in Data Loss Prevention
  • Supporting and Managing Security Services
  • Team Player
  • Training Organization on Security Measures
  • Up-To-Date on Relevant Technologies

Required Knowledge, Skills, and Abilities:

  • Information Technology Knowledge
    • Threats to cybersecurity are always changing, as are the solutions. Information security analysts must continually update their knowledge of the latest data-protection news, cybersecurity legislation, practices, and techniques. A good information security analyst seeks out this information and uses it to shape his or her problem-solving strategies.


  • Information security analysts must have strong analytical skills. They have to be able to study computer systems, assess any potential risks, and consider possible solutions.


  • Information security analysts must educate users, explaining to them the importance of cybersecurity, and how they should protect their data. They have to communicate this information in a clear and engaging way. Therefore, information security analysts need strong oral and written communication skills. They must be able to communicate security measures and threats to people from a wide variety of technical and non-technical backgrounds.


  • Creativity is critical for Information Security Analysts. They must be able to anticipate cyberattacks, always thinking one step ahead of a cyber-threat. This kind of forward-thinking requires a creative approach.


  • Many threats to cybersecurity are hard to detect. Information Security Analysts have to be focused on the details of a security system, noting any minor changes, and foreseeing any potential problems, however small.
  • Platforms / Methodologies:
    • Amazon Web Service (AWS), Azure, CompTIA, Splunk Logging, Risk and Impact Analysis (SWOT), Network Security/Packet Sniffing, SDLC Methodologies (Agile), Application Monitoring, OS X, Microsoft Database, Windows Operating Systems
  • Tools:
    • Wireshark, RSA Netwitness Investigator, Qualys, Nessus, CyberArk, Active Directory, Ping Identity Federation, iNews, Avid MAM & PAM, NewsConnect, Volicon, SharePoint hosted applications, Icinga, Grafana, Zenoss, Splunk, Citrix, Cisco Jabber, WebEx, VPN, TeamViewer, TOAD, PostgreSQL, MySQL, Kali Linux, ServiceNow, Remedy, JIRA, Epic, Microsoft Office365 Suite (Excel, Word, Outlook, OneNote, PowerPoint, MS Project & Visio)

Education and Certification:

  • Bachelor degree in Computer Science or related Cybersecurity field


  • Certifications & Affiliations (or other related)
    • CompTIA Security Analytics Professional (CSAP), CompTIA Cybersecurity Analyst (CySA+) Certified, CompTIA Security+ Certified, Microsoft Azure Certified, Qualys Certified Specialist, EC Ethical Hacker (In Progress), Information Systems Audit and Control Association (ISACA)
Dice Id : 10421209
Position Id : 7011559
Originally Posted : 1 month ago
Have a Job? Post it