POSITION OVERVIEW. The Information Security Analyst will have 2-4 years of working experience in information technology security / network engineering. An educational background in Cybersecurity, Information Technology, Computer Engineering, or a related field is preferred.
As a member of the Security Operations Center, the Information Security Analyst will work with their manager and team to secure, monitor, and protect all aspects of technology infrastructure in enterprise IT environments. The Information Security Analyst should have experience with firewall administration and configuration, operating systems, Windows servers, desktop, Mac OS, Linux, email filters, configuration administration, Microsoft 365, IT security, Active Directory, Azure Active Directory, ATP (Advanced Threat Protection), EDR/XDR (End-Point Response and Extended Protection Response), and SIEM (Security Incident Event Monitoring).
The Information Security Analyst will be a vigilant problem solver with a strong desire to learn new skills, a strong attention to detail, and the ability to multi-task in a fast-paced environment. Because this is a client-facing role, a high degree of professionalism, strong customer service skills, and expert communication skills—both verbal and written—are required. The Information Security Analyst should proactively collaborate with their manager and team at staying up to date with cyber security trends, threats, updates, and news.
ESSENTIAL FUNCTIONS / RESPONSIBILITIES. (Other duties as assigned)
1. Plan the security posture for the Full Enterprise IT Stack.
2. Serve as Security Lead/Interface for Assigned Customers, providing excellent customer service.
3. Install, configure, and maintain security tool sets.
4. Establish and maintain compliance and monitoring standards.
5. Firewall administration and configuration.
6. Accomplish tasks using various operating systems—including Windows, Mac, Linux.
7. Use email filters to analyze, flag, and respond to potentially malicious emails.
8. Boost security and reduce risk through configuration administration.
9. Protect, monitor, update and respond to incidents on various servers—both hardware and cloud-based.
10. Work with manager and team to utilize best practices in ATP (Advanced Threat Protection), EDR/XDR (End-Point Response and Extended Protection Response), and SIEM (Security Incident Event Monitoring).
11. Respond to IT security needs, which may include occasional travel to various client sites.