Information Security Analyst
Location
United States
Posted
7 days ago
Salary
Not specified
Seniority
Mid Level
Job Description
Role Description
The Information Security Analyst is responsible for protecting an organization’s computer systems, networks, and data from security threats. This role involves monitoring security systems, analyzing incidents, implementing security controls, and ensuring compliance with security standards. The analyst works closely with IT teams to identify vulnerabilities, respond to cyber incidents, and support the overall cybersecurity strategy.
Key Responsibilities
-
Security Monitoring & Incident Response
- Monitor security events, alerts, and logs using SIEM and other monitoring tools.
- Investigate potential security incidents and take remedial action.
- Conduct root-cause analysis and document findings.
- Respond to security breaches and support incident resolution processes.
-
Vulnerability & Risk Management
- Perform routine vulnerability scans and risk assessments.
- Assist in patch management and mitigation strategies.
- Track and report security risks, ensuring timely remediation.
-
Security Tools & Technologies
- Maintain and configure security tools such as firewalls, endpoint protection, IDS/IPS, and DLP systems.
- Support deployment and tuning of SIEM solutions.
- Evaluate new security technologies and assist with implementation.
-
Policy, Compliance & Governance
- Support compliance initiatives such as ISO 27001, NIST, SOC 2, GDPR, or HIPAA.
- Assist in developing and maintaining security policies, procedures, and standards.
- Participate in internal and external audits.
-
Security Awareness & Training
- Collaborate with HR/IT to conduct employee cybersecurity training.
- Help develop awareness content on phishing, password hygiene, and secure practices.
-
Documentation & Reporting
- Prepare technical documentation, risk assessments, and incident reports.
- Provide regular updates to leadership on security posture and incidents.
Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 1–3 years of experience in information security, IT systems, or network administration.
- Knowledge of common security frameworks (e.g., NIST CSF, ISO 27001).
- Familiarity with security tools: SIEM, IDS/IPS, endpoint security, vulnerability scanners.
- Understanding of networking concepts (TCP/IP, DNS, firewalls, VPN).
- Strong analytical, troubleshooting, and communication skills.
Preferred Qualifications
-
Industry certifications such as:
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)
- Certified Information Systems Security Professional (CISSP) (associate level acceptable)
- Experience with cloud platforms (AWS, Azure, GCP) and cloud security tools.
- Familiarity with scripting languages (Python, PowerShell, Bash).
Job Requirements
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 1–3 years of experience in information security, IT systems, or network administration.
- Knowledge of common security frameworks (e.g., NIST CSF, ISO 27001).
- Familiarity with security tools: SIEM, IDS/IPS, endpoint security, vulnerability scanners.
- Understanding of networking concepts (TCP/IP, DNS, firewalls, VPN).
- Strong analytical, troubleshooting, and communication skills.
- Preferred Qualifications
- Industry certifications such as: CompTIA Security+ Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified Information Systems Security Professional (CISSP) (associate level acceptable)
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)
- Certified Information Systems Security Professional (CISSP) (associate level acceptable)
- Experience with cloud platforms (AWS, Azure, GCP) and cloud security tools.
- Familiarity with scripting languages (Python, PowerShell, Bash).
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
Forensic Collection Specialist
Harbor Litigation SolutionsProviding custom eDiscovery solutions to corporations, law firms and government entities.
Position Overview: The Forensic Collection Specialist is responsible for the acquisition, preservation, and documentation of digital evidence in a legally defensible manner. You will work directly with internal teams, clients, and occasionally custodia...
This role supports Starbucks Technology by driving compliance programs such as SOX, PCI, and SWIFT through effective risk-to-control alignment and scalable compliance operations. The analyst will design and maintain Governance Risk Compliance (GRC) capabilities across policies, standards, controls, assessments, and automation.
The role involves utilizing various tools to investigate security alerts and indicators of compromise, reviewing log data, and assessing the operational health of security platforms. Responsibilities include detecting, assessing, and responding to incidents, performing rapid triage, following playbooks, and creating custom detections aligned with the MITRE ATT&CK Framework.
Abuse Investigator (Violent Activities)
OpenAIA privately-held artificial intelligence (AI) research company, OpenAI discovers, builds, and enacts paths to secure artificial general intelligence (AGI). Foun
The investigator will detect, review, and disrupt malicious uses of the platform, focusing on violent attacks and terrorist-related activity, often responding to time-sensitive escalations. This involves partnering with policy and legal teams, developing abuse signals, and improving operational workflows.