Information Security Analyst

Security AnalystSecurity AnalystFull TimeRemoteMid Level

Location

United States

Posted

7 days ago

Salary

Not specified

Seniority

Mid Level

SIEMIDSIPSDLPVulnerability ScanningTcp/ipDNSFirewallsVPNNISTISO 27001SOC 2GDPRHIPAA

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

The Information Security Analyst is responsible for protecting an organization’s computer systems, networks, and data from security threats. This role involves monitoring security systems, analyzing incidents, implementing security controls, and ensuring compliance with security standards. The analyst works closely with IT teams to identify vulnerabilities, respond to cyber incidents, and support the overall cybersecurity strategy.

Key Responsibilities

  • Security Monitoring & Incident Response
    • Monitor security events, alerts, and logs using SIEM and other monitoring tools.
    • Investigate potential security incidents and take remedial action.
    • Conduct root-cause analysis and document findings.
    • Respond to security breaches and support incident resolution processes.
  • Vulnerability & Risk Management
    • Perform routine vulnerability scans and risk assessments.
    • Assist in patch management and mitigation strategies.
    • Track and report security risks, ensuring timely remediation.
  • Security Tools & Technologies
    • Maintain and configure security tools such as firewalls, endpoint protection, IDS/IPS, and DLP systems.
    • Support deployment and tuning of SIEM solutions.
    • Evaluate new security technologies and assist with implementation.
  • Policy, Compliance & Governance
    • Support compliance initiatives such as ISO 27001, NIST, SOC 2, GDPR, or HIPAA.
    • Assist in developing and maintaining security policies, procedures, and standards.
    • Participate in internal and external audits.
  • Security Awareness & Training
    • Collaborate with HR/IT to conduct employee cybersecurity training.
    • Help develop awareness content on phishing, password hygiene, and secure practices.
  • Documentation & Reporting
    • Prepare technical documentation, risk assessments, and incident reports.
    • Provide regular updates to leadership on security posture and incidents.

Qualifications

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
  • 1–3 years of experience in information security, IT systems, or network administration.
  • Knowledge of common security frameworks (e.g., NIST CSF, ISO 27001).
  • Familiarity with security tools: SIEM, IDS/IPS, endpoint security, vulnerability scanners.
  • Understanding of networking concepts (TCP/IP, DNS, firewalls, VPN).
  • Strong analytical, troubleshooting, and communication skills.

Preferred Qualifications

  • Industry certifications such as:
    • CompTIA Security+
    • Certified Ethical Hacker (CEH)
    • GIAC Security Essentials (GSEC)
    • Certified Information Systems Security Professional (CISSP) (associate level acceptable)
  • Experience with cloud platforms (AWS, Azure, GCP) and cloud security tools.
  • Familiarity with scripting languages (Python, PowerShell, Bash).

Job Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
  • 1–3 years of experience in information security, IT systems, or network administration.
  • Knowledge of common security frameworks (e.g., NIST CSF, ISO 27001).
  • Familiarity with security tools: SIEM, IDS/IPS, endpoint security, vulnerability scanners.
  • Understanding of networking concepts (TCP/IP, DNS, firewalls, VPN).
  • Strong analytical, troubleshooting, and communication skills.
  • Preferred Qualifications
  • Industry certifications such as: CompTIA Security+ Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified Information Systems Security Professional (CISSP) (associate level acceptable)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • GIAC Security Essentials (GSEC)
  • Certified Information Systems Security Professional (CISSP) (associate level acceptable)
  • Experience with cloud platforms (AWS, Azure, GCP) and cloud security tools.
  • Familiarity with scripting languages (Python, PowerShell, Bash).

Related Job Pages

More Security Analyst Jobs

Forensic Collection Specialist

Harbor Litigation Solutions

Providing custom eDiscovery solutions to corporations, law firms and government entities.

Security Analyst7 days ago
Full TimeRemoteTeam 11-50Since 2012

Position Overview: The Forensic Collection Specialist is responsible for the acquisition, preservation, and documentation of digital evidence in a legally defensible manner. You will work directly with internal teams, clients, and occasionally custodia...

Digital forensicsEnCaseFTKCellebriteMagnet AXIOMChain-of-custodyESI collectionEvidence preservation
United States
Full TimeRemoteTeam 10,001

This role supports Starbucks Technology by driving compliance programs such as SOX, PCI, and SWIFT through effective risk-to-control alignment and scalable compliance operations. The analyst will design and maintain Governance Risk Compliance (GRC) capabilities across policies, standards, controls, assessments, and automation.

United States
$106K - $201K / year
Full TimeRemoteTeam 10,001

The role involves utilizing various tools to investigate security alerts and indicators of compromise, reviewing log data, and assessing the operational health of security platforms. Responsibilities include detecting, assessing, and responding to incidents, performing rapid triage, following playbooks, and creating custom detections aligned with the MITRE ATT&CK Framework.

United States
$112K - $211K / year

Abuse Investigator (Violent Activities)

OpenAI

A privately-held artificial intelligence (AI) research company, OpenAI discovers, builds, and enacts paths to secure artificial general intelligence (AGI). Foun

Security Analyst7 days ago
Full TimeRemote

The investigator will detect, review, and disrupt malicious uses of the platform, focusing on violent attacks and terrorist-related activity, often responding to time-sensitive escalations. This involves partnering with policy and legal teams, developing abuse signals, and improving operational workflows.

United States
$288K - $425K / year