Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide. Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you. At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.
Information Security Analyst II
Location
United States
Posted
4 days ago
Salary
$94.1K - $150K / year
Seniority
Mid Level
No structured requirement data.
Job Description
Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide.
Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you.
Make an impact — from near or far
At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.
We ask that our remote employees have access to a reliable internet connection and a dedicated, properly equipped workspace that is free of distractions. Employees must reside in, and work from, one of the above approved states.
The opportunity
The Information Security Analyst II will report directly to the Director of Information Security Operations. As an Information Security Analyst II, you will be a senior member of the Security Operations Center (SOC) team and is responsible for monitoring a large, complex enterprise technology ecosystem, detecting, analyzing, and investigating information security events within that ecosystem, and responding to information security incidents to ensure the protection of SNHU's mission critical technology resources and institutional information.
The SOC team analyzes events from multiple sources from across all university technology resources including networks, applications, and other assets.
The critical duties and responsibilities of the SOC team must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work, and/or require work during non-business hours.
You will work 100% remotely from any of our approved working states. #LI-Remote
What You'll Do:
- Be an initial evaluation point for all security-related tickets that come into the team's multiple queues (including triage, containment, and remediation).
- Understand the basic incident response lifecycle.
- Excel at documentation and detailed notetaking, including SOP writing, incident reporting, email and instant messaging etiquette, and most importantly, documenting incident actions.
- Collect and analyze log data from complex, virtualized, multi-site computing environments and SNHU's technology ecosystem.
- Conduct real-time monitoring of security events from multiple sources and use analytical and problem-solving skills to identify, triage, analyze, investigate, and escalate information security events and alerts.
- Analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
- Perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
- Perform investigation and escalation for complex or high severity security threats or incidents.
- Coordinate information security incident response according to SNHU's Information Security Incident Response Plan.
- Communicate with partners, in a non-technical manner, at all organizational levels as part of incident response and remediation activities.
- Design and implement or monitor information security incident remediation plans.
- Design and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
- Design, deploy, and manage detections and alerts for specific or common threat conditions.
- Design and implement standard operational processes for handling common incident types.
- Maintain automation scripts and other tools to enhance security operations efficiency.
- Familiarity with enterprise security tools like Splunk, Tenable, Proofpoint tools, Microsoft Defender components, Office 365 tools, PowerShell, and multiple network tools.
- Demonstrate a deep source of ethics, integrity, and confidentiality.
- Can remain calm and function at the highest level during a crisis.
- Remain up to date on latest threat intelligence.
- Develop strategies and solutions that improve or mitigate the risks associated with these threats.
- Work cross-functionally across ITS and all SNHU departments to provide guidance, and technical implementations to include triage, containment, and remediation when applicable.
- Provide customer support according to SNHU's Core Values and understand how and when to escalate potential issues.
- Help with risk management, vulnerability management, security assessment, auditing, and security authorization projects, as directed by the university's Information Security Management team.
- Provide mentoring to junior analysts.
- Other responsibilities as assigned.
What We're Looking For:
- 5+ years experience in information technology or Cyber Security Operations.
- 2+ years working in a security operations center (SOC), a cybersecurity operations center or on a cybersecurity incident response team.
- Professional Certifications like: ISC2 CISSP Certification, SANS GIAC, GSEC, GCIH, GCFA, GCDA, GMON, GCED, GSOC or other relevant industry certification.
- Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, Windows/Linux operating system logs, network scanners, log aggregation tools, Endpoint Detection and Response (EDR) tools, and other platforms in the environment that enable enterprise-wide security monitoring.
- Experience with MITRE ATT&CK framework.
We believe real innovation comes from inclusion - where different experiences, perspectives and talents are celebrated. So if you're wondering whether SNHU is right for you, take the leap and apply. You might be just the person we're looking for.
Compensation
The annual pay range for this position is $94,130.00 - $150,634.00. Actual offer will be based on skills, qualifications, experience and internal equity, in addition to relevant business considerations. We expect this position to be hired in the following target hiring range $104,012.00 - $140,723.00.Exceptional benefits (because you’re exceptional)
You’re the whole package. Your benefits should be, too. As a full-time employee at SNHU, you’ll get:
High-quality, low-deductible medical insurance
Low to no-cost dental and vision plans
5 weeks of paid time off (plus almost a dozen paid holidays)
Employer-funded retirement
Free tuition program
Parental leave
Mental health and wellbeing resources
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
Prominence Advisors is actively seeking an Epic Security Analyst to join their team. You'll have the opportunity to help healthcare organizations solve their toughest challenges through your ability to drive strategic process improvement, manage co...
ECS is seeking a Mid-Level SOC Analyst with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, and analyze event messages to rapidly and assuredly identify and respond to Indicators of C...
This is a remote role that may be hired in several markets across the United States. The Senior AML/CFT Compliance Analyst is responsible for conducting complex investigations, quality assurance reviews, due diligence reviews, and data analysis to ensure compliance with Anti-Mone...
GRC Analyst
SysLogic, Inc.Driving technology solution excellence with people, platforms and partnerships that impact the world.
As part of ongoing programmatic service offerings to a strategic client, SysLogic is seeking to add a Third-Party Risk & Governance, Risk, and Compliance (GRC) Analyst to join our growing Information Security team. This role will be pivotal in strengthening the organization’s t...