The Cyber Threat Analyst I will be responsible for ensuring that ACA's IT systems and underlying infrastructure are implemented and managed securely. In order to accomplish this, you are expected to take the initiative to independently learn and understand ACA’s operations, people, and systems. Our InfoSec team is expected to be fully engaged with IT and the business and avoid any notion of needing to “be brought the information” or “chuck things over the wall” to other departments. A Cyber Threat Analyst 1 will only be successful based on how well they know and understand ACA’s operations, people, and systems. Essential Functions Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions listed below. Partner with IT to help design, implement, and maintain secure systems and networks, including servers, routers, switches, firewalls, intrusion detection/prevention systems, and other security devices. Perform vulnerability assessments, penetration testing, and risk assessments to identify and prioritize potential security risks and vulnerabilities. Develop and implement security measures, policies, and procedures to protect systems and networks against unauthorized access, data breaches, and other security incidents. Monitor and analyze security logs and events and respond to security incidents in a timely manner. Collaborate with cross-functional teams to ensure that security requirements are incorporated into system and network design, development, and implementation processes. Provide technical expertise and guidance to IT and network engineering teams to ensure that security controls are effectively implemented and maintained. Stay updated on the latest security threats, technologies, and industry trends, and provide recommendations for improving security posture. Participate in incident response activities, including investigation, containment, and recovery efforts, as needed. Provide training and awareness programs to educate employees and users about security best practices and procedures. Monitor security systems such as firewall, intrusion detection, and EDR. Ensure that alerts are tuned appropriately and are happening as expected. Understand ACA’s business operation, the systems that are used and will be used, and support the development and implementation of security policies and procedures. Audit processes and systems. Document, communicate and follow-up.