Cybersecurity and Network Analyst

High Point UniversityHigh Point, NC
1d

About The Position

High Point University is seeking a Cybersecurity and Network Analyst to support and enhance the University’s information security posture while maintaining and securing core network infrastructure. This position blends cybersecurity operations with hands-on network security responsibilities and plays a critical role in protecting institutional data, systems, and services. The Cybersecurity and Network Analyst is responsible for monitoring, analyzing, and responding to security threats; administering and optimizing security platforms; and supporting secure network operations. This role works closely with Enterprise Security, Network Services, and other OIT teams to ensure confidentiality, integrity, and availability of University systems while aligning with established change management, risk management, and security best practices. For more information about this position, please contact Donald Williams, Director of Enterprise Security and Network Services at [email protected]

Requirements

  • Bachelor’s Degree in Computer Science, Cybersecurity, Information Technology, or a closely related field, or an equivalent combination of education and experience.
  • 1-3 years of progressive experience in cybersecurity, network security, or enterprise IT security roles.
  • Hands-on experience with Cisco security and network platforms, including Cisco Catalyst Center, Cisco Secure Cloud Analytics (SCA), Cisco Identity Services Engine (ISE), Cisco XDR, Cisco Firepower Threat Defense, Cisco Firepower Management, and related security technologies.
  • Experience administering and responding to alerts from Microsoft security platforms, including Microsoft Defender, Microsoft XDR, Entra ID, and Azure security services.
  • Experience monitoring and analyzing security alerts using SIEM and security analytics platforms (e.g., Wazuh, Graylog, or similar tools).
  • Working knowledge of network fundamentals, including routing, switching, firewalls, access control, and network segmentation from a security perspective.
  • Experience supporting or integrating security controls within enterprise environments (on-prem and cloud).
  • Strong analytical, investigative, and problem-solving skills with a security-focused mindset.
  • Demonstrated passion for cybersecurity and continuous learning in evolving threat landscapes.
  • Ability to communicate technical security concepts clearly to both technical and non-technical audiences.
  • Strong written communication and documentation skills.
  • Ability to work independently while collaborating effectively across teams.
  • Demonstrated ability to prioritize tasks, manage competing demands, and remain effective in time-sensitive or incident-driven situations.

Responsibilities

  • Monitors and analyzes security alerts and logs from enterprise platforms, including SIEM and network security tools, to identify potential threats and suspicious activity.
  • Assists with incident response activities by investigating alerts, gathering evidence, and supporting containment and remediation efforts.
  • Supports the operation and tuning of security monitoring tools to improve detection accuracy and visibility.
  • Assists with vulnerability identification and remediation coordination across systems and network devices.
  • Supports secure network operations by assisting with configuration review, monitoring, and troubleshooting of network and security devices.
  • Assists with administration and policy support for Cisco security platforms, including Catalyst Center, Secure FMC, ISE, and related tools.
  • Supports network segmentation, access control, and secure connectivity initiatives.
  • Provides tier 2 support for security- and network-related incidents and escalations.
  • Performs routine maintenance, updates, and configuration changes for security platforms under guidance and established change management procedures.
  • Analyzes system, network, and security logs to identify misuse, anomalies, or policy violations.
  • Documents configurations, incidents, procedures, and operational changes in accordance with OIT standards.
  • Participates in security risk management, audits, and compliance activities by assisting with evidence collection and control validation.
  • Maintains awareness of emerging threats, vulnerabilities, and security best practices through training, research, and hands-on experience.
  • Demonstrates initiative in developing cybersecurity skills and contributing to continuous improvement of security operations.
  • Works closely with Enterprise Security, Network Services, and other OIT teams to support secure system operations.
  • Communicates security findings, incidents, and recommendations clearly and professionally.
  • Participates in team meetings, project discussions, and ongoing professional development.
  • Effectively plans and prioritizes daily tasks, security monitoring activities, and assigned projects to meet operational and security objectives.
  • Manages multiple concurrent tasks, incidents, and assignments while maintaining attention to detail and adherence to established procedures.
  • Works with leadership and team members to estimate effort, meet deadlines, and align work with departmental priorities.
  • Maintains accurate documentation, tickets, and records to support continuity of operations and knowledge sharing.
  • Works with OIT Management and teams to establish appropriate project timelines to deliver sustainable solutions within approved time and budget parameters.
  • Independently manages assigned tasks and project components.
  • Demonstrates attention to detail in all phases of the system lifecycle and application management.
  • Analyzes security alerts, incidents, and operational issues to identify root causes and contributing factors.
  • Applies critical thinking and technical knowledge to develop effective, practical solutions to cybersecurity and network challenges.
  • Collaborates with OIT teams and vendors to troubleshoot issues, validate fixes, and prevent recurrence.
  • Demonstrates initiative in identifying opportunities to improve security monitoring, processes, and controls.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service