Woods Hole Oceanographic Institution-posted 1 day ago
$71,000 - $91,800/Yr
Full-time • Mid Level
Woods Hole, MA

The Desktop Support & Security Analyst is a member of both the End User Technology Systems and Security teams within the Information Services department. This position uses advanced information technology knowledge and skills to provide advanced, independent technical support while actively assisting in the management of the Institution's core cyber security and access management platforms. This customer-facing role splits time equally (50%) between the End User Technology team, providing support, mentorship, and driving efficiency for the computing environment, and the Information Security team, focusing on authentication, network perimeter defense, and compliance with security standards (e.g., DoD). The Analyst ensures optimal end-user support, functionality, and robust security posture through a combined understanding of both desktop systems and network security principles. This role's duties are strategically split between End-User Support and Security Operations. Part 1: End-User Technology & Support (Approx. 50%) Advanced Support & Deployment: Independently configure, deploy, maintain, troubleshoot, and support computer workstations, laptops, mobile devices, and A/V equipment across Windows, Apple, and Linux operating systems. Complex System Support: Provide high-level technical support for computer-controlled scientific instrumentation and a variety of devices in the BYOD environment. Mentorship & Improvement: Provide guidance and mentorship to other End User staff. Identify trends in issue reporting, develop long-term solutions, and seek opportunities for continuous improvement and automation of End User Technology processes. Training & Documentation: Develop curriculums, organize classes, and create videos to educate end-users and IS staff on new and implemented technologies. Document procedures, standards, and configurations. Incident Resolution: Prioritize work according to business need. Make field visits and take ownership of complex IS-related incidents to restore service quickly. Part 2: Information Security & Operations (Approx. 50%) Identity & Access Management (IAM): Assist in the management of the Institution's authentication and IAM systems and processes (Cloud/2FA/AD/LDAP), working with IS staff to ensure compliance with best practices. Security Perimeter & Monitoring: Assist in the maintenance and operation of the Institution’s network security perimeters (firewalls, intrusion detection systems, analytics). Assist in the administration of the central logging and SIEM platforms. Incident & Remediation: Diagnose and remediate information security issues on systems, including problems arising from viruses, malware, and improper system configuration. Policy & Compliance: Work with IS Security staff to satisfy DoD security requirements across both restricted and general environments. Assist in developing and recommending policies and guidelines for secure computing. NON-ESSENTIAL FUNCTIONS: As deemed necessary by supervisor

  • Independently configure, deploy, maintain, troubleshoot, and support computer workstations, laptops, mobile devices, and A/V equipment across Windows, Apple, and Linux operating systems.
  • Provide high-level technical support for computer-controlled scientific instrumentation and a variety of devices in the BYOD environment.
  • Provide guidance and mentorship to other End User staff.
  • Identify trends in issue reporting, develop long-term solutions, and seek opportunities for continuous improvement and automation of End User Technology processes.
  • Develop curriculums, organize classes, and create videos to educate end-users and IS staff on new and implemented technologies.
  • Document procedures, standards, and configurations.
  • Prioritize work according to business need.
  • Make field visits and take ownership of complex IS-related incidents to restore service quickly.
  • Assist in the management of the Institution's authentication and IAM systems and processes (Cloud/2FA/AD/LDAP), working with IS staff to ensure compliance with best practices.
  • Assist in the maintenance and operation of the Institution’s network security perimeters (firewalls, intrusion detection systems, analytics).
  • Assist in the administration of the central logging and SIEM platforms.
  • Diagnose and remediate information security issues on systems, including problems arising from viruses, malware, and improper system configuration.
  • Work with IS Security staff to satisfy DoD security requirements across both restricted and general environments.
  • Assist in developing and recommending policies and guidelines for secure computing.
  • Bachelor’s degree in related field, or at least five (5) years of related experience demonstrating clear progression of skills, particularly in an area of expertise.
  • Demonstrated ability to perform the essential functions of the position.
  • Strong experience diagnosing and resolving complex technical and security issues on Windows, MacOS, and Linux operating systems.
  • Solid understanding of local and Internet networks, client/server environments, basic cybersecurity procedures, and fundamental principles of Identity & Access Management.
  • Familiar with IT network infrastructure components and the various related technologies, such as switches, routers, TCP/IP, DNS, (DHCP/Static IP), wireless
  • Proficient with mobile platforms technologies such as iPhone, iPad, Android, Surface.
  • Ability to obtain a DoD security clearance at level Secret or above.
  • Strong ability to communicate effectively with both technical and non-technical personnel about computer and security matters.
  • Must demonstrate a high degree of skill and tact in the areas of teamwork and interpersonal relationships, including highly effective oral, written, and listening communication skills.
  • Relevant technical certifications.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service