Information Security Analyst 3 (5-yr fixed-term)

The Church of Jesus Christ of Latter-day SaintsRiverton, UT
Onsite

About The Position

This is a 5-yr fixed-term position for an Information Security Analyst 3, an experienced professional role. The incumbent will work on diverse problems involving IT portfolios and other internal departments to investigate information security incidents. This role also functions as a “shift watch officer” to ensure monitoring and escalated tasks are completed by junior analysts. It is an individual contributor role, responsible for planning and executing security tasks in coordination with information security, legal, audit, physical security, and other functions. While coordination with information security operations and incident response teams is required, this position is not focused on 24/7 cyber alerting, investigation, and response. The role supports technology that furthers the mission of the Church. The company encourages early, mid, and late-career candidates with the posted skills and abilities to apply.

Requirements

  • Bachelor’s degree in related field or equivalent professional experience
  • Four years of experience in Information Security, IT and/or Computer Science, including expertise in one or more of the following areas: Attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics and malware analysis
  • Ability to work effectively in a 24/7 environment
  • Ability to recognize patterns of known security compromise from log information and identify new exploits when they present themselves
  • Ability to mentor and train junior analysts
  • Demonstrated experience with Windows and Linux operating systems, command line interfaces, and associated security concerns
  • Demonstrated experience using a SIEM or data aggregation tool to analyze data sets and identify trends, anomalies, and actionable intelligence
  • Demonstrated experience with Continuous Monitoring operations in an enterprise environment
  • Working knowledge of: Networking protocols and technologies
  • Working knowledge of: Current information security practices, trends, and technologies
  • Working knowledge of: Information security tools, technologies, threats, and practices
  • Working knowledge of: IT organization patterns
  • Working knowledge of: Familiarity with programming and scripting
  • Understand how system storage and memory forensics are used in incident response
  • Understand how cyber threat intelligence relates to incident response
  • Strong professional written and oral communication skills
  • Detail-oriented with the proven ability to follow instructions
  • Works well with others, especially those in complementary roles

Nice To Haves

  • Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc.

Responsibilities

  • Conduct complex investigative assignments demonstrating judgement in selecting methods and techniques to obtain creative solutions
  • Analyze system-generated indicators to identify patterns that would alert potential security incidents or threats
  • Identify, clarify, investigate and (where appropriate) escalate circumstances of concern to incident managers
  • Evaluate escalated events of concern identified by junior analysts to determine scope of impact, severity and appropriate next steps
  • Oversee the work of junior analysts on shift in a 24/7 operations center to minimize intrusions and expedite threat mitigation
  • Mentor, train and assist Analyst 1s and 2s
  • Conduct additional discovery and forensic investigations under the direction of incident managers
  • Carry out assigned investigation analysis of technology audit recommendations
  • Monitor and report on audit remediation efforts
  • Provide regular updates to manager on project/account status
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service