IT Security Analyst

Standard TextileCincinnati, OH

About The Position

At Standard Textile, we’re dedicated to providing comfort and care across generations. Guided by our values, we focus on solutions that serve our customers, support our associates, and strengthen our communities. Since 1940, we’ve remained committed to creating better textiles—delivered seamlessly by experts who care. The IT Security Analyst is responsible for defending our manufacturing environment against cyber threats. Core duties include monitoring and triaging security alerts across endpoint, network, identity, and cloud telemetry; investigating and responding to incidents; hardening systems and infrastructure; managing vulnerabilities; and supporting security tooling such as XDR, EDR, email security, and firewalls. This role reports to and works directly with our IT Security Lead, who will mentor the IT Security Analyst on our tooling, playbooks, and environment. You will work firsthand with AI agents and automation built into our security operations. The ideal candidate has a foundation in security operations, strong fundamentals, and an interest in growing into broader IT cybersecurity work.

Requirements

  • Bachelor’s degree in Cybersecurity, Information System Analytics, Computer Science, or a closely related discipline.
  • 1–3 years of experience in a SOC, IT security, or closely related IT role (internships and co-ops count).
  • Firsthand exposure to incident response, networking, or system administration.
  • Solid fundamentals in cybersecurity, common attacker tradecraft (e.g., MITRE ATT&CK), networking, and Windows/Linux/Active Directory administration.

Nice To Haves

  • Firsthand exposure to a SIEM, XDR, or EDR platform is a plus.
  • Relevant certifications such as CompTIA Security+, CySA+, Network+, Microsoft SC-200, Cisco CyberOps Associate, Blue Team Level 1 (BTL1), or GIAC GSEC/GCIH are preferred.

Responsibilities

  • Monitor XDR, EDR, and other security tooling to detect, triage, and investigate suspicious activity across endpoints, network, identity, and cloud environments.
  • Use AI agents and automated workflows to accelerate alert triage, enrichment, and initial investigation.
  • Assist in incident response activities (containment, eradication, recovery, and post-incident review) and maintain the playbooks and runbooks that support them.
  • Participate in threat hunting using known TTPs and threat intelligence and help tune detection logic to reduce false positives.
  • Run the vulnerability management lifecycle (scanning, prioritization, coordination of remediation, and verification).
  • Support identity and access controls (privileged access, conditional access, account reviews).
  • Assist with hardening endpoints, servers, Active Directory, and cloud workloads against common attack techniques (e.g., MITRE ATT&CK).
  • Partner with IT infrastructure, application, and operations teams to embed security into systems, projects, and day-to-day operations.
  • Partner with Security Lead to identify high-leverage automation opportunities and help build, evaluate, and tune agentic workflows for the SOC.
  • Communicate security risks, incidents, and mitigation strategies clearly to technical teams, senior management, and, when needed, external partners or incident response retainers.

Benefits

  • US Best Managed Company for the fifth year running
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service