IT Security Analyst

Allan MyersWorcester, PA
Onsite

About The Position

The IT Security Analyst is a hands-on technical professional responsible for monitoring, detecting and responding to security threats, conducting vulnerability assessments, and ensuring compliance with security policies. The Security Analyst is involved in data gathering, security testing, threat mitigation and remediation, along with user training while maintaining a strong understanding of the technology, the systems and the business processes it supports.

Requirements

  • Bachelor’s degree in Information Technology, Computer Science, Engineering, Cybersecurity, or a related field.
  • 4-6 years of IT experience, with a focus on systems analysis, support, and application implementation.
  • Familiarity with security tools and technologies such as firewalls, EDR and XDR solutions and network protection solutions
  • Proficiency with incident management systems, reporting metrics, SaaS solutions, and operating system platforms.
  • Knowledge of server and client architecture, network technologies, and enterprise backup and recovery processes.
  • Scripting and automation expertise to support system administration and audits.
  • Strong written and verbal communication skills, with the ability to collaborate across teams.
  • Effective stakeholder engagement to bridge technical and business objectives.
  • Demonstrated ability to lead initiatives, manage change, and solve complex technical problems.
  • Strong analytical skills with attention to detail and urgency in resolving issues.
  • Adaptable, ethical, and results-oriented with strong time management skills.

Nice To Haves

  • Relevant certifications (e.g., CompTIA Security+, GIAC, CISSP) are preferred.
  • Basic knowledge of scripting languages such as KQl or PowerShell
  • Familiarity with SIEM (Security Information and Event Management) systems

Responsibilities

  • Alert triage, mitigation and management
  • Triage, mitigate and remediate alerts in various dashboards and alerting engines
  • Communicate and/or escalate events that have a major impact on the organization's security structure, compliance or assets
  • Collect and correlated security and system event data and logs to identify abnormal behaviors or threats
  • Assist in the data gathering and Analysis of existing systems, process and procedures and identify opportunities for improvement in alignment with organizational goals.
  • Monitor various vulnerabilities feeds and determine vulnerabilities that impact our systems, processes or assets
  • Monitor vulnerability management platforms and services to identify current and known vulnerabilities and ensure effective mitigation or remediation in accordance with our defined approach and policy
  • Identify trends or issues in mitigation or remediation measure and communicate to appropriate stakeholders
  • Provide direct support to end-users, addressing escalated technical issues and promoting best practices.
  • Design and deliver technical training sessions to enhance user competency and adoption of IT solutions and security practices.
  • Conduct training activities and attack simulations to enhance the end user exposure and knowledge regarding threats
  • Research and recommend technology changes to meet evolving business needs.
  • Assist in the planning and execution of new technology implementations, including process mapping, enterprise architecture, testing, and deployment.
  • Maintain clear and detailed documentation of systems, processes, and technical configurations.
  • Implement and audit system security practices to ensure compliance with organizational policies and best practices.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service