IT Security Analyst (Hybrid)

San Ysidro HealthSan Diego, CA
Hybrid

About The Position

The IT Security Analyst will support the development and deployment of information technology solutions by evaluating the security components of proposed infrastructure architectures with a focus on both on-premises and cloud environments. This position will assist in determining security requirements, design specifications, and compliance controls as well as validating adherence to security policies, standards, and industry-accepted best practices. This role requires a deep level of technical expertise in security engineering, networking, and infrastructure engineering. Additionally, this role will assist in the administration of the Information Security Team’s on-premise and cloud accounts as well as support the automation and innovation needs of the team’s tools and projects and will use their coding and scripting expertise to improve, streamline and automate security processes.

Requirements

  • B.S. in Computer Science, B.S. in Information Systems, Computer Science or related field; Lesser education with equivalent experience is commensurate
  • 3 to 5 years working with Service Desk assisting with Cybersecurity, Engineering, and break fix; OR 1 to 2 years’ experience working directly within Cybersecurity
  • Understanding of enterprise information security and associated technologies
  • Strong experience with SIEM, XDR, EDR, and threat hunting protocols
  • Hands-on experience with operating or maintaining cybersecurity tools
  • Fundamental understanding of risk and vulnerability management
  • Data gathering, analysis, problem-solving, and decision-making skills
  • Certified Information Systems Security Professional (CISSP)
  • Excellent oral and written communication skills, with focus in technical or instruction-oriented writing and in clearly communicating complicated concepts over the phone, in person and in writing
  • Ability to convey ideas and information to others and receive feedback effectively
  • Ability to communicate and interact successfully with a diverse community and develop and maintain positive professional relationships with colleagues and staff members
  • Experience with auditing and monitoring tools including SIEM administration
  • Experience with IDS/IPS and DLP solutions
  • Application Firewall administration
  • Internet access security and content filtering
  • Knowledge of Email encryption systems
  • Vulnerability management system administration
  • HIDS/HIPS protection suites
  • Experience utilizing tools to validate the extent of known attacks
  • Experience working with networking technologies hardwire and wireless networks and protocols
  • Multi-Factor Authentication, VPN and remote access methodology
  • Experience handling, organizing, tracking, and reporting on user support incidents
  • Experience working with Active Directory, DHCP, DNS, and Group Policy
  • Understanding of Change Control Processes and Controls
  • Standard Office equipment, PC, laptop
  • Standard office working conditions sitting or standing
  • Ability to assist moving equipment up to 50lbs.
  • Pre-employment requirements include I-9, physical, positive background and reference check results, complete application, new hire orientation, pre-employment PPDs. Compliance with all mandated vaccinations and all boosters is a term and condition of employment.

Nice To Haves

  • One or more of the following certifications: CISM, CISA, CRISC, CEH, SEC+, CySa or GIAC equivalent

Responsibilities

  • Develop, maintain, and oversee the education and security awareness outreach program for the corporation
  • Identify incident patterns, determine proactive solutions, and communicate areas of enhancement to management
  • Complete incident investigations and security reviews
  • Work closely with other department with IT on corporate technology development to fully secure data, systems, and networks
  • Remain informed on trends and issues in the security industry, including current and emerging technologies and policies
  • Where necessary, provide Tier 3 support to help troubleshoot complex issues and architect new solutions
  • Lead efforts monitor and audit systems, processes, and other controls in order to assess security and risk posture
  • Ensure the completion of operational activities associated to network monitoring and intrusion detection analysis to determine if there have been any attacks on the system; Work with the applicable parties to test mitigation plans
  • Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information systems (IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software, and Business Continuity and Disaster Recovery preparedness, training, and testing
  • Ensures that IT and cyber security architecture/designs, plans, controls, processes, standards, policies, and procedures are aligned with IT standards and overall IT and cyber security; Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security; Facilitate the design and execution of vulnerability assessments, penetration tests
  • Work with external auditors during audits; Prepare documentation, files and information for audits; Work with auditors and internal team on outstanding tasks and findings identified during the audits
  • Work with other members of the IT Department to implement resolutions identified in risk assessments, penetration/vulnerability testing and audits
  • Articulates security policies, guidelines and standards to customers and developers; Able to apply theories, concepts, principles, and methodologies to difficult but conventional assignments
  • Working collaboratively as part of a team, aid in the creation of user accounts and assign and maintain appropriate roles and responsibilities using the principle of least privilege; Enhance techniques and procedures for the onboarding and offboarding of employees to ensure onboarded employees are granted access and offboarded employees’ access and accounts are appropriately removed
  • Conduct Account provisioning and deprovisioning for new hires, moves, changes, and terminations; Conduct periodic User Access Reviews to ensure existing access of user accounts follow least-based-access and Role Based Access models; Stay current on identity and access management techniques and tools and as well as threats and contribute to periodic security briefings and updates
  • Working closely with the Information Technology and Information Security teams, recommend necessary policies associated with HIPAA-HITECH and PCI DSS, NIST, CIS, requirements
  • Stay up to date on the latest intelligence and methodologies related to information security in order to identify threats and manage risks; Updates job knowledge and awareness of IT Security developments by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations; attending IT Security conferences; communicate the latest intelligence to key staff to minimize or prevent impact to SY Health
  • Exemplifies and promotes the department’s four key success factors: Positivity, Ownership, Efficiency and Transparency, when working with both internal and external customers
  • Performs other duties as assigned

Benefits

  • San Ysidro Health has a long-standing commitment to equal employment opportunity for all applicants for employment. Employment decisions including, but not limited to, those such as employee selection, performance evaluation, administration of benefits, working conditions, employee programs, transfers, position changes, training, disciplinary action, compensation, and separations are made without regard to race, color, religion (including religious dress and grooming), creed, national origin, nationality, citizenship status, domestic partnership status, ancestry, gender, affectional or sexual orientation, gender identity or expression, marital status, civil union status, family status, age, mental or physical disability (including AIDS or HIV-related status), atypical heredity cellular or blood trait of an individual, genetic information or refusal to submit to a genetic test or make available the results of a genetic test, military status, veteran status, or any other characteristic protected by applicable federal, state, or local laws.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service