Under the direction of the Director of Information Security, the Security Analyst I will monitor our computer networks for security issues, install security software and document any security issues or breaches you find. Accountable for protecting IT infrastructure, edge devices, networks to prevent data breaches by monitoring and reacting to attacks. Assist with building communication and collaboration around IT security. Helps with solutions to problems that may arise in an expeditious, efficient, and timely manner. Effectively collaborates across technology teams and business units through excellent communication skills, diplomacy, and a positive attitude. Responsible for 24x7 support of all Information Security systems and support. Responsible for performing job duties in accordance with the mission, vision and values of the University of Central Oklahoma. Hybrid/Remote option available. Must complete on-site orientation up to 30 days as determined by position. Responsible for activities involving the planning, development, administration, management, and support of university information security operations. Understands the business strategy of enterprise-wide business and IT management, security, infrastructure and operations, disaster recovery, incident response, and works with teams to define security requirements. Communicates and coordinates with other team leads, business leadership, and project managers to ensure appropriate integration of processes and modules across the enterprise. Manages UCOs information security systems so that they function reliably, meeting the organizations business needs, and use the organizations IT resources effectively. Responsible for implementation, monitoring and identifying security vulnerabilities/intrusion detection. Participates in security audits, vulnerability and threat assessments. Investigate security breaches and proactively search available security systems for indications of compromise. Collect initial forensic data from suspected security incidents for triage and deeper investigation. Maintain and operate security software to protect systems and information infrastructure. Document security breaches and assess the damage they cause. Work with security team to perform tests and uncover network vulnerabilities. Fix detected vulnerabilities to maintain a high-security standard. Stay current on IT security trends and news. Develop and maintain organization-wide best practices for IT security. Creates and maintains documentation including diagrams, operational and support procedures. Conducts on-demand and scheduled vulnerability assessments and penetration testing. Interacts with end users, service desk, team members and stakeholders in gathering information to define and document required changes to the environment. Assists IT management in preparing business and use cases. Performs other duties as assigned.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Entry Level