Security Analyst II - IS Info Security

Kettering HealthMiamisburg, OH
2d

About The Position

Job Details Support Services|Miamisburg|Full Time|Days Responsibilities & Requirements Job Requirements: Associate degree (or above) in computer science, information systems, or related field, or equivalent combination of education, certification, and experience Bachelor’s Degree preferred 3 or more years of relevant experience in Information Security Obtain applicable certifications within 1 year of hire, when required. ISC2 SSCP or HCISPP or equivalent ITIL Certification as needed Job Responsibilities: Participate in on-call rotations to provide off-hours application support Develop and maintain security documentation. Educate end-users and team members as needed. Understanding common cybersecurity solutions like antivirus, anti-malware, firewalls, proxies, SIEM, and so on Identify and mitigate information security vulnerabilities Identify self-training opportunities and/or conferences that align with yearly goals Monitor networks and devices for security issues Investigate any cybersecurity incidents, assess the damage they cause and document them Install security measures and infrastructure Stay up to date to current IT security trends and news Develop organization-wide cybersecurity best practices and protocols

Requirements

  • Associate degree (or above) in computer science, information systems, or related field, or equivalent combination of education, certification, and experience
  • 3 or more years of relevant experience in Information Security
  • Obtain applicable certifications within 1 year of hire, when required.
  • ISC2 SSCP or HCISPP or equivalent
  • ITIL Certification as needed

Nice To Haves

  • Bachelor’s Degree preferred

Responsibilities

  • Participate in on-call rotations to provide off-hours application support
  • Develop and maintain security documentation.
  • Educate end-users and team members as needed.
  • Understanding common cybersecurity solutions like antivirus, anti-malware, firewalls, proxies, SIEM, and so on
  • Identify and mitigate information security vulnerabilities
  • Identify self-training opportunities and/or conferences that align with yearly goals
  • Monitor networks and devices for security issues
  • Investigate any cybersecurity incidents, assess the damage they cause and document them
  • Install security measures and infrastructure
  • Stay up to date to current IT security trends and news
  • Develop organization-wide cybersecurity best practices and protocols
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service