Match score not available

Information Security Analyst II

Remote: 
Full Remote
Contract: 
Salary: 
83 - 133K yearly
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

5 years experience in information technology, 2 years in a security operations center or cybersecurity incident response team, Bachelor's degree in IT, cybersecurity or related field, Relevant certifications like CISSP, Security+, or Microsoft Azure, Experience with SIEM, EDR tools, and network/security logs.

Key responsabilities:

  • Monitor enterprise technology ecosystem for security events
  • Conduct real-time monitoring and analysis of security incidents
  • Coordinate incident response as per SNHU's plan
  • Develop automation scripts to enhance security operations
  • Provide coaching and support to junior analysts
Southern New Hampshire University logo
Southern New Hampshire University Education Large https://www.snhu.edu/
9311 - 9311 Employees
See more Southern New Hampshire University offers

Job description

Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide.

Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you.

Make an impact — from near or far

At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.

We ask that our remote employees have access to a reliable internet connection and a dedicated, properly equipped workspace that is free of distractions. Employees must reside in, and work from, one of the above approved states.

The opportunity

The Information Security Analyst II is a senior member of the Security Operations Center (SOC) team and monitors a large enterprise technology ecosystem, detecting, analyzing, and investigating information security events within that ecosystem, and responding to information security incidents to ensure the protection of SNHU's mission-critical technology resources and institutional information. You will report directly to the Deputy Chief Information Security Officer. This role can be 100% remote aligning to our outlined approved states. #LI-Remote.

What you'll do:

  • You will understand the basic incident response lifecycle and the needed activities when it comes to assessment and investigations.
  • You will be the initial triage point for all security-related tickets that come into the team's multiple queues (including evaluation, containment, and remediation).
  • You will collect and analyze log data from complex, virtualized, multi-site computing environments and SNHU's technology ecosystem.
  • You will conduct real-time monitoring of security events from multiple sources and use analytical data to identify, triage, analyze, investigate, and escalate information security events and alerts.
  • You will coordinate information security incident response in alignment with SNHU's Information Security Incident Response Plan.
  • You will analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
  • You will perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
  • You will perform investigation and escalation for complex or high-severity security threats or incidents.
  • You will excel at documentation and detailed notetaking, including SOP writing, incident reporting, e-mail and instant messaging, and most importantly, documenting incident actions.
  • You will communicate with partners in a non-technical manner at all organizational levels as part of incident response and remediation activities.
  • You will design and implement or monitor information security incident remediation plans.
  • You will design, deploy, and manage detections and alerts for specific or common threat conditions.
  • You will design and implement standard operational processes for handling common incident types.
  • You will develop automation scripts and other tools to enhance security operations efficiency.
  • You are familiar with enterprise security tools like Splunk, Tenable, Proofpoint tools, Microsoft Defender components, Office 365 tools, PowerShell, and multiple network tools.
  • You will design, configure, deploy, and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
  • You remain up to date on the latest threat intelligence.
  • You will develop strategies and solutions that improve or mitigate the risks associated with these threats.
  • You will work across ITS and all SNHU departments to provide support and technical implementations, including investigation, containment, and eradication when applicable.
  • Provide customer support according to SNHU's Core Values and understand how and when to escalate potential issues.
  • You will help with risk management, vulnerability management, security assessment, auditing, and security authorization programs, as directed by the university's Information Security Management team.
  • You show a deep source of ethics, integrity, and confidentiality.
  • You can remain calm and function at the highest level during a crisis.
  • You will provide coaching/mentoring to junior analysts.

We would like to see:

  • Five years' experience in information technology.
  • Two years working in a security operations center (SOC), a cybersecurity operations center or on a cybersecurity incident response team.
  • Academic Degree: Bachelor's degree in information technology, cybersecurity, data analytics, information assurance, computer science, or related field.
  • Professional Certification(s): ISC2 CISSP Certification, Microsoft Azure, Cisco, CompTIA, Security+, GSEC, or other relevant industry certification.
  • Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, Windows/Linux operating system logs, network scanners, log aggregation tools, Endpoint Detection and Response (EDR) tools, and other platforms in the environment that enable enterprise-wide security monitoring.

 

We believe real innovation comes from inclusion - where different experiences, perspectives and talents are celebrated. So if you're wondering whether SNHU is right for you, take the leap and apply. You might be just the person we're looking for.

Compensation

The annual pay range for this position is $83,071.00 - $132,940.00. Actual offer will be based on skills, qualifications, experience and internal equity, in addition to relevant business considerations. We expect this position to be hired in the following target hiring range $91,794.00 - $124,192.00.

Exceptional benefits (because you’re exceptional)

You’re the whole package. Your benefits should be, too. As a full-time employee at SNHU, you’ll get:

  • High-quality, low-deductible medical insurance

  • Low to no-cost dental and vision plans

  • 5 weeks of paid time off (plus almost a dozen paid holidays)

  • Employer-funded retirement

  • Free tuition program

  • Parental leave

  • Mental health and wellbeing resources

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Education
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Communication
  • Mentorship
  • Problem Solving
  • Analytical Thinking
  • Coaching
  • Detail Oriented

Information Security Analyst Related jobs