www.indeed.com
Open in
urlscan Pro
162.159.129.67
Public Scan
Submitted URL: https://protect-us.mimecast.com/s/LC_JCM8Vy8HzqmWmiw2Wir?domain=indeed.com
Effective URL: https://www.indeed.com/viewjob?jk=daa698abd078218d&q=information+security+analyst&l=Remote&tk=1grgelon2k852800&from=ja&...
Submission: On March 15 via manual from US — Scanned from US
Effective URL: https://www.indeed.com/viewjob?jk=daa698abd078218d&q=information+security+analyst&l=Remote&tk=1grgelon2k852800&from=ja&...
Submission: On March 15 via manual from US — Scanned from US
Form analysis
1 forms found in the DOMGET /jobs
<form action="/jobs" method="get" class="css-z48huh e37uo190"><span class=" css-1eabxeo e6fjgti1"><label id="text-input-what-label" for="text-input-what" aria-hidden="true" class=" css-1klc2s7 eu4oa1w0">What</label><input type="text"
aria-invalid="false" id="text-input-what" aria-label="what: job title, keywords, or company" name="q" autocomplete="off" placeholder="Job title, keywords, or company" value="" class="css-5g9zp6 e1jgz0i3"></span><span
class=" css-kf1vfa e6fjgti1"><label id="text-input-where-label" for="text-input-where" aria-hidden="true" class=" css-1klc2s7 eu4oa1w0">Where</label><input type="text" aria-invalid="false" id="text-input-where"
aria-label="where: city, state, or zip code" name="l" autocomplete="off" placeholder="City, state, zip code, or "remote"" value="New York State" class="css-5g9zp6 e1jgz0i3"></span><button type="submit"
class="css-12srjm3 e8ju0x51">Find Jobs</button></form>
Text Content
Skip to main content Discover jobs Company reviews Find salaries Upload your resume Sign in Sign in Employers / Post Job Discover jobs Company reviews Find salaries Employers Create your resume Change country 🇺🇸 United States Help Center Start of main content WhatWhereFind Jobs SENIOR IT SECURITY ANALYST Western Governors University 419 reviews Remote Remote Full-time WESTERN GOVERNORS UNIVERSITY 419 reviews Read what people are saying about working here. You must create an Indeed account before continuing to the company website to apply Apply now Apply on company site save-icon Copy link Copied Senior IT Security Analyst Western Governors University - Remote Job Company JOB DETAILS Job Type Full-time BENEFITS PULLED FROM THE FULL JOB DESCRIPTION Health insurance Health savings account Paid parental leave Paid time off Parental leave Vision insurance INDEED'S SALARY GUIDE * Not provided by employer * $78.5K - $99.4K a year is Indeed's estimated salary for this role in Remote. Report inaccurate salary FULL JOB DESCRIPTION If you’re passionate about building a better future for individuals, communities, and our country—and you’re committed to working hard to play your part in building that future—consider WGU as the next step in your career. Driven by a mission to expand access to higher education through online, competency-based degree programs, WGU is also committed to being a great place to work for a diverse workforce of student-focused professionals. The university has pioneered a new way to learn in the 21st century, one that has received praise from academic, industry, government, and media leaders. Whatever your role, working for WGU gives you a part to play in helping students graduate, creating a better tomorrow for themselves and their families. As a Senior IT Security Analyst you will work closely with the infrastructure team to act as a liaison between Security and Infrastructure teams. Essential Functions and Responsibilities: * Functions as a senior lead IT Security Analyst in one or more of the following: penetration testing, incident handling/digital forensics, continuous monitoring, intrusion detection/prevention), auditing, risk analysis, compliance, security awareness, threat hunting, vendor risk analysis and identity and access efforts. * Functions in abstract, conceptual, and architectural work as in granular technical implementation and configuration work. * Supports the creation of tools, processes, and communications that support information security initiatives. Participates in the development of security policies, standards, and procedures. * Develops and maintains a risk mitigation strategy for the organization that includes a determination of inherent risk, residual risk, and risk tolerance. * Develops and applies policies, standards, and procedures. * Analyzes phishing emails utilizing industry standard tools. * Monitors Endpoint Security utilizing tools such as DLP, HIPS, Client Proxy, EPP, IPS/IDS and local firewalls to establish a baseline and identify anomalous behavior. Understands data encryption strategies. Strives for optimal policy of balance in security and performance. * Participates in tactical projects as they arise to clarify and responds to identified security risks across different technical domains. Assists in project testing and technical documentation. * Executes established security practices with consistency and discipline. Monitors alerts for security incidents and escalate, as needed. Process large quantities of data based on significance. * Collaborates with engineers to support standardized practices and follow routine processes to promote secure systems. Recommends new tools for penetration testing, assessment, and secure product validation. * Identifies and creates process improvements. * Processes service request tickets efficiently and reliably. * Participates in Correction of Errors (CoE), often with members of other teams. * Participates with incident response activities. * Participates in risk assessment activities. * Monitors and tests fixes and patches to ensure vulnerabilities have been appropriately mitigated. * Continuously monitors tools for events that could lead to an incident and work with business partners to ensure data protection and remediation. * Understands the implications of privacy laws and regulations (i.e. GDPR and CCPA). * Responsible for tuning and filtering of events and information, creating custom views and content using available tools following approved methodology. * Facilitates an effective response to vendor risk assessments using industry-standard methods (i.e. SIG, HECVAT, VSAQ, or CIS, SANS Top 20) as well as business requests for information (ROIs) * Consults with various areas of the business as an information security subject matter expert * Leads correlation efforts with data from IPS/IDS with data from other sources. * Mitigates misuse, malware, or unauthorized activity on monitored networks. * Performs activities needed to demonstrate regulatory compliance. * Administers security information and event management including devices, watch list, alerting, threat feeds, and problem resolution. * Administers a SIEM, including devices, watch list, alerting, threat feeds, and problem resolution. * Researches emerging security technologies, tactics, trends, and exploits. Prepares reports and presentations periodically for management and developers. * Participates in ongoing status meetings to update Information Security members of initiatives and ongoing projects. * Maintains user security by evaluating security standards and access controls. * Manages security test lab including daily activities, documentation, maintenance, component installation/configuration, and facility evolution. * Provide policy and technical advice to internal stakeholders to ensure new initiatives conform to current corporate security architecture. * Applies design theories and principles in researching, designing, and developing, while maintaining security architectures of the company. * Contributes to security operations and technology projects that have tactical and operational impact to all business segments of WGU. * Supports the creation and maintenance of an effective security architecture for the corporation that maps to business requirements. * Collaborates with IT leadership and other business leaders to provide integrated security planning and recommendations for innovative technologies that will enhance the current security posture of the organization system protection. * Manages subscriptions to vendors’ security/vulnerability alerts and assess vendor alerts by establishing a response plan based on the platform, severity, and applicability of the threat. * Reviews and maintains inventory and documentation for “golden images” for all operating systems from security and baseline configuration perspective * Performs other related duties as assigned. Knowledge, Skill and Abilities: * Maintains knowledge of NIST, ISO, and PCI-DSS standards as well as FERPA, GLBA, GDPR, HIPAA, FTC regulations. Contributes to developing assessment plans building on the methodologies promoted by these standards and regulations to quantify risk. * Maintains proficiency with computing technologies (Windows Server, Linux, databases, TCP/IP network stack, scripting languages, etc.) * Working knowledge of intrusion detection methodologies and techniques for detecting intrusions via intrusion detection technologies. * Ability to use network management tools to analyze network traffic patterns. * Ability to tune sensors, read, and interpret signatures. * Ability to create alerts and automated responses. * Ability to generate and articulate performance metrics. * Ability to identify and communicate the risk of vulnerabilities. * Ability to identify internal and external trends to identify risks. * Ability to articulate risk to management. * Execute established security practices with consistency and discipline * Results oriented, self-motivated, and self-directed. * Familiarity with network architectures, network services & devices, system types, development platforms, and software suites (Microsoft, Cisco, Oracle, Linux, etc.) * Technical skills in patch and vulnerability assessment, analytical theory, networking, operating systems, incident response methodology and ability to compose management level summaries as needed. * Understanding and working knowledge of security forensics. * Works well with others, maintaining a positive work environment by communicating in a manner to promote positive relations with customers, co-workers, and management. * Effective communication skills with the ability to communicate with purpose, clarity, and accuracy. * Excellent analytical, problem solving, and decision-making skills required. Identifies and resolves problems in a timely manner with a solution driven approach to problems. * Demonstrated pragmatic, adaptable, and result-driven approach to information security risk management. * Methodical, data-driven approach to security and risk analysis; ability to think imaginatively in order to implement security improvements Job Qualifications: Minimum Qualifications: * Bachelor’s Degree in related field or equivalent * 5 years of Information Security experience * Experience with security industry standards and best practices. Proven experience with interpretation and implementation of those standards in a corporate environment. * Experience with open-source security tools (i.e. Kali, Nessus, Fortify, AppScan, Nexpose, SAINT, Burp, NMap, Metasploit, Meterpreter, Wireshark, Kismet, Aircrack-ng, Eramba, etc) Preferred Qualifications: * Relevant security certifications– (CISSP, GIAC, ISACA, CEH, etc.) Certifications. * Experience recommending additional security requirements and safeguards * Experience in development of end user operating manuals and documentation * Familiarity with Cloud infrastructure * Experience preparing System Security Plans and supporting Cybersecurity/IA testing. * Experience with NAC and MDM. * Knowledge of OWASP a plus. Why join WGU? * You will be part of a growing, diverse, inclusive workforce, committed to creating pathways to a better life for our students by expanding access to education for everyone * We provide comprehensive dental, vision, and medical benefits, with paid parental leave and inclusive family forming benefits * We offer generous retirement and HSA company contributions * We offer paid time off, and depending on role, options for flexible and remote work * You will also have opportunity for continuous learning! Employees and their families receive discounted undergraduate and graduate WGU tuition *Current WGU employees must submit their internal application prior to 3/20/2023 to be considered for this position* Disclaimer: This Job Description has been designed to indicate the general nature, essential duties, and responsibilities of work performed by employees within this classification. It does not contain a comprehensive inventory of all duties, responsibilities, and qualifications that are required of the employee to do this job. Duties, responsibilities and activities may change at any time with or without notice. This Job Description does not constitute a contract of employment and the University may exercise its employment-at-will rights at any time. As an equal opportunity employer, we recognize our strength lies in our people and commit to creating an inclusive environment where all can thrive, regardless of race, age, gender orientation, sexual orientation, religion, or disability. #LI-AW2 #LI-Remote As an equal opportunity employer, WGU recognizes that our strength lies in our people. We are committed to diversity. HIRING INSIGHTS JOB ACTIVITY * Posted 4 days ago Western Governors University original job Report job Information Security Analyst jobs in Remote Jobs at Western Governors University in Remote Information Security Analyst salaries in Remote COMPANY INFO Follow Get job updates from Western Governors University Western Governors University 419 reviews Building better futures. Join us in our commitment to the WGU Promise: helping our students achieve their dreams for a degree and care... Let employers find you Thousands of employers search for candidates on IndeedUpload your resume tech_infrastructure * Hiring Lab * Career Advice * Browse Jobs * Browse Companies * Salaries * Find Certifications * Browse Schools * Indeed Events * Work at Indeed * Countries * About * Help Center * ESG at Indeed * © 2023 Indeed * Your Privacy Choices * Accessibility at Indeed * Privacy Center * Cookies * Privacy * Terms LET EMPLOYERS FIND YOU Upload Your Resume