Data Security Analyst Senior
Listed on 2026-01-16
-
IT/Tech
Cybersecurity, IT Support
How to Apply
For questions about this position or to request a reasonable accommodation during the application process, email .
Job SummaryThe at the University of Michigan is seeking a hands‑on Data Security Analyst for our Computing and Multimedia Technologies (CMT) team. Reporting to the Director of CMT, you will work with technical teams to secure information systems, networks, and data supporting the Survey Research Center (SRC) and its federally regulated social science research.
This role is suited to an experienced professional with a strong background in Windows‑based enterprise environments, including Active Directory, Group Policy Objects (GPOs), servers, IIS, and workstation fleets, and demonstrated experience supporting information security and compliance requirements. Unlike policy‑only roles, this position emphasizes direct technical execution; implementing security controls, remediating vulnerabilities, and supporting incident response across production infrastructure. The role blends Windows systems administration, applied security engineering, and compliance implementation.
This position requires the ability to obtain federal level 5 security clearance within six months of hire (U.S. citizenship required).
This is a hybrid position based in Ann Arbor, Michigan, with an expectation of 2 to 3 days onsite per week at ISR offices. Working hours are Monday through Friday, 8:00 a.m. to 5:00 p.m.
The salary range for this position is $105,000 to $110,000, commensurate with relevant qualifications.
Why Work at Michigan?In addition to a career filled with purpose and opportunity, The University of Michigan offers a range of benefits to help you stay well, protect yourself and any eligible family members, and plan for a secure future. Benefits include:
- Generous time off
- A retirement plan that provides two‑for‑one matching contributions with immediate vesting upon meeting eligibility requirements
- Many choices for comprehensive health insurance
- Life insurance
- Long‑term disability coverage
- Flexible spending accounts for healthcare and dependent care expenses
Systems Security & Hardening
- Implement and maintain security configurations on Windows Server, Active Directory, GPO, and related infrastructure.
- Apply secure baselines, patch management processes, privileged access controls, and endpoint monitoring.
- Work with systems administrators to integrate secure configurations into server builds and deployment workflows.
Vulnerability Management
- Conduct and interpret regular vulnerability scans, prioritizing remediation efforts across ISR systems.
- Coordinate directly with technical staff to resolve vulnerabilities within required timelines.
- Maintain documentation of vulnerability management processes and audit responses.
Active Directory, GPO & Network Security
- Develop, maintain, and troubleshoot Group Policy objects for security, workstation management, and access control.
- Support AD architecture improvements, secure delegation, and OU design.
- Assist in firewall rule review, network segmentation recommendations, and secure remote access implementation.
Security Compliance Implementation
- Translate compliance frameworks (e.g., NIST 800-53 / 800-171) into feasible, technical configurations on ISR systems.
- Assist with internal and external audits, including documentation preparation and technical evidence collection.
- Review audit findings and implement the technical corrective actions required for accreditation compliance.
Monitoring, Incident Response & Operations
- Support log analysis, SIEM tuning, and endpoint security solutions.
- Assist with incident identification, containment, forensic triage, and remediation.
- Produce incident documentation and participate in root‑cause and prevention planning.
Collaboration & Communication
- Serve as a liaison between CMT, ISR, SRC projects, and U‑M Information Assurance.
- Provide guidance to technical teams and research project staff on secure computing practices.
- Communicate risk, remediation timelines, and compliance requirements in clear, actionable terms.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or equivalent…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).