Information Security Analyst
Listed on 2026-01-17
-
IT/Tech
Cybersecurity
Job Req
Job Type: Full-time
Work Category:
Hybrid Telecommute
Application Close Date: 01/19/2026
Sponsorship:
Not Available
Compensation: $40 - $60
Gallo Privacy Policy
We are GALLO
We're a family-owned company with a 90+ year legacy, that's consistently recognized as a Glassdoor 'Best Places to Work.' We have 130+ brands in our total alcohol beverage portfolio including wine, malt, spirits, and ready-to-drink beverages. We're home to the #1 wine and spirits brands in the U.S.
- Barefoot Wine & High Noon and are the official sponsors of the NFL, NHL, UFC, and PGA of America.
View our Corporate Values and Mission Statement here.
A Taste of What You'll DoJoin Gallo Winery's Information Security team and play a vital role in protecting the systems, networks, applications, and data that keep our business thriving. In this hands‑on role you'll investigate incidents, identify root causes, recommend and implement corrective actions, and continuously tune security tools and controls across on‑prem and cloud environments. You will lead medium‑sized projects, support security operations, and collaborate across IT, business partners, auditors, and vendors to keep our environment resilient and compliant.
You’ll conduct risk assessments, review penetration test results, and develop practical implementation plans for system, database, application, encryption, logging, backup, and endpoint security. Your clear, actionable reports will translate technical findings into business risk and remediation priorities, and you’ll help develop standards that map to industry frameworks such as NIST and ISO. Staying current with threat trends and emerging vulnerabilities will be central to anticipating and preventing breaches.
We value curiosity, ownership, and thoughtful risk‑taking. We welcome applicants from diverse backgrounds and career paths who bring strong problem‑solving skills, hands‑on security experience, and the ability to communicate effectively with technical and non‑technical stakeholders. Mentoring and supporting junior colleagues is part of the role, and we offer opportunities for professional growth, certifications, and continuous learning. If you're ready to make a measurable impact on a growing security program while working within a collaborative, inclusive culture, we'd love to hear from you.
WhatYou'll Need
- Bachelor's degree in Computer Science, Business Administration, MIS, Mathematics, or Engineering, plus 3 years of experience with information security, System Administration or equivalent with increasing levels of responsibility; OR High School Diploma or State‑issued equivalency certificate plus 7 years of experience in Information Security, System Administration or equivalent with increasing levels of responsibility.
- Demonstrated technical expertise in IT systems.
- Strong analytical ability, communication skills and the ability to work effectively with clients/customers, IT management and staff, vendors, consultants, and auditors.
- Required to travel to company offices, sites, and/or meeting locations for onboarding, training, meetings and events for development, department needs, and business delivery up to 5% of the time, with or without reasonable accommodation. This may be in addition to travel requirements, if applicable, as listed in this job description.
- Required to be 18 years or older. This may be in addition to other age requirements, if applicable, as listed in this job description.
- Bachelor's degree in Computer Science, Business Administration, MIS, Mathematics, or Engineering, plus 5 years of experience with data security reflecting increasing levels of responsibility.
- Extensive professional experience in management and deployment of security tools.
- Extensive knowledge of networking, databases, systems and/or Web operations.
- In-depth knowledge of data security and protection techniques.
- In-depth knowledge of application security and application security best practices. Professional experience in the following:
Vulnerability and configuration assessment tools, IDS/IPS tools, logging and monitoring tools (SIM), DLP, audit & assessment (GRC tools), data encryption and network or…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).