Senior/Information Security Analyst
Listed on 2026-01-11
-
IT/Tech
Cybersecurity, Network Security
– apply online at
senior information security analystunder the general supervision of the supervisor, it infrastructure, the senior information security analyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems. In addition, the incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.
The incumbent participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. The incumbent responds to anomalous events, synthesizing and correlating complex events to ensure operational security.
under the general supervision of the supervisor, it infrastructure, the information security analyst performs troubleshooting, installation, and maintenance on equipment and software related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems and participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.
The incumbent responds to anomalous events, synthesizing and correlating complex events to ensure operational security.
ensures the stability and integrity of in‑house electronic access control and monitoring systems, including seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application whitelisting, network anomaly detection devices, log retention and forwarding systems, network monitoring systems, and analytics software. Performs change management, configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis. Installs, troubleshoots, and maintains hardware and software systems.
Reviews logs, configurations, rule sets, user accounts, and network traffic for policy adherence. Responds to anomalous events, synthesizing and correlating complex events. Tests and implements ids/ips rule sets and signatures. Conducts security controls testing after significant changes. Monitors cyber assets and critical infrastructure for uptime. Engages in change/configuration management activities. Performs network traffic analysis for anomalous traffic. Assists in incident response and forensic investigations.
Conducts vulnerability testing, analysis, and mitigation. Analyzes network infrastructure rule sets manually and with software tools. Writes reports and briefings. Tracks operational issues and tickets. Conducts research on network products, services, protocols, and standards. Participates in exercises testing policies, procedures, and skills required by business and critical operations. Participates in in‑house, regulatory, and industry teams.
ensures the stability and integrity of in‑house electronic access control and monitoring systems, including seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application whitelisting, network anomaly detection devices, log retention and forwarding systems, network monitoring systems, and analytics software. Installs, troubleshoots, and maintains hardware and software. Reviews logs, configurations, rule sets, user accounts, and network traffic. Responds to anomalous events, synthesizing and correlating complex events.
Monitors cyber assets and critical infrastructure. Engages in change/configuration management activities. Performs network traffic analysis for anomalous traffic. Writes reports and briefings on specific information security issues. Tracks operational issues.…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).