×
Register Here to Apply for Jobs or Post Jobs. X

Senior​/Information Security Analyst

Job in Moore, Cleveland County, Oklahoma, USA
Listing for: Western Farmers Electric Cooperative
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below

– apply online at

senior information security analyst

under the general supervision of the supervisor, it infrastructure, the senior information security analyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems. In addition, the incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.

The incumbent participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. The incumbent responds to anomalous events, synthesizing and correlating complex events to ensure operational security.

information security analyst

under the general supervision of the supervisor, it infrastructure, the information security analyst performs troubleshooting, installation, and maintenance on equipment and software related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems and participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.

The incumbent responds to anomalous events, synthesizing and correlating complex events to ensure operational security.

essential duties and responsibilities – senior information security analyst

ensures the stability and integrity of in‑house electronic access control and monitoring systems, including seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application whitelisting, network anomaly detection devices, log retention and forwarding systems, network monitoring systems, and analytics software. Performs change management, configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis. Installs, troubleshoots, and maintains hardware and software systems.

Reviews logs, configurations, rule sets, user accounts, and network traffic for policy adherence. Responds to anomalous events, synthesizing and correlating complex events. Tests and implements ids/ips rule sets and signatures. Conducts security controls testing after significant changes. Monitors cyber assets and critical infrastructure for uptime. Engages in change/configuration management activities. Performs network traffic analysis for anomalous traffic. Assists in incident response and forensic investigations.

Conducts vulnerability testing, analysis, and mitigation. Analyzes network infrastructure rule sets manually and with software tools. Writes reports and briefings. Tracks operational issues and tickets. Conducts research on network products, services, protocols, and standards. Participates in exercises testing policies, procedures, and skills required by business and critical operations. Participates in in‑house, regulatory, and industry teams.

essential duties and responsibilities – information security analyst

ensures the stability and integrity of in‑house electronic access control and monitoring systems, including seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application whitelisting, network anomaly detection devices, log retention and forwarding systems, network monitoring systems, and analytics software. Installs, troubleshoots, and maintains hardware and software. Reviews logs, configurations, rule sets, user accounts, and network traffic. Responds to anomalous events, synthesizing and correlating complex events.

Monitors cyber assets and critical infrastructure. Engages in change/configuration management activities. Performs network traffic analysis for anomalous traffic. Writes reports and briefings on specific information security issues. Tracks operational issues.…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary