×
Register Here to Apply for Jobs or Post Jobs. X

Enterprise Security Analyst II

Job in Peachtree Corners, Gwinnett County, Georgia, 30092, USA
Listing for: Associated Credit Union
Full Time position
Listed on 2026-03-05
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 34.81 - 43.51 USD Hourly USD 34.81 43.51 HOUR
Job Description & How to Apply Below

If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process.

Enterprise Security Analyst II

Business Supp Wrks Main Office, 6251 Crooked Creek Rd., Peachtree Corners, GA 30092

6 days ago Requisition

Salary Range: $34.81 To $43.51 Hourly

Position Description

Reports to:

Information Security Officer

Skill Levels:
Analyst

Position Purpose

The primary purpose of this position is to support the Information Security Officer (ISO) in upholding Associated Credit Union’s (ACU’s) mission to offer members financial products that fulfill their needs, service that exceeds their expectations, and relationships that inspire their trust. This position supports the achievement of the organization’s core values of Integrity and Trust.

The Information Security Officer (ISO) is responsible for developing and implementing a comprehensive information security strategy that aligns with the organization’s business objectives and strategic technology plan. The Enterprise Security Analyst II (ESA II) supports the ISO by performing a wide variety of tasks aimed at protecting the credit union’s information and systems from security threats. These responsibilities include monitoring, analyzing, and responding to security events and incidents, implementing and maintaining security controls and contributing to the development of security policies and procedures.

The ESA II also plays a role in risk management, vulnerability assessments, and promoting compliance with applicable laws, regulations, and internal policies.

Essential Functions & Core Duties
  • Monitor and investigate:
    Continuously monitor networks and systems for security events, investigate incidents, and promptly notify the ISO, providing threat analysis and remediation recommendations.
  • Implement security systems:
    Install and maintain security software, appliances, and systems to protect sensitive information and critical systems from unauthorized or malicious access.
  • Participate in incident response:
    Follow incident response plans, participating in investigations of security events and incidents in collaboration with the Technology Services and Risk Management departments.
  • Implement security controls:
    At the direction of the ISO, implement security policies, procedures, and controls across the organization.
  • Remain current on the threat landscape:
    Monitor emerging cyber threats and vulnerabilities and recommend adjustments to security measures as appropriate.
  • Communicate security risks:
    Communicate identified security risks to the ISO in an effective and timely manner, along with proposed mitigation steps.
  • Support security documentation:
    Support the ISO in drafting information security policies, procedures, and guidance aligned with the organization’s security goals, objectives, and roadmap.
  • Participate in identifying, assessing, and mitigating risks:
    Participate in risk assessments to identify potential threats and vulnerabilities to information assets, contribute to the development of mitigation plans for identified gaps, and support the maintenance of a risk register to track and report on the status of proposed resolutions through completion.
  • Contribute to projects:
    Participate as assigned on project teams to promote security awareness and ensure that security is factored into projects from the design phase through implementation. Support the ISO on projects that involve security tool and system upgrades, replacements, and additions.
  • Promote compliance:
    Demonstrate a commitment to compliance by implementing practices that align with security and privacy policies as well as applicable laws, regulations, and guidelines.
  • Participate in business continuity and disaster recovery activities:
    With minimal oversight, carry out assigned roles to restore systems and recover from security incidents to minimize downtime and impact.
  • Vendor analysis:
    Participate in the assessment and management of security risks associated with technology and information services provided through third-party vendors and contractors.
  • Demonstrate security professionalism:
    Actively participate in training and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary