Enterprise Security Analyst II
Listed on 2026-03-05
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process.
Enterprise Security Analyst IIBusiness Supp Wrks Main Office, 6251 Crooked Creek Rd., Peachtree Corners, GA 30092
6 days ago Requisition
Salary Range: $34.81 To $43.51 Hourly
Position DescriptionReports to:
Information Security Officer
Skill Levels:
Analyst
The primary purpose of this position is to support the Information Security Officer (ISO) in upholding Associated Credit Union’s (ACU’s) mission to offer members financial products that fulfill their needs, service that exceeds their expectations, and relationships that inspire their trust. This position supports the achievement of the organization’s core values of Integrity and Trust.
The Information Security Officer (ISO) is responsible for developing and implementing a comprehensive information security strategy that aligns with the organization’s business objectives and strategic technology plan. The Enterprise Security Analyst II (ESA II) supports the ISO by performing a wide variety of tasks aimed at protecting the credit union’s information and systems from security threats. These responsibilities include monitoring, analyzing, and responding to security events and incidents, implementing and maintaining security controls and contributing to the development of security policies and procedures.
The ESA II also plays a role in risk management, vulnerability assessments, and promoting compliance with applicable laws, regulations, and internal policies.
- Monitor and investigate:
Continuously monitor networks and systems for security events, investigate incidents, and promptly notify the ISO, providing threat analysis and remediation recommendations. - Implement security systems:
Install and maintain security software, appliances, and systems to protect sensitive information and critical systems from unauthorized or malicious access. - Participate in incident response:
Follow incident response plans, participating in investigations of security events and incidents in collaboration with the Technology Services and Risk Management departments. - Implement security controls:
At the direction of the ISO, implement security policies, procedures, and controls across the organization. - Remain current on the threat landscape:
Monitor emerging cyber threats and vulnerabilities and recommend adjustments to security measures as appropriate. - Communicate security risks:
Communicate identified security risks to the ISO in an effective and timely manner, along with proposed mitigation steps. - Support security documentation:
Support the ISO in drafting information security policies, procedures, and guidance aligned with the organization’s security goals, objectives, and roadmap. - Participate in identifying, assessing, and mitigating risks:
Participate in risk assessments to identify potential threats and vulnerabilities to information assets, contribute to the development of mitigation plans for identified gaps, and support the maintenance of a risk register to track and report on the status of proposed resolutions through completion. - Contribute to projects:
Participate as assigned on project teams to promote security awareness and ensure that security is factored into projects from the design phase through implementation. Support the ISO on projects that involve security tool and system upgrades, replacements, and additions. - Promote compliance:
Demonstrate a commitment to compliance by implementing practices that align with security and privacy policies as well as applicable laws, regulations, and guidelines. - Participate in business continuity and disaster recovery activities:
With minimal oversight, carry out assigned roles to restore systems and recover from security incidents to minimize downtime and impact. - Vendor analysis:
Participate in the assessment and management of security risks associated with technology and information services provided through third-party vendors and contractors. - Demonstrate security professionalism:
Actively participate in training and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).