×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Security Analyst

Job in Sobieski, Oconto County, Wisconsin, 54171, USA
Listing for: Green Bay Packaging - Corporate
Full Time position
Listed on 2026-01-21
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
Position: Security Analyst 2
Jump into a handson cybersecurity role where youll help spot threats, dig into incidents, and keep our systems running safely. Youll learn a tonwhether youre analyzing alerts, checking for vulnerabilities, or helping protect our Microsoft security tools. If youre curious, love solving problems, and want to grow your cyber skills with support from a great team, this is the perfect place to start.

Come help us outsmart the bad guys and level up your career! This is an in-person role located in Green Bay, WI.Responsibilities
  • Investigate and report detected cyber incidents by applying foundational knowledge and independently following established procedures; escalate complex or ambiguous cases to senior team members for guidance.
  • Monitor system cybersecurity operations by performing routine checks independently, exercising judgment within guidelines, and escalating significant issues as needed.
  • Conduct initial cyber incident triage, apply critical thinking to determine scope and urgency, and escalate complex incidents for further analysis.
  • Identify and document vulnerabilities using provided tools and checklists, exercising some judgment in reporting findings, and escalating non-standard issues.
  • Collect data using computer network defense (CND) tools (such as IDS alerts, firewall logs, and host system logs), independently performing routine analysis and escalating complex patterns to senior staff.
  • Document incident activities by completing standard forms and logs independently, ensuring accuracy and escalating any discrepancies for supervisor review.
  • Contribute to root cause analysis by gathering information and applying basic analytical skills; escalate complex investigations to senior analysts.
  • Stay informed about cybersecurity threats and best practices through ongoing training and team briefings and begin to share insights that may improve team processes.
  • Maintain the Microsoft Security stack by performing assigned tasks independently, escalating advanced issues, and suggesting minor process improvements when appropriate.
  • Assist with identity and access management (IAM) tasks by executing predefined steps independently and escalating complex or unusual issues.
  • Respond to active attacks in cloud and on-premises environments by following established instructions, exercising judgment within guidelines, and escalating complex scenarios.
  • Provide input on threat protection practices by sharing observations and basic analysis, supporting team efficiency, and contributing to process improvements.
  • Report suspected violations of organizational policies independently, escalating cases that require further review.
  • Support risk mitigation efforts by carrying out exposure management tasks independently, escalating complex risks, and suggesting improvements to routine processes.
  • Participate in the development of enterprise-wide security architectures and standards by attending meetings, documenting discussions, and contributing ideas for process improvements.
  • Assist with baseline and risk assessments by collecting data and completing checklists independently, escalating complex findings.
  • Provide basic cybersecurity consultation and participate in enterprise-wide health checks as part of a team, applying foundational knowledge and escalating complex questions.
  • Research cybersecurity threats as assigned, applying critical thinking to gather information and escalating complex incidents.
  • Help maintain the enterprise cybersecurity risk register by entering data independently and escalating unusual entries.
  • Assist with cybersecurity investigations and forensic activities by performing data collection and documentation independently, escalating complex cases.
  • Support management of intrusion prevention systems and help define endpoint protection policies by executing routine tasks, exercising judgment within guidelines, and suggesting improvements.
  • Triage advanced threat detection (ATD) alerts by following predefined rules, exercising judgment, and escalating unusual or complex alerts.
  • Provide basic advice and assistance to staff on cybersecurity matters, applying foundational knowledge and escalating complex questions to senior…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary