Hiring: W2 Candidates Only
Visa: Open to any visa type with valid work authorization in the USA
Job Summary
An information security analyst is responsible for protecting an organizations computer systems networks and data from cyber threats. They monitor systems for security breaches investigate incidents implement security measures and ensure compliance with internal and external security standards. The role combines technical expertise risk management and problem-solving to safeguard digital assets.
Key Responsibilities
1. Monitoring & Incident Detection
Continuously monitor network traffic security alerts and logs for suspicious activities.
Use SIEM (Security Information and Event Management) tools such as Splunk IBM QRadar or Azure Sentinel to detect and respond to threats.
Identify analyze and mitigate real-time security incidents or vulnerabilities.
2. Incident Response & Investigation
Lead or assist in incident response (IR) containment eradication recovery and post-incident analysis.
Conduct digital forensics to trace attacks preserve evidence and document findings.
Develop playbooks and refine incident response processes for future efficiency.
3. Security Controls & Risk Management
Evaluate and implement firewalls antivirus endpoint protection and encryption solutions.
Conduct vulnerability assessments and penetration testing (or coordinate with ethical hackers).
Identify document and remediate risks to systems and data.
Work with IT and development teams to enforce least privilege and access control policies.
4. Policy Compliance & Governance
Ensure compliance with regulations such as ISO 27001 NIST SOC 2 HIPAA or GDPR.
Assist in developing updating and enforcing security policies standards and procedures.
Participate in audit support and risk assessment activities.
5. Awareness & Training
Educate employees about phishing password hygiene and secure practices.
Conduct simulated attacks or training sessions to measure awareness effectiveness.
6. System Hardening & Security Architecture
Assist in designing secure network architectures.
Apply patches and updates to close known vulnerabilities.
Collaborate with DevOps teams on DevSecOps practices for secure software development.
Skills & Competencies
Operating systems: Windows Linux macOS
Networking: TCP/IP VPN DNS firewalls IDS/IPS
Tools: Splunk Wireshark Nessus Qualys Palo Alto CrowdStrike etc.
Scripting languages: Python PowerShell or Bash
Cloud platforms: AWS Azure or GCP security features
Knowledge of encryption authentication and access control mechanisms
Soft Skills
Analytical and critical thinking
Strong attention to detail
Communication skills (technical and non-technical audiences)
Problem-solving and crisis management
Collaboration across IT and business teams
Hiring: W2 Candidates Only Visa: Open to any visa type with valid work authorization in the USA Job Summary An information security analyst is responsible for protecting an organizations computer systems networks and data from cyber threats. They monitor systems for security breaches investigate inc...
Hiring: W2 Candidates Only
Visa: Open to any visa type with valid work authorization in the USA
Job Summary
An information security analyst is responsible for protecting an organizations computer systems networks and data from cyber threats. They monitor systems for security breaches investigate incidents implement security measures and ensure compliance with internal and external security standards. The role combines technical expertise risk management and problem-solving to safeguard digital assets.
Key Responsibilities
1. Monitoring & Incident Detection
Continuously monitor network traffic security alerts and logs for suspicious activities.
Use SIEM (Security Information and Event Management) tools such as Splunk IBM QRadar or Azure Sentinel to detect and respond to threats.
Identify analyze and mitigate real-time security incidents or vulnerabilities.
2. Incident Response & Investigation
Lead or assist in incident response (IR) containment eradication recovery and post-incident analysis.
Conduct digital forensics to trace attacks preserve evidence and document findings.
Develop playbooks and refine incident response processes for future efficiency.
3. Security Controls & Risk Management
Evaluate and implement firewalls antivirus endpoint protection and encryption solutions.
Conduct vulnerability assessments and penetration testing (or coordinate with ethical hackers).
Identify document and remediate risks to systems and data.
Work with IT and development teams to enforce least privilege and access control policies.
4. Policy Compliance & Governance
Ensure compliance with regulations such as ISO 27001 NIST SOC 2 HIPAA or GDPR.
Assist in developing updating and enforcing security policies standards and procedures.
Participate in audit support and risk assessment activities.
5. Awareness & Training
Educate employees about phishing password hygiene and secure practices.
Conduct simulated attacks or training sessions to measure awareness effectiveness.
6. System Hardening & Security Architecture
Assist in designing secure network architectures.
Apply patches and updates to close known vulnerabilities.
Collaborate with DevOps teams on DevSecOps practices for secure software development.
Skills & Competencies
Operating systems: Windows Linux macOS
Networking: TCP/IP VPN DNS firewalls IDS/IPS
Tools: Splunk Wireshark Nessus Qualys Palo Alto CrowdStrike etc.
Scripting languages: Python PowerShell or Bash
Cloud platforms: AWS Azure or GCP security features
Knowledge of encryption authentication and access control mechanisms
Soft Skills
Analytical and critical thinking
Strong attention to detail
Communication skills (technical and non-technical audiences)
Problem-solving and crisis management
Collaboration across IT and business teams
View more
View less