Information Security Analyst II (snhu)

snhu    Remote    2024-12-19

Job posting number: #165668 (Ref:R0013007)

Job Description

Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide.

Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you.

Make an impact — from near or far

At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.

We ask that our remote employees have access to a reliable internet connection and a dedicated, properly equipped workspace that is free of distractions. Employees must reside in, and work from, one of the above approved states.

The opportunity

The Information Security Analyst II reports to the Deputy Chief Information Security Officer and will be a senior member of the Security Operations Center (SOC) team and monitors a large enterprise technology ecosystem, detecting, analyzing, and investigating information security events within that ecosystem, and responding to information security incidents to ensure the protection of SNHU's mission-critical technology resources and institutional information. The critical responsibilities of the SOC team must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work, and require work during non-business hours. You can work remotely in any of our approved working states. #LI-REMOTE

What you'll do:

  • You will be the initial triage point for all security-related tickets that come into the team's multiple queues (including triage, containment, and remediation).
  • You will understand the basic incident response lifecycle and have the analytical mindset needed when it comes to triage and investigations.
  • You will excel at documentation and detailed notetaking, including SOP writing, incident reporting, email and instant messaging etiquette, and most importantly, documenting incident actions.
  • You will collect and analyze log data from complex, virtualized, multi-site computing environments spanning SNHU's technology ecosystem.
  • You will conduct real-time monitoring of security events from multiple sources and use analytical and problem-solving skills to identify, triage, analyze, investigate, and escalate information security events and alerts.
  • You will analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
  • You will perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
  • You will investigate complex and/or high severity security threats or incidents and escalate, when appropriate to leadership.
  • You will coordinate information security incident response in alignment with SNHU's Information Security Incident Response Plan.
  • View Orignal JOB on: italents.net
  • You will communicate with partners, in a non-technical manner, at all organizational levels as part of incident response and remediation activities.
  • You will design and implement or monitor information security incident remediation plans.
  • You will design, configure, deploy, and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
  • You will design, deploy, and manage detections and alerts for specific or common threat conditions.
  • You will design and implement standard operational processes for handling common incident types.
  • You will develop and maintain automation scripts and other tools to enhance security operations effectiveness.
  • You will have familiarity with enterprise security tools like Splunk, Tenable, Proofpoint, Microsoft Defender components, Office 365 tools, PowerShell, and Tenable.
  • You will demonstrate a deep source of ethics, integrity, and confidentiality.
  • You will remain calm and function at the highest level during a crisis.
  • You will remain up to date on latest threat intelligence.
  • You will develop strategies and solutions that improve or mitigate the risks associated with these threats.
  • You will work cross-functionally across ITS and all SNHU departments.
  • You will provide customer support in alignment with SNHU's Core Values and understand how and when to escalate potential issues.
  • You will assist with risk management, vulnerability management, security assessment, auditing, and security authorization programs, as directed by the university's Information Security Management team.
  • You will provide coaching/mentoring to junior analysts.
  • Other responsibilities as assigned. Job responsibilities can change at any time, with or without notice.

What we're looking for:

  • 5+ years of experience in information technology.
  • 2+ years working in a security operations center (SOC), a cybersecurity operations center or on a cybersecurity incident response team.
  • Bachelor's degree in information technology, data analytics, information assurance, computer science, or related field.
  • Professional Certification(s): ISC2 CISSP Certification, Microsoft Azure, Cisco, CompTIA, Security+, GSEC, or other relevant industry certification.
  • Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, Windows/Linux operating system logs, network scanners, log aggregation tools, Endpoint Detection and Response (EDR) tools, and other platforms in the environment that ensure enterprise-wide security monitoring.

Additional experience in:

  • Experience with vulnerability management and incident response and activities.
  • Experience with Powershell
  • Knowledge of MITRE ATT&CK framework.

We believe real innovation comes from inclusion - where different experiences, perspectives and talents are celebrated. So if you're wondering whether SNHU is right for you, take the leap and apply. You might be just the person we're looking for.

Compensation

The annual pay range for this position is $91,388.00 - $146,247.00. Actual offer will be based on skills, qualifications, experience and internal equity, in addition to relevant business considerations. We expect this position to be hired in the following target hiring range $100,983.00 - $136,624.00.

Exceptional benefits (because you’re exceptional)

You’re the whole package. Your benefits should be, too. As a full-time employee at SNHU, you’ll get:

  • High-quality, low-deductible medical insurance

  • Low to no-cost dental and vision plans

  • 5 weeks of paid time off (plus almost a dozen paid holidays)

  • Employer-funded retirement

  • Free tuition program

  • Parental leave

  • Mental health and wellbeing resources



Employer Info

Job posting number:#165668 (Ref:R0013007)
Application Deadline:2025-01-18
Employer Location:snhu
,
More jobs from this employer

Jobs Viewed Recently

顶部