Information Security Analyst I (wustl)
Job Description
Scheduled Hours
40Position Summary
Use the vulnerability management suite of tools to detect issues and communicate them with owners. Monitor news for emerging vulnerabilities that might impact the campus network. Work with teams to implement several vulnerability management projects over the next couple years including web scanning, cloud scanning, local scanning, various integrations, and others.Job Description
Primary Duties & Responsibilities:
Perform security operations monitoring which includes but is not limited to: tracking and monitoring of malicious software, vulnerability scanning, attack detection and log collection.
Identify potential security risks and report to Information Security Manager.
Open and track tickets with various IT departments.
Assist IT departments in the tracking and removal of malicious software.
Analyze and research to validate active sites and determine whether malicious and determine the best course for blocking.
Configure server rules for blocking as appropriate.
Produce reports and metrics concerning incidents and their mitigation.
Identify trends and make security recommendations to manager.
Perform other duties as assigned.
Working Conditions:
Job Location/Working Conditions
remote
Physical Effort
Typically sitting at a desk or table
Equipment
Office equipment
Required Qualifications
Education:
Associate degree or combination of education and experience may substitute for minimum education.
Certifications:
Work Experience:
Skills:
Driver's License:
More About This Job
PRIMARY DUTIES AND RESPONSIBILITIES (Essential Functions)
- Research emerging threats, system vulnerabilities, hacker methodologies, and key indicators of attacks and exploits
- Engage with IT at WashU to provide remediation guidance
- Conduct various types of vulnerability scans
- Work with other members of the InfoSec team on Red/Blue/Purple Team exercises
- Stay up to date on the latest vulnerabilities
- Maintain up-to-date knowledge of tools, log sources, and vulnerability management best-practices to deal with evolving threat actors.
- Work with IT organizations to analyze and remediate vulnerable software across multiple platforms (Windows, Linux, macOS, mobile).
- Will be on call for security incidents as necessary
- Perform other duties as assigned.
CRITICAL SKILLS AND EXPERTISE:
- Passion for researching and solving unfamiliar complex technical problems.
- Experience with logging platforms e.g., Splunk, Elastic, or Humio.
- Basic knowledge of Microsoft Windows platforms, security hardening, Active Directory authentication, and logging capabilities.
- Basic knowledge of macOS and Linux operating systems and logging capabilities.
- Basic understanding of common tactics and techniques, such as those documented in the MITRE ATT&CK knowledge base.
- Experience using security tools e.g., Corelight, Firepower, SRX, FortiGuard, Palo Alto.
- Basic knowledge of common Internet protocols and services e.g., tcp, udp, dns, http, https, smtp, ssl, ssh, rdp, smb, sql, etc.
- Basic knowledge of cloud provider services and logging capabilities e.g., Azure, Amazon, and Google.
- Experience with networking technologies e.g., subnetting, IP allocations, BGP, firewalls, VPNs.
- Must possess an aptitude for patience, professionalism, tactfulness, and empathy.
- Strong team-oriented interpersonal skills; ability to effectively work with a wide variety of people.
- Must have proficient written and oral communication skills.
- Ability to work independently with limited supervision.
Preferred Qualifications
Education:
Bachelor's degree
Certifications:
Work Experience:
Skills:
Grade
G12Questions
For frequently asked questions about the application process, please refer to our External Applicant FAQ.
Accommodation
If you are unable to use our online application system and would like an accommodation, please email CandidateQuestions@wustl.edu or call the dedicated accommodation inquiry number at 314-935-1149 and leave a voicemail with the nature of your request.
All qualified individuals must be able to perform the essential functions of the position satisfactorily and, if requested, reasonable accommodations will be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship.