Skip to content

Technical > Information Security Analyst

Salary National Average

Low Medium High
79440.0000 91650.0000 116360.0000

Change from Previous Year:

+6%

Supply and Demand

Candidate Supply: 7,911 Job Openings: 87,230

0 50 100

More Difficult Less Difficult

Salary Variance

Enter City, State to view local salaries and candidate demand.

Short Description:

Information Security Analysts monitor systems for unusual and suspicious activity. They will consume, research, evaluate and document security-related events and alerts as they are received. Support multiple security-related platforms, working with team members in Information Security, Technology, other internal departments, and external customers/partners.

Duties / Responsibilities:

  • Provide guidance and expertise in risk management regarding the protection and security of digital assets in the cloud and on-premise.
  • Design and develop Information Security Architectures to prevent unauthorized access to our information and data breaches.
  • Develop and implement information security policies and procedures; develops security guidelines and safe practices for Funds'-wide computing and networking systems and maintain the documentation.
  • Manage, maintain, and monitor security technologies such as vulnerability scanning solutions, IDS/IPS, anti-virus technologies, DLP capabilities, SIEM technologies, host forensics, malware analysis, web application firewalls, and proxy solutions.
  • Manage real-time threat detention technologies to identify and quarantine threats, Monitor Endpoint Security Alerts, and take corrective action.
  • Minimize security threats by examining governance, technology infrastructure, and facilities to identify security deficiencies, use risk analysis, and follow up with a corrective action plan.
  • Monitor internal control systems to ensure appropriate access levels are maintained and protect against unauthorized system access, modification, and destruction.
  • Review security-related reports, logs, and occurrences; escalate issues and initiate security response procedures.
  • Create and review vulnerability reports, track compliance with vulnerability management policies, and escalate.

Skills / Requirements / Qualifications

  • Education: Bachelor's degree, preferably with a solid academic record.
  • Experience: Extensive knowledge of current security threats, techniques, and landscape. Strong understanding of internal control concepts and policies. Strong knowledge of Incident Analysis and Response concepts and techniques
  • Network Experience: Working knowledge of IT infrastructure, including network devices and architecture, TCP/IP, network protocols, server operating systems, vulnerability scanning, endpoint protection, intrusion detection, firewalls, and content filtering.
  • Miscellaneous: Knowledge of MFA, PKI, Palo Alto, Cisco ASA, IDS/IPS, KiWi, SolarWinds, Nessus, Windows, Linux/Unix, VMware, IDS/IP, forensic discovery, Certificate Authority (CA), PKI, Kerberos, SSL, HTTPS, LDAP, Active Directory, Group Policy, DNS, NTFS, SharePoint, Remote Access, Citrix, VDI, ACLs, etc. Various social engineering and penetration testing approaches/tools for vulnerability identification, enumeration, and exploitation to determine security networks, systems, and application security configuration

Job Zones

  • Education: Most of these occupations require a four-year bachelor's degree, but some do not.
  • Related Experience: A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
  • Job Training: Employees in these occupations usually need several years of work-related experience, on-the-job training, or vocational training.
  • Job Zone Examples: Many of these occupations involve coordinating, supervising, managing, or training others. Examples include real estate brokers, sales managers, database administrators, graphic designers, conservation scientists, art directors, and cost estimators.

Share Role Details

Return to job listings