Cybersecurity Analyst

The Information Technology
Kalamazoo, United States of America
3 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Shift work
Languages
English
Experience level
Junior

Job location

Remote
Kalamazoo, United States of America

Tech stack

Computer Security
Digital Assets
Identity and Access Management
Intrusion Detection and Prevention
Intrusion Detection Systems
Security Information and Event Management
Software Vulnerability Management
Firewalls (Computer Science)
User Administration
Vulnerability Analysis

Job description

Salary Range Pay is commensurate with qualifications and experience, combined with an excellent benefits package. Number of Vacancies 1 General Summary Supports the University's cybersecurity efforts by implementing and maintaining security measures to protect digital assets, networks, and systems. Assists in the day-to-day security operations, monitoring for threats, and helping to enforce security policies and procedures. Major Duties

  • Evaluates and responds to security alerts generated by various systems in a timely and effective manner. Conducts thorough investigations to identify and assess potential threats and implements appropriate remediation measures while documenting incidents for future reference.
  • Uses security tools, including vulnerability scanners, intrusion detection and prevention systems, and endpoint protection solutions, to conduct regular vulnerability scans and assists in vulnerability remediation efforts.
  • Oversees the University's security awareness training program, designs and implements engaging training sessions to educate employees about best practices for cybersecurity. Regularly assess training effectiveness, updating content to address emerging threats, and ensuring compliance with relevant regulations.
  • Assists in addressing compliance issues. Responds to external compliance sources, notifying individuals as appropriate. Oversees the collection and organization of IT information relevant to internal and external audits.
  • Assists in executing the organization's security incident response plan when security incidents occur. Contributes to post-incident analysis and reporting, documents incident timelines, impacts, and lessons learned.
  • Assists identity management staff in the provisioning and deprovisioning of user and departmental accounts throughout the entire user identity lifecycle. Oversees onboarding and offboarding processes, conducting regular audits of access rights, and promptly updating permissions in response to role changes., * This position is on-campus, and it may be eligible for telecommuting or a hybrid work schedule. Please review WMU's Telecommuting and Hybrid Work Schedules Policy for more details.
  • Staff Compensation System pay grades and rates are available at: https://wmich.edu/hr/staffcompensation.
  • Western Michigan University offers generous benefits to its employees including health, dental, vision, life and disability insurance, retirement, and tuition discount for the employee and tuition remission for eligible dependents. To access information about the specific benefits available for this position, go to:https://www.wmich.edu/hr/enrollment-staff.

Physical requirements and working conditions

  • Office or other indoor work with minimal physical demands such as occasionally lifting or moving materials less than 25 pounds.
  • Work is generally performed in a well-lit, temperature-controlled indoor environment with occasional exposure to the outdoors or any number of elements.

Supplemental Questions

Required fields are indicated with an asterisk (*).

    • Do you have a bachelor's degree in a related field from an accredited institution, or equivalent combination of education and experience?
  • Yes
  • No
    • Do you have one year of relevant experience?
  • Yes
  • No
    • Are you able to show demonstrated experience in Information Technology Security?
  • Yes
  • No
    • Are you able to show demonstrated expertise in security practices, threat assessment and incident response?
  • Yes
  • No
    • Do you have a strong proficiency with various security tools, including firewalls, IDS/IPS, endpoint protection software, and SIEM systems?
  • Yes
  • No
    • Do you have a strong understanding of operating systems, including security configurations and user access management?
  • Yes
  • No
    • Do you have the ability to work irregular shifts and extended hours and be on-call, including weekends and holidays?
  • Yes
  • No
    • Do you have relevant industry certification?
  • Yes
  • No

Documents Needed To Apply

Required Documents

  1. Cover Letter
  2. Resume
  3. List of References

Requirements

  • Bachelor's degree in a related field from an accredited institution or an equivalent combination of education and experience.
  • One year's relevant experience.
  • Demonstrated experience in Information Technology Security.
  • Demonstrated expertise in security practices, threat assessment and incident response.
  • Proficient with various security tools, including firewalls, IDS/IPS, endpoint protection software, and SIEM systems.
  • Strong understanding of operating systems, including security configurations and user access management.
  • Ability to work irregular shifts and extended hours, including weekend and holiday on call duty.

Apply for this position