The Information Security Analyst 2 is an intermediate level, professional role that works on assignments with clear instruction and moderate supervision using designated tools and processes to monitor systems and networks.
The primary purpose of monitoring systems and networks is to identify unusual or abnormal activity of moderate scope. This position exercises judgement within defined procedures and practices to determine which potential incidents should be escalated through the appropriate channels for further investigation. The position also provides mentoring and training to less-experienced analysts. This is an individual contributor role.
This is a US-based hybrid role, but non-local exceptions may be approved under special circumstances.
This individual works with divine guidance to provide or support technology that furthers the mission of the Church and reflects the eternal impact of the gospel.
We value early, mid and late-career candidates and encourage all applicants with the posted skills and abilities to apply.
Requirements
Bachelor’s degree or equivalent professional experience
Two years of related experience (can include internship) in Information Security, IT and/or Computer Science, including expertise in one or more of the following areas: security, privacy, business continuity, compliance or related area(s), attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics, SIEM, SOC processes, and malware analysis
Ability to work effectively in a 24/7 environment
Demonstrated experience identifying attacks relating to application security, network security, and host security
Detail-oriented with the proven ability to follow instructions
Ability to successfully work in a team and mentor others
Understand how cyber threat intelligence, system storage and memory forensics are used in incident response
Familiarity with programming and scripting
Basic knowledge of:
- IT organization patterns
- Networking protocols and technologies
- Information security tools, technologies, threats, and practices
- Windows and Linux operating systems, command line interfaces, and associated security concerns
- Using a SIEM or data aggregation tool to analyze data sets and identify trends, anomalies, and actionable intelligence
- Information security practices, trends and technologies
Professional written and oral communication skills
This job operates in a professional office environment
To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment
Preferred:
Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc.