The Church of Jesus Christ of Latter-day Saints

Information Security Analyst 2

The Church of Jesus Christ of Latter-day Saints

full-time

Posted on:

Origin:  • 🇺🇸 United States • Utah

Visit company website
AI Apply
Manual Apply

Job Level

JuniorMid-Level

Tech Stack

Linux

About the role

  • The Information Security Analyst 2 is an intermediate level, professional role that works on assignments with clear instruction and moderate supervision using designated tools and processes to monitor systems and networks.
  • The primary purpose of monitoring systems and networks is to identify unusual or abnormal activity of moderate scope. This position exercises judgement within defined procedures and practices to determine which potential incidents should be escalated through the appropriate channels for further investigation. The position also provides mentoring and training to less-experienced analysts. This is an individual contributor role.
  • This is a US-based hybrid role, but non-local exceptions may be approved under special circumstances.
  • This individual works with divine guidance to provide or support technology that furthers the mission of the Church and reflects the eternal impact of the gospel.
  • We value early, mid and late-career candidates and encourage all applicants with the posted skills and abilities to apply.

Requirements

  • Bachelor’s degree or equivalent professional experience
  • Two years of related experience (can include internship) in Information Security, IT and/or Computer Science, including expertise in one or more of the following areas: security, privacy, business continuity, compliance or related area(s), attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics, SIEM, SOC processes, and malware analysis
  • Ability to work effectively in a 24/7 environment
  • Demonstrated experience identifying attacks relating to application security, network security, and host security
  • Detail-oriented with the proven ability to follow instructions
  • Ability to successfully work in a team and mentor others
  • Understand how cyber threat intelligence, system storage and memory forensics are used in incident response
  • Familiarity with programming and scripting
  • Basic knowledge of: - IT organization patterns - Networking protocols and technologies - Information security tools, technologies, threats, and practices - Windows and Linux operating systems, command line interfaces, and associated security concerns - Using a SIEM or data aggregation tool to analyze data sets and identify trends, anomalies, and actionable intelligence - Information security practices, trends and technologies
  • Professional written and oral communication skills
  • This job operates in a professional office environment
  • To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment
  • Preferred:
  • Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc.