Job Title: Security Analyst | Position Summary: Responsible for safeguarding the organization’s systems, networks, and information assets by monitoring, detecting, and responding to security threats and vulnerabilities. Develops, implements, and maintains security strategies, controls, and technologies to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of data. Conducts security audits and risk assessments, evaluates internal controls, and recommends corrective actions to strengthen the organization’s security posture and ensure compliance with applicable regulations and data protection standards. Investigates and documents security incidents, supports remediation efforts, and drives the transition of non-compliant environments to compliant states. Maintains awareness of emerging cybersecurity threats, trends, and threat actor methodologies to proactively mitigate risk and enhance organizational resilience. Essential Job Functions Monitor network and system activity to detect, analyze, and respond to potential security threats and incidents. Investigate security breaches and cybersecurity incidents, performing root cause analysis and documenting findings, impact, and remediation actions. Implement, manage, and continuously enhance security controls, including firewalls, encryption, intrusion detection/prevention systems, and endpoint protection tools. Identify, assess, and remediate system and network vulnerabilities through testing, vulnerability management, and penetration testing activities. Conduct proactive threat hunting and analyze threat intelligence to identify emerging risks and prioritize response efforts. Develop, implement, and maintain incident response plans, including escalation procedures and communication protocols. Lead or support incident response activities, coordinating cross-functional teams to contain, mitigate, and resolve security incidents. Perform internal and external security audits and assessments to ensure compliance with organizational policies and regulatory requirements. Define, implement, and enforce corporate cybersecurity policies, standards, and best practices. Collaborate with IT, network, and operations teams to strengthen overall security posture and ensure secure system configurations. Evaluate and recommend security tools, technologies, and enhancements to improve protection of systems and data. Maintain and monitor access controls to safeguard digital assets against unauthorized access, modification, or destruction. Develop and deliver security awareness training and education programs to promote a culture of cybersecurity across the organization. Communicate security risks, incidents, and remediation efforts to stakeholders, including leadership, in a clear and concise manner. Stay current on evolving cybersecurity threats, trends, and technologies to continuously improve organizational defenses. Support continuous improvement of security operations, processes, and team effectiveness. Perform other duties as assigned. |
Minimum Position Qualifications | To perform this job successfully, an individual must be able to perform each essential function satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Education and Experience Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field required; or an equivalent combination of education and relevant experience. Minimum of 3–5 years of experience in information security, cybersecurity, or a related technical field. Foundational knowledge of computer systems, networks, and programming/scripting languages. Experience supporting system design, development, and secure implementation practices. Demonstrated ability to manage tasks and priorities, with basic project management experience preferred. Qualifications Experience in information security or related field. Experience with computer network penetration testing and techniques. Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact Preferred Certifications CEH: Certified Ethical Hacker CISM: Certified Information Security Manager CompTIA Security+ CISSP: Certified Information Systems Security Professional GSEC: SANS GIAC Security Essentials |
Working Conditions | The work environment characteristics described here are representative of those the employee encounters while performing the functions of this job. While performing the duties of this job, the employee is frequently exposed to both office and plant environments. May be exposed to odors, chemical agents, dust, fumes, gases, sharp objects, hazardous or moving equipment, wet slippery floors, and extremes in temperature and humidity. Interacts regularly with various staff and employees, and occasionally with vendors, suppliers, community members and regulatory agency representatives. Travel and overtime are required when necessary. |