Capital Technology Alliance
The Security Analyst plays a critical role in protecting enterprise infrastructure and data assets by implementing, managing, and enhancing cybersecurity measures across systems and networks. This position involves proactive monitoring of security platforms, identifying and mitigating vulnerabilities, responding to incidents, and ensuring adherence to security frameworks and policies. The analyst will collaborate with cross-functional IT teams to evaluate risks, optimize security tools such as SIEM and endpoint protection, and strengthen the organization’s overall security posture.
Key Responsibilities
Continuously monitor and analyze security events using SIEM platforms (e.g., Splunk).
Administer and support enterprise antivirus and endpoint protection solutions.
Perform vulnerability scans, analyze findings, and coordinate remediation efforts.
Maintain secure configurations for servers, network devices, and applications.
Investigate security alerts and incidents, documenting findings and resolutions.
Collaborate with infrastructure and application teams to implement security best practices.
Maintain detailed documentation of security procedures, incidents, and compliance activities.
Contribute to the development and enforcement of cybersecurity policies and standards.
Generate reports and deliver briefings on security metrics, incidents, and trends.
Ensure compliance with applicable security regulations and internal standards.
Support internal and external audits, risk assessments, and compliance reviews.
Required Qualifications
Bachelor’s or Master’s degree in Computer Science, Information Systems, or a related discipline. Equivalent experience may be considered in lieu of formal education on a year-for-year basis.
A minimum of
seven (7)
years of combined IT and cybersecurity experience, including:
At least
seven (7)
years of experience in server or network administration.
At least
five (5)
years of experience in enterprise-level information security administration.
At least
five (5)
years of hands‑on experience with SIEM tools.
At least
five (5)
years of experience in vulnerability management and remediation.
Strong understanding of security principles, threats, and mitigation strategies across diverse platforms.
Experience managing and supporting third‑party antivirus and endpoint protection tools.
Must pass a Level II Background Check and complete CJIS security awareness training.
Preferred Qualifications
Five (5)
or more years of experience administering Splunk or comparable SIEM platforms.
Three (3)
or more years of experience with Microsoft Defender security products.
Three (3)
or more years of experience with IDS/IPS technologies.
Three (3)
or more years of experience using Office 365 Data Loss Prevention (DLP).
Demonstrated ability to prepare executive‑level security reports and briefings.
Familiarity with IT security standards in regulated or sensitive environments.
Experience responding to cybersecurity threats in high‑risk or compliance‑driven settings.
#J-18808-Ljbffr
Key Responsibilities
Continuously monitor and analyze security events using SIEM platforms (e.g., Splunk).
Administer and support enterprise antivirus and endpoint protection solutions.
Perform vulnerability scans, analyze findings, and coordinate remediation efforts.
Maintain secure configurations for servers, network devices, and applications.
Investigate security alerts and incidents, documenting findings and resolutions.
Collaborate with infrastructure and application teams to implement security best practices.
Maintain detailed documentation of security procedures, incidents, and compliance activities.
Contribute to the development and enforcement of cybersecurity policies and standards.
Generate reports and deliver briefings on security metrics, incidents, and trends.
Ensure compliance with applicable security regulations and internal standards.
Support internal and external audits, risk assessments, and compliance reviews.
Required Qualifications
Bachelor’s or Master’s degree in Computer Science, Information Systems, or a related discipline. Equivalent experience may be considered in lieu of formal education on a year-for-year basis.
A minimum of
seven (7)
years of combined IT and cybersecurity experience, including:
At least
seven (7)
years of experience in server or network administration.
At least
five (5)
years of experience in enterprise-level information security administration.
At least
five (5)
years of hands‑on experience with SIEM tools.
At least
five (5)
years of experience in vulnerability management and remediation.
Strong understanding of security principles, threats, and mitigation strategies across diverse platforms.
Experience managing and supporting third‑party antivirus and endpoint protection tools.
Must pass a Level II Background Check and complete CJIS security awareness training.
Preferred Qualifications
Five (5)
or more years of experience administering Splunk or comparable SIEM platforms.
Three (3)
or more years of experience with Microsoft Defender security products.
Three (3)
or more years of experience with IDS/IPS technologies.
Three (3)
or more years of experience using Office 365 Data Loss Prevention (DLP).
Demonstrated ability to prepare executive‑level security reports and briefings.
Familiarity with IT security standards in regulated or sensitive environments.
Experience responding to cybersecurity threats in high‑risk or compliance‑driven settings.
#J-18808-Ljbffr