Information Security Analyst
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Information Security
This range is provided by Com Resource. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range$95,000.00/yr - $/yr
Direct message the job poster from Com Resource
As an Information Security Analyst, you’ll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You’ll monitor, investigate, and respond to security events while shaping our company’s cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience.
This position reports to the CIO.
NO C2C OR 3RD PARTY VENDORS WILL BE ACCEPTED
Responsibilities
Strategic Leadership
- Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
- Lead the development and execution of our cybersecurity roadmap—including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
- Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
- Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
- Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
- Drive cybersecurity awareness through engaging education initiatives.
- Oversee new hire onboarding for required cyber training.
- Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
- Continuously monitor systems for suspicious activity or breaches.
- Respond swiftly to security incidents and ensure thorough documentation.
- Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
- Lead regular system assessments and vulnerability scans.
- Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
- Oversee the deployment and management of critical security tools.
- Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
- Evaluate and enhance our security technology stack.
- Build trusted partnerships across IT and the broader organization to strengthen security culture.
- Support business continuity and disaster recovery planning with department leads.
- Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
- Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
- Deep expertise in endpoint protection, network monitoring, and DLP tools.
- Calm, strategic approach to crisis management.
Qualifications
- Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real‑time incident response and hands‑on access to systems and infrastructure.
- Team-Oriented Culture: You’ll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem‑solving, and continuous improvement.
- Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
- Dynamic and Evolving: The role operates in a fast‑paced environment where adaptability is essential. You’ll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
- Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
- Modern Tools & Infrastructure: You’ll work with enterprise‑grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
- Seniority level
Mid-Senior level
- Employment type
Full-time
- Job function
Information Technology - Industries
IT Services and IT Consulting
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).