×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst , Digital Technology Solutions

Job in Cincinnati, Hamilton County, Ohio, 45208, USA
Listing for: University of Cincinnati
Full Time position
Listed on 2025-12-20
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Support, IT Consultant
Job Description & How to Apply Below
Position: Information Security Analyst 1, Digital Technology Solutions

Information Security Analyst 1, Digital Technology Solutions

Job Title:

Information Security Analyst 1, Digital Technology Solutions

Posting

Start Date:

11/10/25

Work Arrangement:

Current UC employees must apply internally via Success Factors.

Next Lives at the University of Cincinnati

Founded in 1819, the University of Cincinnati ranks among the nation’s best urban public research universities. Home to more than 53,600 students, 12,000 faculty and staff, and over 360,000 living alumni, UC, a Carnegie 1 institution, combines research prowess with a physical setting. The New York Times has called “the most ambitious campus design program in the country.” UC’s momentum has never been stronger as the anchor of the Cincinnati Innovation District, the oldest cooperative education (co‑op) program in the country with students earning $94 million annually through paid experiences, an academic health system, and as a member of the Big 12 Conference.

The university contributes $10.6 billion in economic impact to the city and $22.7 billion to the state of Ohio. At UC, next is all of us. Learn more .

UC is a mission-driven organization where we are committed to student success and positively transforming the community through scholarship and service. We thrive on innovation, making an impact, and fostering an environment where staff and faculty are key contributors to UC’s success.

Job Overview

Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.

Essential Functions
  • Participate in peer knowledge sharing groups.
  • Communicate security concepts effectively, with guidance.
  • Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
  • Document individual progress on assigned deliverables.
  • Participate in gathering of metrics for area of responsibility.
  • Carry out procedures to ensure that support departmental and university operations in the information security area.
  • Maintain familiarity with information security trends and best practices.
  • Participate in internal information security projects and initiatives.
  • Participate in preparation and maintenance of functional documentation for assigned tasks.
  • Participate in the research, design, implementation, and support of systems supporting information security tools and services.
  • Participate in the development, maintenance, and utilization of standard operating procedures.
  • Participate in conducting risk and vulnerability assessments of information systems to identify vulnerabilities, risks, and protection needs.
  • Participate in troubleshooting processes during and outside of normal business hours.
  • Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
  • Assist with information security training and awareness programs.
  • Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
  • Associate’s Degree in Computer Science, Information Technology, Computer Engineering, or related field.
  • Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience

Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.

Additional Qualifications Considered

This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary