×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst , Digital Technology Solutions

Job in Cincinnati, Hamilton County, Ohio, 45208, USA
Listing for: ISACA
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Information Security Analyst 2, Digital Technology Solutions

Current UC employees must apply internally via Success Factors

Next Lives at the University of Cincinnati

Founded in 1819, the University of Cincinnati ranks among the nation’s best urban public research universities. Home to more than 53,600 students, 12,000 faculty and staff, and over 360,000 living alumni, UC, a Carnegie 1 institution, combines research prowess with a physical setting The New York Times has called ?the most ambitious campus design program in the country." UC’s momentum has never been stronger as the anchor of the Cincinnati Innovation District, the oldest cooperative education (co-op) program in the country with students earning $94 million annually through paid experiences, an academic health system, and as a member of the Big 12 Conference.

The university contributes $10.6 billion in economic impact to the city and $22.7 billion to the state of Ohio. At UC, next is all of us. Learn more  .

UC is a mission‑driven organization where we are committed to student success and positively transforming the community through scholarship and service. We thrive on innovation, making an impact, and fostering an environment where staff and faculty are key contributors to UC’s success.

Job Overview

This position will primarily work in the area of information security risk management and compliance supporting the university’s cybersecurity posture by identifying, assessing, and helping manage information security risks while ensuring alignment with applicable regulatory, legal, and policy requirements. This role partners with other areas of the Office of Information Security, IT, business units, and compliance stakeholders to evaluate controls, support audits and risk assessments, and promote secure and compliant practices across the organization.

Essential

Functions
  • Clearly convey complex security information to both technical and non‑technical stakeholders.
  • Participate in developing technical documentation (designs, specifications, processes, workflows) and communications.
  • Mentor and delegate work assignments to student workers.
  • Participate in multiple low and moderate risk projects. Work with a team to advance project goals and provide technical assistance.
  • Document individual progress on assigned deliverables.
  • Gather metrics for area of responsibility.
  • Carry out procedures to ensure that all systems, products, and services meet organization security standards.
  • Research information security trends to understand the latest vulnerabilities and threats.
  • Conduct risk and vulnerability assessments of information systems to identity vulnerabilities, risk, and protection needs.
  • Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
  • With limited support, work with business units to achieve security objectives. Identify, report, and resolve security risks and violations.
  • Develop subject matter expertise on security applications and services in the area of responsibility.
  • With limited support, conduct information security reviews; determine and document risk and impact on the university; provide baseline remediation recommendations.
  • Assist with cyber investigations through forensic fact gathering with a focus on e‑discovery.
  • Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
  • Develop content for and present information security training and awareness programs.
  • Develop familiarity with data security laws and regulations applicable to higher education.
  • Participate in troubleshooting processes during and outside of normal business hours and participate in change management.
  • Mentor non‑security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
  • Serve as seasoned and proficient information security professional.
  • Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
  • Bachelor’s Degree in Computer Science, Information Technology, Computer Engineering, or…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary