×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst , Digital Technology Solutions

Job in Cincinnati, Hamilton County, Ohio, 45208, USA
Listing for: University of Cincinnati
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Information Security Analyst 2, Digital Technology Solutions

Overview

Information Security Analyst 2, Digital Technology Solutions

Work Arrangement:
Hybrid

Posting

Start Date:

1/30/26

Current UC employees must apply internally via Success Factors

Next Lives at the University of Cincinnati

Founded in 1819, the University of Cincinnati is a public research university with a broad impact and a focus on innovation. Learn more .

Job Overview

This position will primarily work in information security risk management and compliance, supporting the university's cybersecurity posture by identifying, assessing, and helping manage information security risks while ensuring alignment with regulatory, legal, and policy requirements. The role partners with the Office of Information Security, IT, business units, and compliance stakeholders to evaluate controls, support audits and risk assessments, and promote secure and compliant practices across the organization.

Essential

Functions
  • Clearly convey complex security information to both technical and non-technical stakeholders.
  • Participate in developing technical documentation (designs, specifications, processes, workflows) and communications.
  • Mentor and delegate work assignments to student workers.
  • Participate in multiple low and moderate risk projects; work with a team to advance project goals and provide technical assistance.
  • Document individual progress on assigned deliverables.
  • Gather metrics for the area of responsibility.
  • Carry out procedures to ensure that all systems, products, and services meet organization security standards.
  • Research information security trends to understand the latest vulnerabilities and threats.
  • Conduct risk and vulnerability assessments of information systems to identify vulnerabilities, risk, and protection needs.
  • Assist with providing artifacts to Governance, Risk & Compliance in relation to internal and external audits.
  • With limited support, work with business units to achieve security objectives. Identify, report, and resolve security risks and violations.
  • Develop subject matter expertise on security applications and services in the area of responsibility.
  • With limited support, conduct information security reviews; determine and document risk and impact on the university; provide baseline remediation recommendations.
  • Assist with cyber investigations through forensic fact gathering with a focus on e-discovery.
  • Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
  • Develop content for and present information security training and awareness programs.
  • Develop familiarity with data security laws and regulations applicable to higher education.
  • Participate in troubleshooting processes during and outside of normal business hours and participate in change management.
  • Mentor non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks in support of technologies managed by the Office of Information Security (OIS).
  • Serve as seasoned and proficient information security professional.
  • Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
  • Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
  • Four (4) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
  • Experience in security tool administration.
  • Basic scripting skills.
  • Basic project management skills.
  • Understanding of system administration.
  • Basic understanding of network architecture.
  • Moderate understanding of risk and vulnerability management.
  • Basic awareness of incident response.
  • Experience with industry standard security and compliance frameworks.
Additional Qualifications Considered
  • The ideal candidate will have education or experience in the field of supporting information security risk management and/or compliance activities, familiarity with security frameworks and standards (e.g., NIST, ISO, CIS), understanding of regulatory and compliance requirements relevant to information security, experience working with audits, risk assessments, or…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary