Senior Information Technology Analyst – Cybersecurity Focus
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, IT Consultant, IT Support, Network Security
Upward Mobility with Propark Mobility!
Senior Information Technology Analyst – Cybersecurity Focus
Propark Mobility Corporate Headquarters
Annual Salary: $70,000 - $75,000
Department: Information Technology Reports To: Corporate Director of IT Position Type: Full-Time, In-House
Full Company Benefits
Job SummaryThe Senior Information Technology Analyst serves as a senior technical authority and primary gatekeeper for cybersecurity across the organization. This role is responsible for protecting enterprise systems, networks, and cloud services by ensuring they are designed, implemented, and operated in alignment with NIST cybersecurity standards and best practices
.
This individual leads cybersecurity incident investigations, performs risk assessments, and delivers clear, actionable findings to leadership. In addition, the role provides Tier 2/3 escalation support, secures Microsoft 365 and Microsoft Entra environments, and acts as a key contributor to project scoping and architectural decisions. The ideal candidate is a security first professional who combines hands on technical expertise with strong analytical and communication skills.
WhyThis Role Matters
This role is central to protecting the organization’s systems, data, and reputation. The Senior Information Technology Analyst is both a hands on technical leader and a trusted cybersecurity advisor, ensuring leadership has clear visibility into risk, incidents, and security posture—while proactively strengthening defenses across the enterprise.
Key Responsibilities Cybersecurity Leadership & Governance (NIST-Aligned)- Serve as the organization’s cybersecurity gatekeeper
, ensuring all systems, projects, and changes meet defined security standards. - Lead the implementation and ongoing operation of cybersecurity controls aligned with the NIST Cybersecurity Framework (CSF).
- Assess cybersecurity risks and translate findings into prioritized mitigation strategies.
- Review and approve security aspects of new technologies, applications, and third party vendors.
- Develop, maintain, and enforce security policies, standards, and technical controls.
- Lead cybersecurity incident investigations
, including detection, analysis, containment, remediation, and post incident review. - Coordinate with internal IT teams and external partners during security incidents.
- Perform root cause analysis and identify systemic or control gaps.
- Prepare incident reports and executive-level summaries that clearly communicate impact, risk, and recommended actions to leadership.
- Drive continuous improvement of incident response processes and playbooks.
- Architect, administer, and secure Microsoft 365 services, including Exchange Online, SharePoint Online, Teams, and One Drive.
- Manage Microsoft Entra (Azure AD) with a strong emphasis on:
- Conditional Access and Zero Trust principles
- Multi Factor Authentication (MFA)
- Privileged identity and role based access control
- Monitor identity-related threats and enhance identity security posture across cloud and hybrid environments.
- Design, configure, and maintain firewall and network security policies.
- Monitor logs, alerts, and traffic patterns for indicators of compromise or anomalous behavior.
- Implement secure remote access, VPNs, and network segmentation.
- Partner with vendors and internal stakeholders to maintain a resilient and secure network architecture.
- Act as a security subject matter expert during IT project planning and scoping.
- Evaluate proposed solutions for security risk, compliance, and operational impact.
- Ensure projects align with NIST principles and organizational security objectives.
- Provide technical guidance on secure architecture, configuration, and deployment.
- Serve as the primary escalation point for Tier 2 and Tier 3 technical and security-related issues.
- Support and mentor junior IT staff and service desk personnel.
- Analyze ticket trends to identify recurring risks, vulnerabilities, or control weaknesses.
- Ensure complex issues are resolved efficiently with proper…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).