×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior​/Information Security Analyst

Job in Moore, Cleveland County, Oklahoma, USA
Listing for: iHire
Full Time position
Listed on 2026-02-14
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Senior / Information Security Analyst

applications will be accepted until january 20, 2026 - apply online.

senior information security analyst summary

under the general supervision of the supervisor, it infrastructure, the senior information security analyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems. The role also includes change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.

The analyst participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. They also participate in exercises that test policies, procedures, and skills required by business and critical operations, and respond to anomalous events that require analysis and synthesis of complex events to ensure operational security.

information security analyst summary

similar supervisory responsibilities as above but with a focus on the core troubleshooting, installation, and maintenance of electronic access control and monitoring equipment and software. They enforce stability and integrity, collaborate with regulatory and industry teams, conduct exercises, and respond to anomalous events that necessitate analysis and correlation of complex events.

essential duties and responsibilities (senior)
  • ensure stability and integrity of in‑house electronic access control and monitoring systems such as seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application white‑listing, network anomaly detection devices, log retention and forwarding systems, and analytics software.
  • perform change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis.
  • install, troubleshoot, and maintain hardware and software systems related to electronic access control and monitoring.
  • review logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy and procedure.
  • respond to anomalous events requiring analysis and synthesis of complex events.
  • test and implement ids/ips rule sets and signatures.
  • conduct security controls testing after significant changes to cyber assets.
  • monitor cyber assets and critical infrastructure to ensure uptime.
  • engage in change/configuration management activities for cyber assets.
  • perform network traffic analysis on anomalous traffic.
  • assist in incident response and forensic investigations.
  • conduct vulnerability testing, analysis, and mitigation for cyber assets.
  • analyze network infrastructure rule sets manually and with software tools to ensure proper security posture for compliance.
  • write reports and briefings on specific information security issues.
  • ticket and track operational issues related to the security posture of cyber assets.
  • research network products, services, protocols, and standards to keep abreast of developments in the industry.
  • participate in exercises testing policies, procedures, and skills required by business and critical operations.
  • involve in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams.
essential duties and responsibilities (information security analyst)
  • ensure stability and integrity of in‑house electronic access control and monitoring systems such as seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application white‑listing, network anomaly detection devices, log retention and forwarding systems, and analytics software.
  • install, troubleshoot, and maintain hardware and software systems related to electronic access control and monitoring.
  • review logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy and procedure.
  • respond to anomalous events requiring analysis and correlation of…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary