Senior/Information Security Analyst
Listed on 2026-02-14
-
IT/Tech
Cybersecurity
applications will be accepted until january 20, 2026 - apply online.
senior information security analyst summaryunder the general supervision of the supervisor, it infrastructure, the senior information security analyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in‑house electronic access control and monitoring systems. The role also includes change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.
The analyst participates in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. They also participate in exercises that test policies, procedures, and skills required by business and critical operations, and respond to anomalous events that require analysis and synthesis of complex events to ensure operational security.
similar supervisory responsibilities as above but with a focus on the core troubleshooting, installation, and maintenance of electronic access control and monitoring equipment and software. They enforce stability and integrity, collaborate with regulatory and industry teams, conduct exercises, and respond to anomalous events that necessitate analysis and correlation of complex events.
essential duties and responsibilities (senior)- ensure stability and integrity of in‑house electronic access control and monitoring systems such as seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application white‑listing, network anomaly detection devices, log retention and forwarding systems, and analytics software.
- perform change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis.
- install, troubleshoot, and maintain hardware and software systems related to electronic access control and monitoring.
- review logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy and procedure.
- respond to anomalous events requiring analysis and synthesis of complex events.
- test and implement ids/ips rule sets and signatures.
- conduct security controls testing after significant changes to cyber assets.
- monitor cyber assets and critical infrastructure to ensure uptime.
- engage in change/configuration management activities for cyber assets.
- perform network traffic analysis on anomalous traffic.
- assist in incident response and forensic investigations.
- conduct vulnerability testing, analysis, and mitigation for cyber assets.
- analyze network infrastructure rule sets manually and with software tools to ensure proper security posture for compliance.
- write reports and briefings on specific information security issues.
- ticket and track operational issues related to the security posture of cyber assets.
- research network products, services, protocols, and standards to keep abreast of developments in the industry.
- participate in exercises testing policies, procedures, and skills required by business and critical operations.
- involve in in‑house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams.
- ensure stability and integrity of in‑house electronic access control and monitoring systems such as seim devices, ids sensors, ips, data diodes, firewalls, switches, routers, application white‑listing, network anomaly detection devices, log retention and forwarding systems, and analytics software.
- install, troubleshoot, and maintain hardware and software systems related to electronic access control and monitoring.
- review logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy and procedure.
- respond to anomalous events requiring analysis and correlation of…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).