×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Analyst, Senior

Job in Tempe, Maricopa County, Arizona, 85285, USA
Listing for: Arizona State University
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 85700 - 94000 USD Yearly USD 85700.00 94000.00 YEAR
Job Description & How to Apply Below

Job Profile: Cybersecurity Analyst 3

Job Family: IT Cybersecurity

Time Type: Full time

Max Pay – Depends on experience: $94,000.00 USD Annual

Apply before 11:59 PM Arizona time the day before the posted End Date.

Minimum Qualifications: Bachelor’s degree and five (5) years of experience appropriate to the area of assignment/field; OR, Any equivalent combination of experience and/or training from which comparable knowledge, skills and abilities have been achieved.

Job Description:

The Senior Cybersecurity Analyst at Arizona State University (ASU) is a seasoned professional responsible for cybersecurity domains like governance, risk, compliance, vulnerability management, and privacy. This role leads cybersecurity projects, refines security processes, and implements technical solutions aligned with ASU’s strategies. The Senior Analyst handles open-ended problems by providing analysis and prioritized solutions based on cybersecurity frameworks such as NIST RMF and CMMC, and by staying updated on emerging trends.

The position is key to maturing ASU’s cybersecurity program, ensuring security capabilities evolve with the university’s needs.

As with all members of the Enterprise Technology team, this role carries core responsibilities, including fostering a sense of belonging and cultivating a culture that is relational, visionary, and empowering. With a strong emphasis on authenticity and compassion, this position is dedicated to embodying and advancing our culture.

Salary: $85,700.00 – $94,000.00 per year;
Depends on experience

Essential Duties:

  • Vulnerability Management: Manage the vulnerability program, including regular scanning, identification, and assessment of vulnerabilities in systems and applications. Prioritize and coordinate fixes by working with system owners and IT teams, ensuring timely patching or mitigation. Monitor and report progress on remediation efforts (using tools like Service Now for ticketing and workflow) and confirm that the fixes are effective.
  • Governance, Risk & Compliance: Contribute to governance, risk, and compliance efforts for the cybersecurity program. Conduct risk assessments and security control evaluations for critical systems and third‑party solutions, aligning with established frameworks (e.g., NIST RMF) and emerging compliance standards (such as CMMC for relevant research projects). Ensure that security practices and controls meet applicable regulations and data protection requirements – including HIPAA (health data), FERPA (student records privacy), GLBA (financial data protection), GDPR (EU personal data privacy), and PCI‑DSS (payment card data security).

    Collaborate closely with compliance, legal, and privacy teams to address regulatory obligations and to prepare for or support audits and assessments.
  • Process Improvement & Automation: Proactively identify opportunities to enhance security operations processes and workflows. Automate routine procedures and controls using scripting and security orchestration tools (SOAR) as well as AI to boost efficiency and consistency in incident response, monitoring, and compliance reporting. Create scripts or playbooks for tasks like vulnerability management, risk assessment, compliance assessment, and digital privacy impact assessments.
  • Security Tools Enhancement: Evaluate, tune, and recommend enhancements to enterprise security tools and capabilities. Supervise the tuning and optimal setup of systems, including endpoint detection and response tools (e.g., Crowd Strike) and threat intelligence feeds. Ensure that security tools produce actionable insights for intelligence sharing with multiple teams across the organization. Identify new data sources or technologies that could improve ASU’s security posture and maturity.
  • Cross‑Team

    Collaboration:

    Collaborate closely with various university teams such as IT operations, network engineering, application developers, and data governance to develop a strong understanding of the threat landscape and business environment within a large, complex academic setting. Act as a security expert in cross‑departmental meetings and projects, effectively communicating risks and requirements. Promote a…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary