×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity Analyst; -III

Job in Wenatchee, Chelan County, Washington, 98807, USA
Listing for: Chelan County PUD
Full Time position
Listed on 2025-12-31
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
Position: Cybersecurity Analyst (I-III)

APPLICATION MATERIALS

Applicants are required to submit a combined cover letter and resume in one PDF document. Your cover letter must summarize your interest, education and experience relative to this position.complete materials will not be considered.

To expedite the application process, combine your cover letter and resume into one PDF document before applying and upload electronically when requested in the online application process.

This position is OPEN UNTIL FILLED and applicants are encouraged to apply immediately. The first review date for application materials is scheduled for January 12, 2026. For the full posting and (Use the "Apply for this Job" box below)..

Interested parties are also invited to contact Human Resources at joblist to discuss the position.

Cybersecurity Analyst (I, II, or III)

Position Overview

The Cybersecurity Analyst plays a key role in protecting the District’s information systems and technology environments, including on-premises, cloud, and endpoint platforms. This position monitors for security threats, investigates and responds to cybersecurity events, supports vulnerability management and risk mitigation, and helps maintain and improve enterprise cybersecurity systems and programs.

Depending on level, the Cybersecurity Analyst may focus on foundational monitoring and response activities, independently perform advanced analysis and remediation, or lead incident response efforts, mentor team members, and contribute to secure system design and automation. All levels work collaboratively with IT staff and stakeholders to reduce cybersecurity risk while supporting reliable service delivery.

This position may be filled at the Cybersecurity Analyst I, II, or III level based on the selected candidate’s qualifications and experience.

Key Responsibilities

Cybersecurity Analysis, Detection, and Response

  • Monitor enterprise systems and environments—including network, endpoint, and cloud—for security anomalies, intrusions, or breaches using tools such as SIEM, EDR/XDR, NAC, IDPS, and related technologies.
  • Investigate security alerts, identify indicators of compromise (IOCs), and follow documented procedures to respond to cybersecurity events.
  • Escalate complex incidents as appropriate and collaborate with Cybersecurity Engineers, Architects, or senior analysts.
  • Analyze vendor and government threat intelligence (e.g., CISA advisories) to identify relevant risks and communicate findings to stakeholders.
  • Prepare incident, investigation, and root cause analysis reports in accordance with established standards.
  • At senior levels, recommend detection improvements, support automation of response workflows, and lead initial incident handling.
Cybersecurity Vulnerability and Threat Mitigation
  • Perform vulnerability assessments and security analysis of systems and endpoints.
  • Prioritize and track remediation activities using risk-based approaches.
  • Verify compliance with cybersecurity baselines, standards, and policies.
  • Apply or coordinate security patching to mitigate vulnerabilities while minimizing business impact.
  • Conduct audits of access controls and sensitive data handling to ensure least privilege, proper classification, and encryption.
  • At advanced levels, contribute to secure configuration baselines and oversee vulnerability management efforts.
IT Security System and Program Administration
  • Configure and maintain cybersecurity systems such as firewalls, email gateways, and security monitoring tools according to established guidelines.
  • Support and resolve cybersecurity-related issues escalated from the Service Desk, including access, authentication, filtering, and security events.
  • Administer or support Identity and Access Management (IAM), including authentication services and certificate management.
  • Create and maintain cybersecurity documentation, procedures, and standards.
  • Support the cybersecurity awareness program, including training, phishing assessments, and employee communications.
  • Maintain cybersecurity-related SharePoint or knowledge repositories.
  • At senior levels, mentor lower-level analysts, support onboarding, and provide technical guidance.
Additional Responsibilities
  • Maintain regular and predictable…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary