Information Security Analyst II - Remote

Remote
Apply
AI Summary

Southern New Hampshire University seeks an Information Security Analyst II to join their Security Operations Center (SOC) team. This role involves monitoring, detecting, analyzing, and responding to security events within a large enterprise ecosystem. The position requires 5+ years of IT/Cybersecurity experience and 2+ years in a SOC or incident response role.

Key Highlights
Senior member of the Security Operations Center (SOC) team.
Responsible for monitoring, detecting, analyzing, and responding to information security events and incidents.
100% remote work option available in 35 specified US states.
Key Responsibilities
Serve as an initial evaluation point for all security-related tickets, including triage, containment, and remediation.
Understand the basic incident response lifecycle.
Excel at documentation and detailed notetaking, including SOP writing, incident reporting, email and instant messaging etiquette, and documenting incident actions.
Collect and analyze log data from complex, virtualized, multi-site computing environments and SNHU's technology ecosystem.
Conduct real-time monitoring of security events from multiple sources and use analytical and problem-solving skills to identify, triage, analyze, investigate, and escalate information security events and alerts.
Analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
Perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
Perform investigation and escalation for complex or high severity security threats or incidents.
Coordinate information security incident response according to SNHU's Information Security Incident Response Plan.
Communicate with partners, in a non-technical manner, at all organizational levels as part of incident response and remediation activities.
Design and implement or monitor information security incident remediation plans.
Design and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
Design, deploy, and manage detections and alerts for specific or common threat conditions.
Design and implement standard operational processes for handling common incident types.
Maintain automation scripts and other tools to enhance security operations efficiency.
Remain up to date on latest threat intelligence.
Develop strategies and solutions that improve or mitigate the risks associated with these threats.
Work cross-functionally across ITS and all SNHU departments to provide guidance, and technical implementations to include triage, containment, and remediation when applicable.
Provide customer support according to SNHU's Core Values and understand how and when to escalate potential issues.
Help with risk management, vulnerability management, security assessment, auditing, and security authorization projects, as directed by the university's Information Security Management team.
Provide mentoring to junior analysts.
Perform other responsibilities as assigned.
Technical Skills Required
Splunk Halcyon Microsoft Defender Tenable Proofpoint Office 365 PowerShell SIEM IPS NAC Endpoint Detection and Response (EDR) MITRE ATT&CK framework
Benefits & Perks
High-quality, low-deductible medical insurance
Low to no-cost dental and vision plans
5 weeks of paid time off
Paid holidays
Employer-funded retirement
Free tuition program
Parental leave
Mental health and wellbeing resources
Nice to Have
ISC2 CISSP Certification
SANS GIAC, GSEC, GCIH, GCFA, GCDA, GMON, GCED, GSOC or other relevant industry certification

Job Description


Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide.

Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you.

Make an impact — from near or far

At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.

We ask that our remote employees have access to a reliable internet connection and a dedicated, properly equipped workspace that is free of distractions. Employees must reside in, and work from, one of the above approved states.

The opportunity

The Information Security Analyst II will report directly to the Director of Information Security Operations. As an Information Security Analyst II, you will be a senior member of the Security Operations Center (SOC) team and is responsible for monitoring a large, complex enterprise technology ecosystem, detecting, analyzing, and investigating information security events within that ecosystem, and responding to information security incidents to ensure the protection of SNHU's mission critical technology resources and institutional information.

The SOC team analyzes events from multiple sources from across all university technology resources including networks, applications, and other assets.

The critical duties and responsibilities of the SOC team must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work, and/or require work during non-business hours.

You will work 100% remotely from any of our approved working states.

What You'll Do

  • Be an initial evaluation point for all security-related tickets that come into the team's multiple queues (including triage, containment, and remediation).
  • Understand the basic incident response lifecycle.
  • Excel at documentation and detailed notetaking, including SOP writing, incident reporting, email and instant messaging etiquette, and most importantly, documenting incident actions.
  • Collect and analyze log data from complex, virtualized, multi-site computing environments and SNHU's technology ecosystem.
  • Conduct real-time monitoring of security events from multiple sources and use analytical and problem-solving skills to identify, triage, analyze, investigate, and escalate information security events and alerts.
  • Analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
  • Perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
  • Perform investigation and escalation for complex or high severity security threats or incidents.
  • Coordinate information security incident response according to SNHU's Information Security Incident Response Plan.
  • Communicate with partners, in a non-technical manner, at all organizational levels as part of incident response and remediation activities.
  • Design and implement or monitor information security incident remediation plans.
  • Design and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
  • Design, deploy, and manage detections and alerts for specific or common threat conditions.
  • Design and implement standard operational processes for handling common incident types.
  • Maintain automation scripts and other tools to enhance security operations efficiency.
  • Familiarity with enterprise security tools like Splunk, Tenable, Proofpoint tools, Microsoft Defender components, Office 365 tools, PowerShell, and multiple network tools.
  • Demonstrate a deep source of ethics, integrity, and confidentiality.
  • Can remain calm and function at the highest level during a crisis.
  • Remain up to date on latest threat intelligence.
  • Develop strategies and solutions that improve or mitigate the risks associated with these threats.
  • Work cross-functionally across ITS and all SNHU departments to provide guidance, and technical implementations to include triage, containment, and remediation when applicable.
  • Provide customer support according to SNHU's Core Values and understand how and when to escalate potential issues.
  • Help with risk management, vulnerability management, security assessment, auditing, and security authorization projects, as directed by the university's Information Security Management team.
  • Provide mentoring to junior analysts.
  • Other responsibilities as assigned.

What We're Looking For

  • 5+ years experience in information technology or Cyber Security Operations.
  • 2+ years working in a security operations center (SOC), a cybersecurity operations center or on a cybersecurity incident response team.
  • Professional Certifications like: ISC2 CISSP Certification, SANS GIAC, GSEC, GCIH, GCFA, GCDA, GMON, GCED, GSOC or other relevant industry certification.
  • Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, Windows/Linux operating system logs, network scanners, log aggregation tools, Endpoint Detection and Response (EDR) tools, and other platforms in the environment that enable enterprise-wide security monitoring.
  • Experience with MITRE ATT&CK framework.

We believe real innovation comes from inclusion - where different experiences, perspectives and talents are celebrated. So if you're wondering whether SNHU is right for you, take the leap and apply. You might be just the person we're looking for.

Compensation

The annual pay range for this position is $94,130.00 - $150,634.00. Actual offer will be based on skills, qualifications, experience and internal equity, in addition to relevant business considerations. We expect this position to be hired in the following target hiring range $104,012.00 - $140,723.00.

Exceptional Benefits (because You’re Exceptional)

You’re the whole package. Your benefits should be, too. As a full-time employee at SNHU, you’ll get:

  • High-quality, low-deductible medical insurance
  • Low to no-cost dental and vision plans
  • 5 weeks of paid time off (plus almost a dozen paid holidays)
  • Employer-funded retirement
  • Free tuition program
  • Parental leave
  • Mental health and wellbeing resources


Similar Jobs

Explore other opportunities that match your interests

Senior Cybersecurity Analyst

Cyber Security
3h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

cyber focus ai

United State

Lead IT Security Engineer

Cyber Security
3h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Stefanini Group

United State

Network Information Security Engineer

Cyber Security
8h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Lakeview Loan Servicing, LLC.

United State

Subscribe our newsletter

New Things Will Always Update Regularly