University of Kansas - Kansas City, KS

posted 13 days ago

Full-time - Mid Level
Kansas City, KS
Educational Services

About the position

The Information Security Analyst II at the KITS Information Security Fusion Center is responsible for implementing and evolving a comprehensive information security program. This role focuses on detecting, preventing, and remediating information and cyber security threats to the organization. The analyst will work closely with team members to analyze security events, maintain security systems, and ensure compliance with security requirements.

Responsibilities

  • Create, tailor, and audit security baselines for operating systems and applications.
  • Certification of systems and applications to ensure compliance with KUMC security requirements.
  • Maintain and update security systems and tools.
  • Perform real-time security log and event analysis and take action to contain and mitigate IS threats.
  • Review and analyze security events, determine their severity, and author reports detailing the activity including root cause analysis.
  • Coordinate and complete IS operations and process documentation.
  • Develop and execute approaches to ensure security requirements are achieved.
  • Report detected elements concerning identified or residual risk, vulnerabilities, and other security exposures to IS leadership.
  • Complete risk reviews for security exceptions and new technologies.
  • Inform, assist, and train IS team members and customers with security requests, exceptions, products, and procedures.
  • Monitor reports and security logs for unusual events and investigate as needed.
  • Identify new or emerging IS threats, evaluate the organizational impact, and recommend actions to mitigate.
  • Practice critical thinking to identify potential security incidents or disasters and work with the IS team to reduce their likelihood.
  • Develop and improve relationships and communications with OIS customers and partners.
  • Communicate and act in a professional manner through written and verbal means.
  • Operate as a backup to other IS Analysts when needed.
  • Participate in after-hours upgrades, troubleshooting, and on-call schedule.

Requirements

  • Bachelor's degree in information security, computer science, engineering, telecommunications, systems administration, or a related technical field.
  • Two or more years of progressive work experience in information/cyber security.
  • Demonstrated knowledge of compliance standards and regulations such as HIPAA, FERPA, GLBA, PCI DSS, NIST, and others.
  • One or more of the following certifications: CompTIA Network+, CompTIA Security+, (ISC)2 SSCP, EC-Council ECSA, or earn within the first year of employment.

Nice-to-haves

  • Experience configuring and securing MacOS and applications.
  • Experience writing and maintaining rules for network firewalls such as Cisco or Palo Alto.
  • Experience operating, maintaining, and rule writing within a commercially available SIEM technology.
  • Experience with implementing, operating, maintaining, or supporting data loss prevention (DLP) technologies.
  • Experience completing risk assessments and related documentation.
  • Experience with multiple networking architectures, topologies, practices, and technologies.

Benefits

  • Paid jury duty
  • Paid parental leave
  • Paid holidays
  • Disability insurance
  • Health insurance
  • Dental insurance
  • Paid time off
  • Vision insurance
  • Life insurance
  • 403(b) retirement plan
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service