Information Security Analyst 3, Digital Technology Solutions
Cincinnati, OH, US
University of Cincinnati
Explore the University of Cincinnati, where cooperative education (Co-Op) was founded over 100 years ago. Where we fuel entrepreneurship with experiential learning through research and innovation. Home to nationally ranked Carl H. Lindner...Current UC employees must apply internally via SuccessFactors
Founded in 1819, the University of Cincinnati ranks among the nation’s best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls “the most ambitious campus design program in the country.”
With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC’s momentum has never been stronger. UC’s annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion.
Job Overview
Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
Essential Functions
- Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
- Help facilitate large collaborative teams to achieve organizational goals.
- Support community communication efforts, presenting security insights to leadership.
- Develop technical documentation (designs, specifications, processes, workflows) and communications.
- Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
- Participate in multiple, moderate- to high-risk projects.
- Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
- Share technical knowledge with teammates and help solve more complex problems.
- Document individual progress on assigned deliverables.
- Gather, maintain, and validate metrics for area of responsibility.
- Mentor student workers and junior employees.
- Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
- Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
- Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
- Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
- Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
- Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
- Provide guidance and technical expertise as needed for information security training and awareness programs.
- Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
- Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
- Serve as an expert resource to others.
- Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
- Two (2) years of related experience
- Advanced knowledge of security tool administration.
- Moderate project management skills.
- Experience with system administration.
- Experience with network architecture or some level of related technical training.
- Advanced understanding of risk and vulnerability management.
- Experience with incident response.
- Advanced knowledge of industry standard security and compliance frameworks.
Additional Qualifications Considered
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, make recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers.2. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Physical Requirements/Work Environment
- Sitting - Continuously
- Repetitive hand motion (such as typing) - Continuously
- Hearing, listening - Continuously
- Talking - Continuously
- Standing - Seldom
- Walking - Seldom
- Bending - Seldom
- Stooping - Seldom
- Climbing stairs/ladders - Seldom
- Kneeling, squatting - Seldom
- Crouching - Seldom
- Crawling - Seldom
- Reaching overhead - Seldom
- Pulling, pushing - Seldom
- Lifting - up to 20 pounds - Seldom
- Lifting - up to 50 pounds - Seldom
- Lifting - over 50 pounds - Seldom
Compensation and Benefits
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
- Competitive salary range dependent on the candidate's experience.
- Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
- Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
- Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
- Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
- Tuition remission is available for employees and their eligible dependents.
- Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
To learn more about why UC is a great place to work, please visit our careers page at https://www.uc.edu/careers.html.
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at jobs@uc.edu.
The University of Cincinnati is an Equal Opportunity Employer.
REQ: 97772
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits CISM CISSP Compliance Computer Science Governance Incident response Monitoring Risk management Vulnerabilities Vulnerability management
Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Gear Health care Insurance Medical leave Parental leave Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.