CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Jobs

ITW – IT Security Analyst

Reading Time: 3 mins read
in Jobs

 

Job Description (from the job posting): 

While this is not a work-from-home employment opportunity, there will be occasional remote work flexibility.  You will be welcomed to a friendly and supportive work environment.

Do your Information Technology interests run deeper than that of an application developer, or software maintenance coder? Do you like to know how and why things work behind the scenes, and how everything is interrelated?  Are you interested in working with Cybersecurity, Local and Wide Area Networking, Windows Servers and Virtualization, Remote Access / Remote Control solutions, VoIP telephony, and Mobile Device Management?

Do you have the confidence and patience to calmly assist and guide end-users and teammates through technical challenges?

Are you a self-motivated team player, with integrity and a strong work ethic?

If so, then you might be a good fit for the missing piece of our experienced IT Infrastructure Team.

The IT Infrastructure Security Analyst reports to the Information Technology Manager as a member of the IT Infrastructure Team. You will work closely with IT Infrastructure teammates to provide Networking/Telephony/Cybersecurity experience and support where needed or directed. You will interact with all levels of management and other ITW-FEG personnel. You must have patience, excellent interpersonal skills, strong ethics, and present a positive professional attitude.

 

Primary Focus and Responsibilities

  • Reporting Analysis and Vulnerability Remediation.  Regularly monitor endpoint vulnerability scan results, comparing to prior scans.  Identify and remediate newly discovered Critical Vulnerabilities.  Identify and report on trends and/or anomalies.
  • Administer policy groups to ensure proper Endpoint Protection.  Ensure that all client computers have up-to-date software components.  Ensure that newly added computers do not remain in the Default Policy.  Support the Help Desk when they have technical questions/issues with the implementation of the Endpoint Protection software solution.
  • Monitor and manage our companywide endpoint inventory and update/patching tool to ensure all Sales and Marketing computers are identified and have required updates applied to protect against emerging threats.
  • Review/analyze reported Malware and Phishing incidents.  Remove Phishing emails from our Office 365 Tenant.  Remediate/remove Malware when discovered or reported.  Communicate and coordinate with the ITW Corporate Cybersecurity Team as appropriate.
  • Keep abreast of new security issues and the methods to protect against them.  Proactively implement security protections/solutions.  Leverage the use of SIEM (Security Information and Event Management) tools to monitor and report on our IT Infrastructure.
  • Assist and provide backup network support by proactively investigating and learning our unique networking infrastructure. Will work with both Local and Wide Area Networking, VLANS, a spoke-and-hub SD-WAN VPN configuration, client VPN, switches, network routing, Primary, Secondary and Tertiary Internet circuits, our VoIP system, and our various firewalls.

 

US Located Required:  Yes

Location: Troy, OH

Schedule: Full time

Salary: USD 48K – 62K

 

Apply Now

Tags: Entry-level PositionIn PersonIT Security AnalystITWJobsOhioUnited States
ADVERTISEMENT

Related Posts

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

January 12, 2023
XOR Security – Cyber Hunt/Deception Operations SME

XOR Security – Cyber Hunt/Deception Operations SME

January 12, 2023
Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
Metropolitan Transportation Commission – Information Security Analyst

Metropolitan Transportation Commission – Information Security Analyst

January 12, 2023

More Articles

Alerts

Multiple CVEs – Vulnerabilities in IBM Java Runtime affect IBM Integration Designer

February 24, 2021
Document

A How to Guide for MFA (Cheat sheet)

March 7, 2022
Alerts

Adobe security advisory (AV22-386)

July 12, 2022
Course

Identity & Access Management – Azure Active Directory – 2021

January 21, 2022
Alerts

BEC scammers impersonate CEOs on virtual meeting platforms

February 21, 2022
Course

API SECURITY – Course

April 21, 2022
Incidents

Ransomware Suspected in Wiltshire Farm Foods Attack

June 30, 2022
Meme

What the hell is this?

November 18, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.