Information Security Analyst

May 9, 2025
Application ends: August 9, 2025

Apply for this job

Email *

Job Description

Role Overview

We’re seeking an Information Security Analyst with hands-on experience defending hybrid cloud environments and a practical understanding of both technical controls and regulatory requirements. This role involves real-time monitoring, incident response, and the implementation of controls aligned with NIST 800-53, CIS Controls, and ISO 27001.

You’ll be the point of contact for all security event investigations, working closely with the DevOps, Infrastructure, and Legal teams to mitigate threats, enforce policy, and maintain audit readiness.


Key Responsibilities

  • Monitor and analyze activity from SIEM (we use Sentinel), EDR (CrowdStrike), and vulnerability scanners (Tenable.io) for signs of compromise or misconfiguration.
  • Correlate alerts and logs across cloud (Azure, AWS) and on-prem systems to triage and escalate incidents in under 30 minutes.
  • Develop and fine-tune detection rules in Sentinel and Azure Defender based on evolving TTPs from MITRE ATT&CK.
  • Conduct deep-dive forensic analysis on affected endpoints and coordinate containment efforts in partnership with IT.
  • Act as compliance lead for SOC 2 Type 2 and HIPAA security controls; gather evidence, review access logs, and maintain policy documentation.
  • Perform routine privilege audits in Okta, Azure AD, and key SaaS tools, flagging and revoking stale admin access.
  • Participate in red/blue team exercises quarterly, contributing to purple team refinement of detection gaps.
  • Implement and validate infrastructure hardening scripts using Ansible and Terraform.
  • Draft post-incident reports and lead technical debriefs with cross-functional teams.

Required Skills and Qualifications

  • 3–5 years in an InfoSec role with incident response or threat hunting experience.
  • Strong working knowledge of Sentinel or Splunk, and EDR platforms (ideally CrowdStrike or SentinelOne).
  • Familiarity with interpreting and writing detection rules using KQL or SPL.
  • Demonstrated experience conducting root cause analysis on security incidents across hybrid environments.
  • Hands-on experience with infrastructure-as-code, ideally Terraform and Azure Resource Manager templates.
  • Understanding of compliance frameworks: SOC 2, HIPAA, and practical application of NIST and CIS controls.
  • Working knowledge of OAuth2, SAML, and SCIM provisioning within identity platforms like Okta.
  • Comfortable with scripting in Python or PowerShell for automating repetitive security tasks.

Are you interested in this position?

Apply by clicking on the “Apply Now” button below!

#GraphicDesignJobsOnline#WebDesignRemoteJobs #FreelanceGraphicDesigner #WorkFromHomeDesignJobs #OnlineWebDesignWork #RemoteDesignOpportunities #HireGraphicDesigners #DigitalDesignCareers#Dynamicbrandguru