Southern New Hampshire University seeks an Information Security Analyst II to join their Security Operations Center (SOC) team. This role involves monitoring, detecting, analyzing, and responding to security events within a large enterprise ecosystem. The position requires 5+ years of IT/Cybersecurity experience and 2+ years in a SOC or incident response role.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Southern New Hampshire University is a team of innovators. World changers. Individuals who believe in progress with purpose. Since 1932, our people-centered strategy has defined us — and helped us grow a team that now serves over 180,000 learners worldwide.
Our mission to transform lives is made possible by talented people who bring diverse industry experience, backgrounds and skills to the university. And today, we're ready to expand our reach. All we need is you.
Make an impact — from near or far
At SNHU, you'll have the option to work remotely in the following states: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.
We ask that our remote employees have access to a reliable internet connection and a dedicated, properly equipped workspace that is free of distractions. Employees must reside in, and work from, one of the above approved states.
The opportunity
The Information Security Analyst II will report directly to the Director of Information Security Operations. As an Information Security Analyst II, you will be a senior member of the Security Operations Center (SOC) team and is responsible for monitoring a large, complex enterprise technology ecosystem, detecting, analyzing, and investigating information security events within that ecosystem, and responding to information security incidents to ensure the protection of SNHU's mission critical technology resources and institutional information.
The SOC team analyzes events from multiple sources from across all university technology resources including networks, applications, and other assets.
The critical duties and responsibilities of the SOC team must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work, and/or require work during non-business hours.
You will work 100% remotely from any of our approved working states.
What You'll Do
- Be an initial evaluation point for all security-related tickets that come into the team's multiple queues (including triage, containment, and remediation).
- Understand the basic incident response lifecycle.
- Excel at documentation and detailed notetaking, including SOP writing, incident reporting, email and instant messaging etiquette, and most importantly, documenting incident actions.
- Collect and analyze log data from complex, virtualized, multi-site computing environments and SNHU's technology ecosystem.
- Conduct real-time monitoring of security events from multiple sources and use analytical and problem-solving skills to identify, triage, analyze, investigate, and escalate information security events and alerts.
- Analyze digital evidence to identify indicators of compromise, adversary activity, root cause, incident timelines, and attack vector(s).
- Perform incident response activities like endpoint isolation, malware remediation, forensic analysis, malware analysis, community member interviews, and network traffic analysis.
- Perform investigation and escalation for complex or high severity security threats or incidents.
- Coordinate information security incident response according to SNHU's Information Security Incident Response Plan.
- Communicate with partners, in a non-technical manner, at all organizational levels as part of incident response and remediation activities.
- Design and implement or monitor information security incident remediation plans.
- Design and manage security tools (e.g. Splunk, Halcyon, Microsoft Defender, Tenable).
- Design, deploy, and manage detections and alerts for specific or common threat conditions.
- Design and implement standard operational processes for handling common incident types.
- Maintain automation scripts and other tools to enhance security operations efficiency.
- Familiarity with enterprise security tools like Splunk, Tenable, Proofpoint tools, Microsoft Defender components, Office 365 tools, PowerShell, and multiple network tools.
- Demonstrate a deep source of ethics, integrity, and confidentiality.
- Can remain calm and function at the highest level during a crisis.
- Remain up to date on latest threat intelligence.
- Develop strategies and solutions that improve or mitigate the risks associated with these threats.
- Work cross-functionally across ITS and all SNHU departments to provide guidance, and technical implementations to include triage, containment, and remediation when applicable.
- Provide customer support according to SNHU's Core Values and understand how and when to escalate potential issues.
- Help with risk management, vulnerability management, security assessment, auditing, and security authorization projects, as directed by the university's Information Security Management team.
- Provide mentoring to junior analysts.
- Other responsibilities as assigned.
Interested in remote work opportunities in Cyber Security? Discover Cyber Security Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- 5+ years experience in information technology or Cyber Security Operations.
- 2+ years working in a security operations center (SOC), a cybersecurity operations center or on a cybersecurity incident response team.
- Professional Certifications like: ISC2 CISSP Certification, SANS GIAC, GSEC, GCIH, GCFA, GCDA, GMON, GCED, GSOC or other relevant industry certification.
- Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, Windows/Linux operating system logs, network scanners, log aggregation tools, Endpoint Detection and Response (EDR) tools, and other platforms in the environment that enable enterprise-wide security monitoring.
- Experience with MITRE ATT&CK framework.
Compensation
The annual pay range for this position is $94,130.00 - $150,634.00. Actual offer will be based on skills, qualifications, experience and internal equity, in addition to relevant business considerations. We expect this position to be hired in the following target hiring range $104,012.00 - $140,723.00.
Exceptional Benefits (because You’re Exceptional)
You’re the whole package. Your benefits should be, too. As a full-time employee at SNHU, you’ll get:
- High-quality, low-deductible medical insurance
- Low to no-cost dental and vision plans
- 5 weeks of paid time off (plus almost a dozen paid holidays)
- Employer-funded retirement
- Free tuition program
- Parental leave
- Mental health and wellbeing resources
Similar Jobs
Explore other opportunities that match your interests
cyber focus ai
Lead IT Security Engineer
Stefanini Group