Cyber Security Analyst

Remote, US | Philadelphia, Pennsylvania, US

Susan G. Komen

Susan G. Komen addresses breast cancer on multiple fronts in order to make the biggest impact against this disease. Join our fight!

View company page


Susan G. Komen brings a home office based working environment for each specified local community. We are a force united by a promise to end breast cancer forever. For over 40 years, we have led the way funding groundbreaking research, community health initiatives and advocacy programs in local communities across the U.S. and in more than 30 countries. Susan G. Komen is the ONLY organization that addresses breast cancer on multiple fronts such as research, community health, outreach, and public policy initiatives to make the biggest impact against this disease.

Komen strives to have a culture of passionate, growth-minded professionals who thrive in a team environment and work collaboratively to inspire greatness in others! We take an ongoing approach to ensure open communication from all levels throughout the organization. It is encouraged to give and receive feedback to ensure two-way accountability with a focus on continual improvement both personally and professionally!

What you'll be doing in the role of a Cyber Security Analyst

The Cyber Security Analyst is a member of the IT Department.  The Cyber Security Analyst protects systems, hardware, applications, services, and networks from threat actors globally. The analyst's primary role is to understand the organization’s IT infrastructure in detail, monitor and identify malicious activity, identify vulnerabilities, maintain compliance obligations, and evaluate threats. 

What you will bring to the table 

The primary objective of the Cyber Security Analyst is to support Susan G. Komen in achieving our overall Vision and Mission by:

  • Maintaining compliance obligations associated with HIPAA, Payment Card Industry, Center for Internet Security, and the Cloud Security Alliance.
  • Monitor and analyze events and alerts of systems, services, and infrastructure.
  • Implement and administer endpoint protection services.
  • Participate in web application and infrastructure penetration testing.
  • Subject matter expert in integrating various security controls and technologies.
  • Support efforts relating to compliance and assessments.
  • Participate in Disaster Recovery, Business Continuity, and Incident Response planning and operations.
  • Perform vulnerability scanning and prioritize and assign remediation tasks.
  • Prepare reports and metrics.
  • Create and maintain procedures, activities, and user guides.
  • Configure and administer firewalls and associated services.
  • Comprehend and contribute to Security Operation Center objectives.
  • Evaluate proposed technologies to identify associated risks and controls.
  • Administer Awareness Initiatives through user training, workshops, and phishing campaigns.
  • Contribute to the development of controls as well as the overall Information Security program.
  • Remain current on emerging threats, technologies, frameworks/ compliance, and methods.
  • All other duties as assigned.

We already know you will also have

  • Bachelor’s Degree: Information Systems, Computer Science, or related field. 
  • Minimum of 5-7 years of experience.
  • Knowledge of cybersecurity principles, incident detection, analysis, and response methods.
  • Advanced knowledge of Windows, Linux, mac, and android operating systems and supporting infrastructure and cloud services.
  • Knowledge of security architectures, firewalls, proxies, protocols, and network infrastructure.
  • Experience with configuring and utilizing Security Information Event Management platforms.
  • Basic scripting or development experience.
  • Ability to use communication skills, both verbal and written, to present complex technical information to non-technical stakeholders.
  • Comprehension of Incident Response, Disaster Recovery, and Business Continuity concepts.
  • Ability to utilize and analyze the results of security and assessment tools.

And we would love if you also have

  • Technical certifications: CISSP, CISM, GCIH, Microsoft Operating Programs

So, what's in it for you?

Komen believes in the importance of taking care of our employees so that in turn they can be committed to supporting our critical mission to support those impacted by breast cancer and to help find cures.  This is what Komen provides away from the computer: 

  • Competitive salary $75,000 to $95,000/annual, exact compensation ranges are based on a range of factors including the labor market, job level, internal equity, and budget. Exact salary offers will be determined by factors such as the candidate's skills, experience, and geographic location.
  • Health, dental, vision and a retirement plan with a 6% employer match
  • Generous Paid Time Off plan
  • Flexible work arrangement in a fully remote working environment
  • Bi-weekly work from home stipend
  • Parental leave
  • Tuition Reimbursement
  • A culture of learning and development
  • And so much more!

Komen provides a remote and/or home-based working environment for all active employees. Komen defines remote as the ability to work from any physical location within the U.S. where an employee can perform specified work duties without disruption or distraction.  Komen defines home-based roles as positions that are required to reside in a specific market. Work schedules for both remote and home based are determined by the organizational needs of each department.  

 Susan G. Komen is fair and equal in all its employment practices for persons without regard to age, race, color, religion, gender, national origin, disability, veteran status, or sexual orientation. Additionally, we embrace Diverse Teams & Perspective, and we find strength in the diversity of cultural backgrounds, ideas, and experiences. 



The physical location for the candidate selected must be within the contiguous United States. In the event a move is expected to occur by the candidate selected, it must be approved by Komen's HR team prior to the move.


Apply now Apply later
  • Share this job via
  • or

Tags: Android Business Intelligence CISM CISSP Cloud Compliance Computer Science Firewalls GCIH HIPAA Incident response IT infrastructure Linux Pentesting Scripting Vulnerabilities Windows

Perks/benefits: Career development Competitive pay Equity Flex hours Flex vacation Health care Home office stipend Parental leave Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  164  43  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.