Cyber Security Analyst
Remote, US | Philadelphia, Pennsylvania, US
Full Time Entry-level / Junior USD 75K - 95K
Susan G. Komen
Susan G. Komen addresses breast cancer on multiple fronts in order to make the biggest impact against this disease. Join our fight!WHO WE ARE!
Susan G. Komen brings a home office based working environment for each specified local community. We are a force united by a promise to end breast cancer forever. For over 40 years, we have led the way funding groundbreaking research, community health initiatives and advocacy programs in local communities across the U.S. and in more than 30 countries. Susan G. Komen is the ONLY organization that addresses breast cancer on multiple fronts such as research, community health, outreach, and public policy initiatives to make the biggest impact against this disease.
Komen strives to have a culture of passionate, growth-minded professionals who thrive in a team environment and work collaboratively to inspire greatness in others! We take an ongoing approach to ensure open communication from all levels throughout the organization. It is encouraged to give and receive feedback to ensure two-way accountability with a focus on continual improvement both personally and professionally!
What you'll be doing in the role of a Cyber Security Analyst
The Cyber Security Analyst is a member of the IT Department. The Cyber Security Analyst protects systems, hardware, applications, services, and networks from threat actors globally. The analyst's primary role is to understand the organization’s IT infrastructure in detail, monitor and identify malicious activity, identify vulnerabilities, maintain compliance obligations, and evaluate threats.
What you will bring to the table
The primary objective of the Cyber Security Analyst is to support Susan G. Komen in achieving our overall Vision and Mission by:
- Maintaining compliance obligations associated with HIPAA, Payment Card Industry, Center for Internet Security, and the Cloud Security Alliance.
- Monitor and analyze events and alerts of systems, services, and infrastructure.
- Implement and administer endpoint protection services.
- Participate in web application and infrastructure penetration testing.
- Subject matter expert in integrating various security controls and technologies.
- Support efforts relating to compliance and assessments.
- Participate in Disaster Recovery, Business Continuity, and Incident Response planning and operations.
- Perform vulnerability scanning and prioritize and assign remediation tasks.
- Prepare reports and metrics.
- Create and maintain procedures, activities, and user guides.
- Configure and administer firewalls and associated services.
- Comprehend and contribute to Security Operation Center objectives.
- Evaluate proposed technologies to identify associated risks and controls.
- Administer Awareness Initiatives through user training, workshops, and phishing campaigns.
- Contribute to the development of controls as well as the overall Information Security program.
- Remain current on emerging threats, technologies, frameworks/ compliance, and methods.
- All other duties as assigned.
We already know you will also have
- Bachelor’s Degree: Information Systems, Computer Science, or related field.
- Minimum of 5-7 years of experience.
- Knowledge of cybersecurity principles, incident detection, analysis, and response methods.
- Advanced knowledge of Windows, Linux, mac, and android operating systems and supporting infrastructure and cloud services.
- Knowledge of security architectures, firewalls, proxies, protocols, and network infrastructure.
- Experience with configuring and utilizing Security Information Event Management platforms.
- Basic scripting or development experience.
- Ability to use communication skills, both verbal and written, to present complex technical information to non-technical stakeholders.
- Comprehension of Incident Response, Disaster Recovery, and Business Continuity concepts.
- Ability to utilize and analyze the results of security and assessment tools.
And we would love if you also have
- Technical certifications: CISSP, CISM, GCIH, Microsoft Operating Programs
So, what's in it for you?
Komen believes in the importance of taking care of our employees so that in turn they can be committed to supporting our critical mission to support those impacted by breast cancer and to help find cures. This is what Komen provides away from the computer:
- Competitive salary $75,000 to $95,000/annual, exact compensation ranges are based on a range of factors including the labor market, job level, internal equity, and budget. Exact salary offers will be determined by factors such as the candidate's skills, experience, and geographic location.
- Health, dental, vision and a retirement plan with a 6% employer match
- Generous Paid Time Off plan
- Flexible work arrangement in a fully remote working environment
- Bi-weekly work from home stipend
- Parental leave
- Tuition Reimbursement
- A culture of learning and development
- And so much more!
Komen provides a remote and/or home-based working environment for all active employees. Komen defines remote as the ability to work from any physical location within the U.S. where an employee can perform specified work duties without disruption or distraction. Komen defines home-based roles as positions that are required to reside in a specific market. Work schedules for both remote and home based are determined by the organizational needs of each department.
Susan G. Komen is fair and equal in all its employment practices for persons without regard to age, race, color, religion, gender, national origin, disability, veteran status, or sexual orientation. Additionally, we embrace Diverse Teams & Perspective, and we find strength in the diversity of cultural backgrounds, ideas, and experiences.
SORRY NO AGENCIES
#LI-REMOTE
The physical location for the candidate selected must be within the contiguous United States. In the event a move is expected to occur by the candidate selected, it must be approved by Komen's HR team prior to the move.
Tags: Android Business Intelligence CISM CISSP Cloud Compliance Computer Science Firewalls GCIH HIPAA Incident response IT infrastructure Linux Pentesting Scripting Vulnerabilities Windows
Perks/benefits: Career development Competitive pay Equity Flex hours Flex vacation Health care Home office stipend Parental leave Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs