IT Security Analyst

Troy, OH, United States

Applications have closed

ITW

Find out why our decentralized business model, customer-back innovation and support of our colleagues and community give us the competitive advantage.

View company page

Company Description

At ITW Food Equipment Group/Hobart, people and food are our passion. We believe great food brings people together, and the relationships we share feed our inspiration to be the best we can be for one another.

Our family of premium brands has been dedicated for more than a century to supporting those who are not only passionate about creating great food, but are inspired by the people they serve and come to know on a daily basis.

Likewise, it is our mission to provide food equipment that foodservice and food retail professionals can trust to work hard and deliver quality, consistent results day in and day out, empowering them to focus on what they love most—creating great food for great people.

Job Description

About this Position

While this is not a work-from-home employment opportunity, there will be occasional remote work flexibility.  You will be welcomed to a friendly and supportive work environment. 

Do your Information Technology interests run deeper than that of an application developer, or software maintenance coder? Do you like to know how and why things work behind the scenes, and how everything is interrelated?  Are you interested in working with Cybersecurity, Local and Wide Area Networking, Windows Servers and Virtualization, Remote Access / Remote Control solutions, VoIP telephony, and Mobile Device Management?

Do you have the confidence and patience to calmly assist and guide end-users and teammates through technical challenges? 

Are you a self-motivated team player, with integrity and a strong work ethic?

If so, then you might be a good fit for the missing piece of our experienced IT Infrastructure Team. 

The IT Infrastructure Security Analyst reports to the Information Technology Manager as a member of the IT Infrastructure Team. You will work closely with IT Infrastructure teammates to provide Networking/Telephony/Cybersecurity experience and support where needed or directed. You will interact with all levels of management and other ITW-FEG personnel. You must have patience, excellent interpersonal skills, strong ethics, and present a positive professional attitude.

 

Primary Focus and Responsibilities

  • Reporting Analysis and Vulnerability Remediation.  Regularly monitor endpoint vulnerability scan results, comparing to prior scans.  Identify and remediate newly discovered Critical Vulnerabilities.  Identify and report on trends and/or anomalies.
  • Administer policy groups to ensure proper Endpoint Protection.  Ensure that all client computers have up-to-date software components.  Ensure that newly added computers do not remain in the Default Policy.  Support the Help Desk when they have technical questions/issues with the implementation of the Endpoint Protection software solution.
  • Monitor and manage our companywide endpoint inventory and update/patching tool to ensure all Sales and Marketing computers are identified and have required updates applied to protect against emerging threats.
  • Review/analyze reported Malware and Phishing incidents.  Remove Phishing emails from our Office 365 Tenant.  Remediate/remove Malware when discovered or reported.  Communicate and coordinate with the ITW Corporate Cybersecurity Team as appropriate.
  • Keep abreast of new security issues and the methods to protect against them.  Proactively implement security protections/solutions.  Leverage the use of SIEM (Security Information and Event Management) tools to monitor and report on our IT Infrastructure.
  • Assist and provide backup network support by proactively investigating and learning our unique networking infrastructure. Will work with both Local and Wide Area Networking, VLANS, a spoke-and-hub SD-WAN VPN configuration, client VPN, switches, network routing, Primary, Secondary and Tertiary Internet circuits, our VoIP system, and our various firewalls.

 

Supervisory Responsibilities

This position does not have direct supervisory responsibilities; however, this position will be expected to lead by example as a teammate, collaborator, and future mentor to others.

Technical Areas of Engagement and Opportunity

Security

  • Support and help manage campus Firewalls to ensure the network perimeter defense can protect company assets. Implement updates/patches and configuration settings to defend against new and emerging threats.
  • Support and maintain the security profile for our IT Infrastructure using best practices and company provided tools, to ensure the protection of company assets, as well as our corporate reputation.  These tools include Firewalls, Vulnerability Detection systems, and an Endpoint Protection solution. 
  • Implement remediations for discovered Critical Vulnerabilities in a timely manner.

Networking

  • Support and help manage WAN, LAN/VLAN and VPN configurations and routing, including local and remote network switches.
  • Support and help manage the campus-wide wireless network.
  • Perform daily network monitoring, verifying the integrity and High Availability of network components and circuits.  Apply remediations and enhancements as required.
  • Develop, document and administer networking standards and procedures.
  • Identify areas for network infrastructure improvements and upgrades, including trend analysis and capacity planning.
  • Inventory and document network hardware use, including switch port assignments.
  • Provide support for campus-wide Identity Access Management and security cameras.

Telephony

  • Support and help manage a campus-wide and multi-city VoIP system that involves both VLAN and WAN connections.
  • Work with telecom hardware and circuit providers to troubleshoot issues, and to implement upgrades.

General Infrastructure

  • Provide direction and act as an escalation point for the Help Desk.
  • Develop and maintain installation and configuration procedures and associated documentation.
  • Research and recommend innovative, and where possible, automated approaches for system administration tasks.
  • Repair and recover from hardware or software failures.  Coordinate and communicate with impacted users.
  • Responsibilities might on occasion require working evenings and weekends, sometimes with little advance notice

 

Qualifications

Minimum Qualifications/Experience

  • Bachelors’ Degree in CS/MIS or related field and  a minimum of 4 years of relevant experience.
  • Experience managing VLANs
  • Experience managing Network Routing
  • Experience maintaining Firewalls
  • Experience maintaining Microsoft DHCP, DNS, LDAP
  • WAN and VPN management experience
  • Excellent troubleshooting and problem resolution skills
  • Effective oral, interpersonal, and written communication skills, including listening
  • Must be adaptable, flexible, organized and able to maintain composure
  • Must be able to make sound, logical judgments using deductive reasoning, attention to detail; understands the cause and effect of such decisions
  • Self-starter; works with minimal supervision
  • Knowledge of Microsoft Windows Server Environments, including virtualization
  • Knowledge of IP network infrastructures, troubleshooting and monitoring
  • Knowledge of Microsoft Active Directory security environment
  • Knowledge of network and Internet security environments

 

Preferred Qualifications/Experience

  • Experience maintaining Microsoft Active Directory
  • PowerShell usage and scripting
  • Experience using security tools to discover, then remediate, critical vulnerabilities
  • Experience managing Endpoint Protection
  • Experience managing Email Protection
  • Office 365 Experience (SharePoint, Teams, OneDrive, Outlook)
  • Technical experience working with Windows Server in a Virtualized environment
  • Technical experience working with Microsoft Azure
  • Some experience with Linux

Additional Information

Why work for us?

  • Competitive pay
  • Great insurance options with low premiums
  • Paid vacation and holidays
  • 401K with company match
  • Extensive on-the-job training
  • Safety-conscious work environment

 

ITW is an equal opportunity employer. We value our colleagues’ unique perspectives, experiences and ideas and create workplaces where everyone can develop their careers and perform to their full potential. 

As an equal employment opportunity employer, ITW is committed to equal employment opportunity and fair treatment for employees, beginning with the hiring process and continuing through all aspects of the employment relationship. 

All qualified applicants will receive consideration for employment without regard to race, color, sex, gender identity, sexual orientation, religion, national origin, age, disability, protected Veteran status or any other characteristic protected by applicable federal, state, or local laws.  

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Active Directory Azure DNS Firewalls IT infrastructure LDAP Linux Malware Monitoring PowerShell Scripting SharePoint SIEM VPN Vulnerabilities Windows

Perks/benefits: 401(k) matching Competitive pay Equity Flex hours Flex vacation Gear Insurance

Region: North America
Country: United States
Job stats:  51  8  1
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.