IT Information Security Analyst

Birmingham, AL, US, 35222

Birmingham Water Works

View company page

Job Information

Job Title: Information Security Analyst

Department: Information Technology

Reporting Relationship: IT Manager

FLSA Status: Exempt

Grade: M


General Responsibilities

Responsible for constantly detecting and preventing cyber threats to the company computing environment. Identify weaknesses of the company computing infrastructure (software, hardware, networks) and find creative ways to protect it. Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Ensure appropriate security controls are in place to safeguard digital files and vital electronic infrastructure. Serves as an internal company lead for responding to business-impacting computer security breaches and viruses. Night and weekend hours as needed.

Essential Job Functions

  1. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  2. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  3. Plan, implement and upgrade security measures and controls.
  4. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and destruction.
  5. Maintain data and monitor security access.
  6. Perform vulnerability testing, risk analyses and security assessments.
  7. Perform risk assessments and execute tests of the data processing system to ensure the functioning of data processing activities and security measures.
  8. Conduct internal security audits.

Essential Job Functions Con't

  1. Anticipate security alerts, incidents, and disasters and reduce their likelihood.
  2. Collaborate technically with the infrastructure team to manage the network, intrusion detection, prevention systems and encryption measures.
  3. Analyze security breaches to determine the root cause.
  4. Recommend and install appropriate tools and countermeasures.
  5. Define, implement, and maintain corporate security policies.
  6. Collaborate with the appropriate BWW areas to train fellow employees in security awareness and procedures.
  7. Coordinate security plans with outside vendors.

Essential Job Functions Con't

  1. Respond to eDiscovery, data collection queries, and digital forensics requests.
  2. Work an on-call rotating schedule outside the regular schedule on a rotating basis.
  3. Maintain and protect sensitive and private information by keeping employee records confidential in accordance with HIPAA, local, state and federal laws and regulations.
  4. Ensures that PHI/ePHI of employees, plan participants, patients, and other assigned individuals are maintained and transmitted securely and legally.
  5. Perform all work safely in accordance with established safety policies and procedures. Comply with all safety and health standards and guidelines issued by management.
  6. Perform other duties as assigned.


Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field required.


Five (5) years of experience, specifically in a security analyst job required.

    • Penetration testing and vulnerability testing & remediation
    • Anti-virus and anti-malware
    • TCP/IP, computer networking, routing and switching
    • Firewalls, proxies, IDS, IPS, and security appliances
    • Windows and Linux operating systems
    • Network protocols and packet analysis tools
    • Comprehension of development & scripting languages (C#, VB, Python, C, .NET)
    • Cloud computing

Certificates, Licenses, Registrations:

    • Valid driver’s license required
    • The following certifications are highly preferred:
      • CEH Certified Ethical Hacker
      • ECSA EC-Council Certified Security Analyst



Physical Demands

    • Ability to stand, walk or sit for extended periods
    • Reaching by excreting hand(s) or arms(s) in any direction
    • Finger dexterity is required to manipulate objects with fingers rather than with whole hand(s) or arm(s), for example, using a keyboard
    • Communication skills using the spoken word
    • Ability to see within normal parameters
    • Ability to hear within normal parameters
    • Ability to move about

Ability to lift 25 pounds

Work Enviroment

    • Moderate noise (business office)
    • Night and weekend hours as needed
    • Exposed to cold temperatures in the data center
    • Occasionally visit job sites, in plants and outdoors, exposed to extreme hot/cold/wet weather conditions
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits C CEH Cloud Computer Science Driver’s license ECSA Encryption Firewalls Forensics HIPAA IDS Intrusion detection IPS Linux Malware Pentesting Python Risk assessment Scripting Security assessment TCP/IP Windows

Region: North America
Country: United States
Job stats:  23  2  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.