Role Summary
Glocomms is looking for a Cybersecurity Analyst interested in joining an innovative medical equipment manufacturer to support it's IT and security operations. This role combines technical support, risk management, and employee education to strengthen our cybersecurity posture and promote a culture of security across the organization. This is a great fit for someone who enjoys both hands-on work and program coordination.
Key Responsibilities
Security Operations
- Support daily monitoring, incident response, and vulnerability management.
- Help manage tools for endpoint protection, logging, email security, and access control.
- Assist with security projects like patching, encryption, and policy enforcement.
Access & Identity Management
Contribute to improving identity and access practices.Support role-based and Just-In-Time access implementations.Lead initiatives aligned with Zero Trust principles.Participate in account and privilege reviews.Employee Awareness & Training
Develop and run cybersecurity training and phishing simulations.Provide onboarding and ongoing education for staff.Act as a resource for employee cybersecurity questions.Risk & Resilience
Maintain business continuity and disaster recovery plans.Facilitate tabletop exercises and document improvements.Collaborate with teams to identify and reduce operational risks.Support documentation for audits, insurance, and customer requirements.Governance & Reporting
Help draft and update cybersecurity policies.Track training compliance, incidents, and risk metrics.Stay informed on emerging threats and recommend improvements.Coordinate with vendors and internal teams on security tools and projects.Qualifications
Required
Bachelor's degree in Cybersecurity, IT, or related field.2+ years of experience in IT or cybersecurity.Strong communication skills, especially with non-technical audiences.Familiarity with Zero Trust, MFA, and identity tools.Knowledge of phishing, endpoint protection, and threat mitigation.Organized and detail-oriented.Preferred
Security certifications (e.g., Security+, SSAP, GSEC).Experience with IAM tools (e.g., Azure AD, Okta, Duo).Familiarity with phishing platforms (e.g., Mimecast, KnowBe4).Background in business continuity and disaster recovery.Exposure to frameworks like NIST, ISO 27001, or CIS Controls.Experience in manufacturing or regulated environments.