Search jobs > Seattle, WA > Information security

Information Security Analyst II

VirtualVocations
Seattle, Washington, United States
Full-time

A company is looking for an Information Security Analyst II to monitor and respond to information security events within a large enterprise technology ecosystem.

Key ResponsibilitiesMonitor security events and conduct real-time analysis to identify and respond to incidentsPerform incident response activities, including triage, containment, and remediation of security threatsDocument incident actions and develop strategies to improve security operations efficiencyRequired Qualifications, Training, and EducationFive years of experience in information technologyTwo years of experience in a security operations center or cybersecurity incident response teamBachelor's degree in information technology, cybersecurity, or a related fieldProfessional certification such as ISC2 CISSP, CompTIA Security+, or equivalentExperience with enterprise security tools and data analysis from various security platforms

2 days ago
Related jobs
Promoted
VirtualVocations
Seattle, Washington

A company is looking for an Information Security Analyst II to monitor and respond to information security events within a large enterprise technology ecosystem. ...

Promoted
COMTECH TELECOMMUNICATIONS
Seattle, Washington

Title: Geographic Information Systems Analyst II. The GIS Analyst II position is responsible for maintaining GIS systems and architecture while providing industry standard development and automation best practices to streamline repeatable processes and functions related to Comtech’s 911 produc...

Promoted
VirtualVocations
Seattle, Washington

A company is looking for a Security Analyst II to support Information Security governance, risk, and compliance initiatives. ...

Promoted
Slalom Consulting
Seattle, Washington

Our fast-paced, highly collaborative Information Security & Governance team is hiring an Information Security Analyst to help enable the Slalom brand by protecting the confidentiality, integrity, and availability of Slalom and our clients' data. The successful candidate will be responsible for c...

Promoted
VirtualVocations
Seattle, Washington

Key Responsibilities:Administers network security programs, including event detection and postmortem analysisAnalyzes network traffic logs and escalated work orders, recommending process improvementsAssists in developing companywide security training materials and ensures compliance with regulations...

Promoted
Fred Hutchinson Cancer Research Center
Seattle, Washington

The Clinical Information Systems Business Analyst works closely with project managers, clinical application teams, trainers, and operational stakeholders to document operational processes and to identify opportunities for improving processes and technical application workflows. The business analyst ...

University of Washington
Seattle, Washington

The Information Security Analyst responds to and remediates information security events; promotes and supports the secure use of networked servers and desktops by faculty, staff, and students; serves as a member of the information security Incident Response team as specified in University policy; pa...

Starbucks
Seattle, Washington

Now Brewing – information security corrective action data analyst! #tobeapartner . As an information security corrective action data analyst, you will…. Certifications such as CISSP, CISA, CIPP, or others focused on information security, data privacy or information risk management is desired. This d...

Slalom
Seattle, Washington

Our fast-paced, highly collaborative Information Security & Governance team is hiring an Information Security Analyst to help enable the Slalom brand by protecting the confidentiality, integrity, and availability of Slalom and our clients' data. The successful candidate will be responsible for contr...

Microsoft
Redmond, Washington

As a Security Analyst II, you will work closely with other cloud and security experts across Microsoft to investigate threats, proactively hunt for compromise, improve and automate processes, develop security tooling and data automation, and contribute your experience and expertise to countless othe...