
IT Security Analyst
Allan Myers Inc., Worcester, PA, United States
Responsibilities
The IT Security Analyst is a hands‑on technical professional responsible for monitoring, detecting and responding to security threats, conducting vulnerability assessments, and ensuring compliance with security policies. The Security Analyst is involved in data gathering, security testing, threat mitigation and remediation, along with user training while maintaining a strong understanding of the technology, the systems and the business processes it supports.
Alert triage, mitigation and management
Triage, mitigate and remediate alerts in various dashboards and alerting engines
Communicate and/or escalate events that have a major impact on the organization's security structure, compliance or assets
Data analysis and information gathering
Collect and correlate security and system event data and logs to identify abnormal behaviors or threats
Assist in the data gathering and analysis of existing systems, processes and procedures and identify opportunities for improvement in alignment with organizational goals
Vulnerability monitoring
Monitor various vulnerability feeds and determine vulnerabilities that impact our systems, processes or assets
Monitor vulnerability management platforms and services to identify current and known vulnerabilities and ensure effective mitigation or remediation in accordance with our defined approach and policy
Identify trends or issues in mitigation or remediation measure and communicate to appropriate stakeholders
User support and training
Provide direct support to end-users, addressing escalated technical issues and promoting best practices
Design and deliver technical training sessions to enhance user competency and adoption of IT solutions and security practices
Conduct training activities and attack simulations to enhance the end user exposure and knowledge regarding threats
Process improvement and technical leadership
Research and recommend technology changes to meet evolving business needs
Assist in the planning and execution of new technology implementations, including process mapping, enterprise architecture, testing, and deployment
Documentation and security
Maintain clear and detailed documentation of systems, processes, and technical configurations
Implement and audit system security practices to ensure compliance with organizational policies and best practices
Qualifications
Education & Certification
Education: Bachelor's degree in Information Technology, Computer Science, Engineering, Cybersecurity, or a related field
Certifications: Relevant certifications such as CompTIA Security+, GIAC, CISSP are preferred
Experience
Required
4-6 years of IT experience, with a focus on systems analysis, support, and application implementation
Familiarity with security tools and technologies such as firewalls, EDR and XDR solutions and network protection solutions
Preferred
Basic knowledge of scripting languages such as KQL or PowerShell
Familiarity with SIEM (Security Information and Event Management) systems
Required Skills And Competencies
Technical Skills
Proficiency with incident management systems, reporting metrics, SaaS solutions, and operating system platforms
Knowledge of server and client architecture, network technologies, and enterprise backup and recovery processes
Scripting and automation expertise to support system administration and audits
Interpersonal and Communication Skills
Strong written and verbal communication skills, with the ability to collaborate across teams
Effective stakeholder engagement to bridge technical and business objectives
Leadership and Problem-Solving
Demonstrated ability to lead initiatives, manage change, and solve complex technical problems
Strong analytical skills with attention to detail and urgency in resolving issues
Personal Attributes
Adaptable, ethical, and results-oriented with strong time management skills
Work Environment And Physical Demands
Environment
Primarily office-based, with occasional site visits exposing the role to construction equipment, weather conditions, and variable noise levels
Physical Requirements
Frequent sitting, walking, standing, and occasional lifting or climbing
Travel Requirements
Regular travel within the organizational footprint, including daily commutes and occasional overnight stays
TAhis is not a remote position. Candidates must be able to work in our Worcester, PA or Malvern, PA office.
#J-18808-Ljbffr
The IT Security Analyst is a hands‑on technical professional responsible for monitoring, detecting and responding to security threats, conducting vulnerability assessments, and ensuring compliance with security policies. The Security Analyst is involved in data gathering, security testing, threat mitigation and remediation, along with user training while maintaining a strong understanding of the technology, the systems and the business processes it supports.
Alert triage, mitigation and management
Triage, mitigate and remediate alerts in various dashboards and alerting engines
Communicate and/or escalate events that have a major impact on the organization's security structure, compliance or assets
Data analysis and information gathering
Collect and correlate security and system event data and logs to identify abnormal behaviors or threats
Assist in the data gathering and analysis of existing systems, processes and procedures and identify opportunities for improvement in alignment with organizational goals
Vulnerability monitoring
Monitor various vulnerability feeds and determine vulnerabilities that impact our systems, processes or assets
Monitor vulnerability management platforms and services to identify current and known vulnerabilities and ensure effective mitigation or remediation in accordance with our defined approach and policy
Identify trends or issues in mitigation or remediation measure and communicate to appropriate stakeholders
User support and training
Provide direct support to end-users, addressing escalated technical issues and promoting best practices
Design and deliver technical training sessions to enhance user competency and adoption of IT solutions and security practices
Conduct training activities and attack simulations to enhance the end user exposure and knowledge regarding threats
Process improvement and technical leadership
Research and recommend technology changes to meet evolving business needs
Assist in the planning and execution of new technology implementations, including process mapping, enterprise architecture, testing, and deployment
Documentation and security
Maintain clear and detailed documentation of systems, processes, and technical configurations
Implement and audit system security practices to ensure compliance with organizational policies and best practices
Qualifications
Education & Certification
Education: Bachelor's degree in Information Technology, Computer Science, Engineering, Cybersecurity, or a related field
Certifications: Relevant certifications such as CompTIA Security+, GIAC, CISSP are preferred
Experience
Required
4-6 years of IT experience, with a focus on systems analysis, support, and application implementation
Familiarity with security tools and technologies such as firewalls, EDR and XDR solutions and network protection solutions
Preferred
Basic knowledge of scripting languages such as KQL or PowerShell
Familiarity with SIEM (Security Information and Event Management) systems
Required Skills And Competencies
Technical Skills
Proficiency with incident management systems, reporting metrics, SaaS solutions, and operating system platforms
Knowledge of server and client architecture, network technologies, and enterprise backup and recovery processes
Scripting and automation expertise to support system administration and audits
Interpersonal and Communication Skills
Strong written and verbal communication skills, with the ability to collaborate across teams
Effective stakeholder engagement to bridge technical and business objectives
Leadership and Problem-Solving
Demonstrated ability to lead initiatives, manage change, and solve complex technical problems
Strong analytical skills with attention to detail and urgency in resolving issues
Personal Attributes
Adaptable, ethical, and results-oriented with strong time management skills
Work Environment And Physical Demands
Environment
Primarily office-based, with occasional site visits exposing the role to construction equipment, weather conditions, and variable noise levels
Physical Requirements
Frequent sitting, walking, standing, and occasional lifting or climbing
Travel Requirements
Regular travel within the organizational footprint, including daily commutes and occasional overnight stays
TAhis is not a remote position. Candidates must be able to work in our Worcester, PA or Malvern, PA office.
#J-18808-Ljbffr