Recent Searches

You haven't searched anything yet.

1 IT Security Analyst I Job in Mobile, AL

SET JOB ALERT
Details...
Austal USA LLC
Mobile, AL | Full Time
8 Months Ago
IT Security Analyst I
Austal USA LLC Mobile, AL
Full Time | Durable Manufacturing 8 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

Austal USA LLC is Hiring an IT Security Analyst I Near Mobile, AL

Any qualified individual with a disability who is having difficulty in completing an application because of incompatible technology or other disability-related application issues may contact us at the following phone number for assistance: 251-445-1932. Austal shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability. Austal’s commitment to equal employment opportunity applies at all levels of employment, in all job titles, including the executive level, and to all employment actions, including but not limited to decisions concerning recruitment, hiring, training, and promotion. REPORTS TO: IT Security Manager or IT Director SUPERVISES: N/A DUTIES / RESPONSIBILITIES: Performs a variety of support functions related to IT security systems, service tickets, and scheduled auditing activities. Under close supervision, monitors compliance to security policies, procedures and practices for IT infrastructure, information, and internet/intranet connectivity throughout the enterprise. Support monitoring and alert activities, reports and security dashboards to ensure compliance with company policy and procedures. Audit security measures, policies, methods and procedures used to safeguard the integrity of and access to enterprise systems, files, and data elements. Participate in discussions for the selection and adoption of new technologies or policies. Adhere to data security policies and observe and report activities where procedures may require changes or development of rule mechanisms. Assist team with cultural awareness of Information Security as an integral part of IT architecture and business processes. Provide requested support during the preparation and execution of all internal and external IT related audits. Support and monitor threat management technologies as directed; examples include: antivirus, Security Incident and Event Management (SIEM), data classification, encryption, intrusion prevention and activities/processes associated with these technologies. Support activities related to administration and compliance with the company’s information security awareness program. Actively participate in information security training and awareness program. Works in high-tempo environments requiring effective multitasking, exercise of patience and professionalism during stressful situations. Complies with Austal’s employee handbook general guidelines, company procedures and policies. QUALIFICATIONS / KNOWLEDGE / EXPERIENCE: Bachelor’s Degree in Computer Science, Information Systems or related field required. Three (3) years’ IT work experience, with at least 1 year of security-relevant experience will be considered in lieu of a degree. Ability to obtain entry level (or greater) security certification within 90 days of employment required. Acceptable certifications include: Security , ISACA Cybersecurity Fundamentals, GIAC Information Security Fundamentals (GISF), (ISC)2 Systems Security Certified Practitioner (SSCP), GIAC GSEC, or similar certification. Experience performing risk analysis and remediation of information systems and networks Experience with one of the following: firewalls, IDS/IPS, DAR solutions and VPNs. Demonstrated understanding of Incident Response Management. Demonstrated understanding of Information Assurance Vulnerability Management. Demonstrated knowledge of the security best practices of multiple platforms, operating systems, software, communications and network protocols. Knowledge of IT Infrastructure disciplines: data center, networks (voice, data, LAN, WAN, VPN, Remote Access Systems), telephony systems, data storage, servers systems (Citrix, VMware, Windows), client systems and other endpoint devices. Knowledge of malicious code detection, analysis and resolution Knowledge of Microsoft Active Directory, DNS, Windows Server (2008 ) / Desktop (Win 7 ) Operating Systems. Familiarity with compliance frameworks (RMF, COBIT, FISMA, NIST, ISO, GLBA) is desirable. Ability to deliver innovative solutions for problems where there are no available precedents, guidelines or policies. Analytical problem solving, risk identification/mitigation, sense of urgency, accountability, excellent communication, work in team environment. ADDITIONAL GUIDELINES: Must be able to obtain and maintain a Secret Security Clearance. All candidates must meet Austal USA’s basic employment eligibility guidelines: 18 years or older at time of application Able to provide proof of US Person status (permanent resident or citizen) No felony convictions of theft/deception or violent crimes within seven years from disposition date No felony convictions of drug crimes within three years from disposition date Willing to submit to a drug screen Willing to submit to a background check TOOLS: Various industry-specific technical solutions; acumen more important than tool experience. DIRECTION EXERCISED: N/A DISCRETION EXERCISED: Work within Austal standards at the direction of the IT Security Manager or IT Director LIAISES WITH: Security Personnel, IT and Business Integration Staff, End Users and External Technical Support WORK ENVIRONMENT The work environment characteristics described here are representative of those an employee may encounter while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee may be exposed to humid conditions, bright flashing lights, moving mechanical parts, high precarious places, outside weather conditions, and extreme heat. The employee is occasionally exposed to fumes and/or airborne particles at or below the PEL, toxic or caustic chemicals, and heat and cold. The noise level in the work environment is usually very loud, 90 dB. SAFETY Must comply with company, federal, state, and local safety and environmental rules and regulations while performing daily job tasks.

Job Summary

JOB TYPE

Full Time

INDUSTRY

Durable Manufacturing

POST DATE

08/05/2022

EXPIRATION DATE

11/19/2022

WEBSITE

usa.austal.com

HEADQUARTERS

LOXLEY, AL

SIZE

1,000 - 3,000

FOUNDED

1999

REVENUE

$200M - $500M

INDUSTRY

Consumer Services

Show more

Austal USA
Remote | Full Time
$124k-163k (estimate)
1 Week Ago
Austal USA
Remote | Full Time
$63k-82k (estimate)
1 Week Ago
Austal USA
Remote | Full Time
$190k-241k (estimate)
1 Week Ago

The following is the career advancement route for IT Security Analyst I positions, which can be used as a reference in future career path planning. As an IT Security Analyst I, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary IT Security Analyst I. You can explore the career advancement for an IT Security Analyst I below and select your interested title to get hiring information.

If you are interested in becoming an IT Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an IT Security Analyst for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on IT Security Analyst job description and responsibilities

They will then help to make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.

02/23/2022: Bellingham, WA

Security analysts monitor, prevent, and stop attacks on private data.

03/24/2022: Scranton, PA

Security analysts may also prepare for and respond to system breaches or attacks.

01/31/2022: Duluth, MN

They document tests, security and emergency policies, and procedures.

04/15/2022: Virginia Beach, VA

IT security analysts protect computer networks from cyberattacks and unauthorized access.

01/30/2022: Macon, GA

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on IT Security Analyst jobs

The most successful analysts are detail-oriented and have an analytical mindset.

02/20/2022: New London, CT

Security analysts must demonstrate adaptability and the ability to grow with their field.

04/15/2022: Waterloo, IA

Typically, most security analysts hold a bachelor's degree at minimum.

02/01/2022: Juneau, AK

Ethical hacking certifications help prepare analysts to understand threats and protect systems.

02/02/2022: Spokane, WA

Faced with a dynamic threat landscape and continuously emerging technologies, both on the defensive and offensive sides, security analysts need to be naturally curious and always willing to learn more.

03/06/2022: Rock Hill, SC

Step 3: View the best colleges and universities for IT Security Analyst.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more