Recent Searches

You haven't searched anything yet.

7 IT Security Analyst Jobs in Yuma, AZ

SET JOB ALERT
Details...
Aeyon
Yuma, AZ | Full Time
$105k-122k (estimate)
3 Days Ago
Yuma County, AZ
Yuma, AZ | Full Time
$70k-85k (estimate)
2 Weeks Ago
Yuma County, AZ
Yuma, AZ | Full Time
$70k-85k (estimate)
2 Weeks Ago
ClearanceJobs
Yuma, AZ | Part Time
$81k-108k (estimate)
2 Weeks Ago
ClearanceJobs
Yuma, AZ | Full Time
$89k-110k (estimate)
3 Days Ago
ClearanceJobs
Yuma, AZ | Full Time
$89k-110k (estimate)
3 Days Ago
ClearanceJobs
Yuma, AZ | Full Time
$115k-134k (estimate)
1 Week Ago
IT Security Analyst
$70k-85k (estimate)
Full Time 2 Weeks Ago
Save

Yuma County, AZ is Hiring an IT Security Analyst Near Yuma, AZ

Job Summary

This position is advertised from the minimum to the mid-point hourly rate. Salary will be determined based on education and experience at the time of offer.
Under minimal supervision of the IT Security Administrator, the IT Security Analyst will provide technology guidance in Information Technology Security, IT audits, and comprehensive enterprise information security program(s). This position assists in planning and implementing enterprise information security systems and programs to support and achieve a more secure and effective enterprise IT operation. This position has countywide responsibility.

Example of Work

(Illustrative Only) Protects information technology assets (i.e., hardware, software, data, etc.) by executing and enforcing system access controls, policies and procedures; monitors and audits IT systems to ensure authorized access occurs and any unauthorized access attempts are detected; based on severity level within established procedural guidelines immediately revoking access; reporting the violations and recommending corrective actions to management; monitors and analyzes IT systems for unusual behavior or breaches; Responds to security incidents; performs security audits and report status to management; works with various information technology divisions to ensure network security devices and measures exist and function correctly; performs security monitoring, testing, prevention, and recommend remediation activities across the environment taking a proactive approach to mitigate risks; provides reports, audits and monitors internet usage compliance and reports violations of County policy; works with networking, applications, desktop and geospatial information systems personnel to analyze, audit, and mitigate any risks; this includes compiling formal networking and security reports to present to Information Technology (IT) management as requested; develops and administers information security and risk management awareness training programs for all employees, contractors and approved system users; develops a framework for roles and responsibilities with regard to information ownership, classification, accountability, and protection; ensures that security programs are in compliance with relevant laws, regulations, and policies to minimize or eliminate risk and audit findings; develops, implements, tests, documents, evaluates, and modifies IT Compliance controls (i.e., Data Loss Prevention, Mobile Data Management, Encryption, etc.) for all Information Technology Resources; works with stakeholders to ensure IT Security and Compliance deliverables are achieved; evaluates and assists in the selection of new technologies in related IT security and compliance; assists with Request for Proposals (RFP) development, proposal evaluations, vendor negotiations, and contract management; prepares and conducts information security risk assessments, forensic, and security policy violation; investigations and recommends corrective action; maintains absolute confidentiality of work-related issues and County information; provides on-call services as predetermined by the agency head; regular and reliable attendance is required; perform other duties as required or assigned.

Experience and Education

Sixty (60) semester hours of post high school coursework from an accredited college or university in computer science, management information systems, or closely related field; AND Three (3) years progressively responsible experience in an enterprise information technology security environment; functioning knowledge of Cisco, Mitel, Microsoft, Linux, VMWare, and ITIL Foundation. Working knowledge of security fundamentals in an enterprise environment. Operational knowledge of Microsoft Active Directory and Outlook e-mail (Exchange); OR an equivalent combination of education and experience.
Preferred Qualifications:
Bachelor’s degree in Computer Science, Management Information Systems, Business Administration or closely related field is highly desirable; IT security related certifications such as CySA , CEH, ECSA, GSEC, GCIH, GCIA, or similar; current ITL certification is a major plus.
SPECIAL REQUIREMENTS: Requires successful completion of a background check, and must possess and maintain a valid Arizona driver’s license. Ability to attain CySA , equivalent or higher certification within thirty-six (36) months of employment.
Hourly rate for this position has been revised effective 3/4/24.

Knowledge, Skills and Abilities

Knowledge of: County policies and procedures; enterprise level computer hardware and software use, installation, and configuration; principles and practices of IT Security and IT Compliance Standards; information security management framework and processes based on ISO27001/ISO27002 standards and the NIST Cybersecurity Framework; risk-based process model creation for vendor risk management, analysis including the assessment and mitigation of risks that may result from collaboration with partners, consultants and other service providers; hardware and software used in a converged voice/data network; network security principles and IT security best practices is important; familiarity with server virtualization technology; development, implementation and monitoring of strategic, and comprehensive enterprise information security program objectives to ensure the integrity, confidentiality and availability of information that is owned, controlled or processed by the organization.
Skill in: System hardening (i.e., firewall, web vulnerability assessments, security audits, intrusion detection/prevention); upkeep, and publishing of information security policies, standards, and guidelines; administer the, instruction, and dissemination of security policies, standards and guidelines;
researching problems that are difficult to identify or where facts may be insufficient, not present, and/or, misleading; handling sensitive or confidential information; assessing customer support needs, and recommending of effective solutions to mitigate risks; teamwork, presentation and cooperation between diverse groups; using initiative and independent judgment within established procedural guidelines with a focus on mitigating risks and protecting system data; working with general supervision in a technical environment with interlinked and changing priorities; establishing and maintaining positive and cooperative working relationships with co-workers; communicating effectively verbally and in writing; facilitating communication between staff, management, vendor(s), stakeholders, and other IT resources within the County.
Ability to: Communicate effectively verbally and in writing; follow written and verbal instructions; meet critical time deadlines; lift/carry, push and pull up to 50 pounds; sit, stand, and/or walk for up to 6 hours per day; bend and/or stoop.
Physical Demands and Working Environment:
While work is performed in office environment, it may require driving to other facilities; job may require to bending, stooping, crawling, climbing, pushing, pulling, and being able to lift up to 50 pounds.
EOE/AA/ADAAA/M/F/V/D DRUG FREE WORKPLACE

Ten federal paid holidays, vacation and sick leave, participation in Arizona State Retirement System is mandatory, and health/life/dental/vision insurance for eligible employees in accordance with the Yuma Metropolitan Planning Organization Personnel Policies and Procedures

Job Summary

JOB TYPE

Full Time

SALARY

$70k-85k (estimate)

POST DATE

05/15/2024

EXPIRATION DATE

07/13/2024

Show more

Yuma County, AZ
Full Time
$67k-86k (estimate)
Just Posted
Yuma County, AZ
Full Time
$109k-138k (estimate)
Just Posted

The job skills required for IT Security Analyst include Information Security, Analysis, Cybersecurity, Risk Management, IT Security, Computer Science, etc. Having related job skills and expertise will give you an advantage when applying to be an IT Security Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by IT Security Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
Sonitalent Corp
Full Time
$88k-112k (estimate)
1 Day Ago
For the skill of  Analysis
Treetop Therapy
Full Time
$35k-44k (estimate)
Just Posted
For the skill of  Cybersecurity
Sonitalent Corp
Full Time
$88k-112k (estimate)
1 Day Ago
Show more

The following is the career advancement route for IT Security Analyst positions, which can be used as a reference in future career path planning. As an IT Security Analyst, it can be promoted into senior positions as a Systems/Application Security Analyst that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary IT Security Analyst. You can explore the career advancement for an IT Security Analyst below and select your interested title to get hiring information.

ClearanceJobs
Part Time
$81k-108k (estimate)
2 Weeks Ago

If you are interested in becoming an IT Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an IT Security Analyst for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on IT Security Analyst job description and responsibilities

They will then help to make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.

02/23/2022: Bellingham, WA

Security analysts monitor, prevent, and stop attacks on private data.

03/24/2022: Scranton, PA

Security analysts may also prepare for and respond to system breaches or attacks.

01/31/2022: Duluth, MN

They document tests, security and emergency policies, and procedures.

04/15/2022: Virginia Beach, VA

IT security analysts protect computer networks from cyberattacks and unauthorized access.

01/30/2022: Macon, GA

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on IT Security Analyst jobs

The most successful analysts are detail-oriented and have an analytical mindset.

02/20/2022: New London, CT

Security analysts must demonstrate adaptability and the ability to grow with their field.

04/15/2022: Waterloo, IA

Typically, most security analysts hold a bachelor's degree at minimum.

02/01/2022: Juneau, AK

Ethical hacking certifications help prepare analysts to understand threats and protect systems.

02/02/2022: Spokane, WA

Faced with a dynamic threat landscape and continuously emerging technologies, both on the defensive and offensive sides, security analysts need to be naturally curious and always willing to learn more.

03/06/2022: Rock Hill, SC

Step 3: View the best colleges and universities for IT Security Analyst.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more