What are the responsibilities and job description for the Information Security Analyst II position at Shentel?
Shenandoah Telecommunications Company (“Shentel”) specializes in providing High-Speed Internet and other telecommunications services to customers in the Mid-Atlantic United States. We focus on rural communities, which are often overlooked by larger companies. The Shentel family of brands includes: Shentel: Provides traditional cable Internet services for small towns and rural communities. Glo Fiber: Delivers fiber-optic Internet for customers in larger cities, as a competitor to incumbent providers. Shentel Business and Glo Fiber Business: Offers small, medium and large-scale telecommunication services for businesses and enterprises in our areas. We live and work in the same places as the customers we serve, and we are proud to support our local communities. For more information, please visit www.shentel.com.
Job Summary:
Responsible for reducing the impact of information security incidents and system compromises. They do so by assisting with security monitoring, incident / event investigation and analysis, roleplay through tabletop events and "purple team" exercises, contributing to documentation and playbooks to ensure repeatable security-focused processes, participating with security and data privacy assessment as well as providing recommendation for endpoints, servers, and network infrastructure. They are responsible for the understanding and identification of indicators of compromise (IoC) as well as helping understand evidence of attack in alerts or monitoring, by hunting through data, systems and from review of investigation notes. Position has a moral and legal responsibility to uphold all local, state, and federal regulations especially in regards to security and data privacy.
Job Responsibilities:
If you require accommodation or assistance to complete the online application process, due to a medical condition or impairment, please contact a HR Representative at 540-984-5241 or employment@emp.shentel.com. When you contact a HR Representative please identify the type of accommodation or assistance you are requesting. We will assist you promptly.
For technical issues with the website, please contact employment@emp.shentel.com.
EEO is the Law and Pay Transparency
Job Summary:
Responsible for reducing the impact of information security incidents and system compromises. They do so by assisting with security monitoring, incident / event investigation and analysis, roleplay through tabletop events and "purple team" exercises, contributing to documentation and playbooks to ensure repeatable security-focused processes, participating with security and data privacy assessment as well as providing recommendation for endpoints, servers, and network infrastructure. They are responsible for the understanding and identification of indicators of compromise (IoC) as well as helping understand evidence of attack in alerts or monitoring, by hunting through data, systems and from review of investigation notes. Position has a moral and legal responsibility to uphold all local, state, and federal regulations especially in regards to security and data privacy.
Job Responsibilities:
- Perform security incident investigations and reporting according to the Incident Response Plan (IRP).
- Perform industry best practice security and data privacy assessments for all third party vendors, contractors, consultants, auditors, applications (both on premise and cloud) as well as system-to-system connections on our internal and customer-facing networks.
- Contribute to network and application penetration tests, vulnerability assessment scans, and patch management / vulnerability remediation strategy planning.
- Monitor and advise on information security and data privacy issues related to the systems and their related data flows while ensuring internal security controls are appropriate and operating as intended.
- Conduct security and data privacy research in keeping abreast of latest information security as well as data privacy events, issues, and trends.
- Assist and support user and security posture awareness for IT teams as well as key information security partners for our customer facing servers, networks, and applications.
- Participate in any breach analysis activities to help discover root cause.
- Participate in disaster and business continuity recovery planning as well as plan execution should an event occur.
- Analyze and provide security model planning input for cloud (SaaS) access and monitoring. Including protection recommendations associated with IT architecture for cloud and hybridized computing.
- Provide support for compliance activities for SOX, PCI, CPNI, and data privacy regulations around PII, PHI, and financial data.
- Actively participate in red team / blue team engagements led by more senior team members or by select management approved security partners.
- Participate in threat modeling activities with more senior team members or with select management approved security partners.
- Education: Bachelor’s degree in Computer Science, Network Administration, Cybersecurity, or a related field required; Master’s degree preferred; relevant certifications and professional experience may be considered in lieu of formal education.
- Experience Level: 5-7 years of Software Development, Network Administration, or Cyber Security experience is required.
- Experience in securing applications (front end / back end, SaaS), servers, or networks is required.
- Experience in the event log monitoring of computer systems is required.
- Experience with industry standard security frameworks (e.g., NIST, CIS, OWASP, Mitre Att&ck) as well as experience with PII, PHI, CPNI, and PCI data handling requirements is required.
- Experience in information security or data privacy investigative work is required.
- 2-3 years of Splunk or SIEM experience is preferred.
- Experience with SOX compliance is preferred.
- Experience with mobile device management (MDM) is preferred.
- Ability to review reports and system activity logs to identify critical events, categorize according to priority, and escalate as appropriate.
- Capability to gather information, analyze and evaluate evidence, draw conclusions, and share that knowledge gained in an appropriate manner.
- Ability to absorb intelligence information about threats and threat actors to help mitigate harmful events for the organization.
- Ability to develop and analyze processes.
- Understanding of security measures and testing at an application level that aim to prevent data or code from being stolen, manipulated, or hijacked.
- Ability to identify detailed information risk and to apply governance compliance concepts and principles.
- Must have excellent verbal and written skills.
- Must be able to work effectively in a team environment.
- Excellent capability to develop and document security architecture, assessment, and plans. Including strategic, tactical, and project plans.
- Ability to develop security policies, procedures, standards, and guidelines.
- Capability to work with a set of guidelines to help identify critical event data for additional analysis and escalation as appropriate.
- WSUS Management and Deployment, SCCM Package Building and Maintenance, Windows, Endpoint Protection and Compliance systems, Active Directory, Office 365, SIEM solutions.
- Penetration/vulnerability test suites and compliance regulations (SOX, PCI, etc.)
- Applicable knowledge of Information Technology, security and data privacy fundamentals, and networking.
- CompTIA Network and Security certifications required, or equivalent certifications demonstrating foundational knowledge in networking and security. Candidates with substantial hands-on experience may be considered in lieu of formal certification.
- Computer Hacking Forensic Investigator (CHFI) or Certified Ethical Hacker (CEH) Certifications preferred.
If you require accommodation or assistance to complete the online application process, due to a medical condition or impairment, please contact a HR Representative at 540-984-5241 or employment@emp.shentel.com. When you contact a HR Representative please identify the type of accommodation or assistance you are requesting. We will assist you promptly.
For technical issues with the website, please contact employment@emp.shentel.com.
EEO is the Law and Pay Transparency
Internships in Cybersecurity and Information Security
MITRE -
Bridgeport, WV
Senior Information Systems Security Officer
Tygart Technology, Inc. -
Clarksburg, WV
Information System Security Officer (ISSO)
Spry Methods, Inc. -
Clarksburg, WV