Security Analyst
Job Description
Job Description
Job Description
Security Analyst
Key Responsibilities
Security Monitoring & Incident Response
Partner closely with a managed security service/SOC provider to oversee threat monitoring, investigations, incident response activities, and security reporting.
Review and analyze security events, alerts, and logs to identify suspicious activity and potential risks.
Take ownership of security incidents from initial triage through containment, remediation, and post-incident review.
Administer identity and access management across enterprise systems and applications.
Assist in maintaining secure configurations across on-prem, network, and cloud-based environments.
Risk Management & Compliance
Design, implement, and maintain security controls, tools, and procedures to minimize organizational risk.
Lead and support vulnerability management activities, including identification, prioritization, and remediation tracking.
Perform security reviews, risk assessments, and internal audits to ensure alignment with security policies and regulatory frameworks.
Contribute to the development, implementation, and enforcement of security standards and policies.
Governance & Continuous Improvement
Produce clear security documentation, metrics, and reports for technical and non-technical stakeholders.
Work collaboratively with IT, engineering, and business teams to embed security best practices into new systems and initiatives.
Support security awareness and training efforts to reduce human-related security risks.
Monitor threat intelligence sources to stay ahead of emerging threats and attack trends.
Continuously evaluate and recommend improvements to security processes, tooling, and technologies based on industry best practices and lessons learned.
Qualifications
Post-secondary education in computer science, information security, or a related discipline, or equivalent professional experience (approximately 5+ years).
Formal security training and/or industry certifications (e.g., Security+, CISSP, GIAC) are considered an asset.
Strong technical foundation across core IT domains, including networking, virtualization, containers, cloud platforms, and infrastructure technologies.
Self-driven, proactive, and able to work independently while collaborating effectively with cross-functional teams.
How to Apply
Ready to start your career as a Security Analyst at Hire DigITalent?
- Click the "Apply Now" button below.
- Review the safety warning in the modal.
- You will be redirected to the employer's official portal to complete your application.
- Ensure your resume and cover letter are tailored to the job description using our AI tools.
Frequently Asked Questions
Who is hiring?▼
This role is with Hire DigITalent in Aurora.
Is this a remote position?▼
This appears to be an on-site role in Aurora.
What is the hiring process?▼
After you click "Apply Now", you will be redirected to the employer's official site to submit your resume. You can typically expect to hear back within 1-2 weeks if shortlisted.
How can I improve my application?▼
Tailor your resume to the specific job description. You can use our free Resume Analyzer to see how well you match the requirements.
What skills are needed?▼
Refer to the "Job Description" section above for a detailed list of required and preferred qualifications.