We have a fantastic new job opportunity for an IT Security Analyst II at Bloodworks Northwest. As a member of the Information Technology department, the IT Security Analyst II position supports Bloodworks' cybersecurity by monitoring, analyzing, and responding to security events and incidents; assisting with the daily operations of security tools and technologies; maintaining documentation; and ensuring compliance with established security policies and procedures. Works closely with senior security staff and consultants to identify potential threats, escalate incidents, and contribute to the continuous improvement of Bloodworks' security operations.
Principal responsibilities include, but are not limited to as a member of the Information Technology department:
Professional Conduct: Exhibit respect and a problem-solving mindset in all interactions to foster a positive work environment.
Effective Communication: Ensure clear and concise communication, both orally and in writing, striving for mutual understanding with colleagues and users.
Professionalism: Maintain a professional appearance and demeanor at all times, demonstrating the Information Technology department's values.
Quality Service: Commit to delivering the highest level of service, continuously seeking to improve and enhance client satisfaction with IT support.
Team Support: Collaborate effectively with team members, contributing to a supportive and successful work environment through mutual assistance and shared goals.
Principal responsibilities include, but are not limited to as an IT Security Analyst II:
Monitor Security Alerts and Events: Identify and resolve problems, often anticipating issues before their occurrence; use existing endpoints and network monitoring tools to detect suspicious activity across networks, systems, and applications.
Provide Incident Response: Identify, investigate, and escalate security incidents in accordance with established processes and procedures.
Perform Log Analysis: Review system and application logs to identify anomalies or indicators of compromise.
Support Vulnerability Management : Lead efforts in vulnerability detection and remediation with a primary focus on endpoint systems.
Security Policy Management: Provide subject matter expertise in systems security policies, standards/practices, protocols, and technologies.
Maintain Security Tools : Configure, deploy, maintain, and support security tools.
Document Security Incidents and Procedures: Keep accurate records of incidents, resolutions, and operational procedures.
Perform Account Reviews: Support periodic audits of user accounts and permissions