PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…

ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of Information Security Analyst 3, Digital Technology Solutions:
-
Employment Type:
Full-Time
-
Location:
Cincinnati, OH (Onsite)
Do you meet the requirements for this job?
Information Security Analyst 3, Digital Technology Solutions
Current UC employees must apply internally via SuccessFactors
Founded in 1819, the University of Cincinnati ranks among the nation’s best urban public research universities. Home to 53,235 students, more than 11,000 faculty and staff and 350,000+ living alumni, UC combines a Top 35 public research university with a physical setting The New York Times calls “the most ambitious campus design program in the country.”
With the launch of Next Lives Here, the Cincinnati Innovation District, a $100 million JobsOhio investment, three straight years of record enrollment, worldwide leadership in cooperative education, a dynamic academic health center and entry into the Big 12 Conference, UC’s momentum has never been stronger. UC’s annual budget stands at $1.85 billion, and its endowment totals nearly $1.8 billion.
Job Overview
Assist in performing procedures and provides technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
Essential Functions
- Assist with developing strategies to achieve organizational goals; understand organization's strengths and weaknesses; analyze potential risks and opportunities; adapt recommendations to changing conditions and aligns with best practices.
- Help facilitate large collaborative teams to achieve organizational goals.
- Support community communication efforts, presenting security insights to leadership.
- Develop technical documentation (designs, specifications, processes, workflows) and communications.
- Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
- Participate in multiple, moderate- to high-risk projects.
- Work with a team to advance project goals and provide technical help and subject matter expertise. Actively engage in project support and solutioning.
- Share technical knowledge with teammates and help solve more complex problems.
- Document individual progress on assigned deliverables.
- Gather, maintain, and validate metrics for area of responsibility.
- Mentor student workers and junior employees.
- Carry out procedures to ensure that all systems, products, and services meet organization security standards. Recommend procedural improvements.
- Research information security trends to maintain technical understanding of the latest vulnerabilities and threats.
- Assist with providing artifacts to Governance, Risk & Compliance in relation to internal & external audits.
- Independently work with business units to achieve security objectives and identifies, reports, and resolves security risks and violations.
- Perform cyber investigations through forensic fact gathering with a focus on e-discovery.
- Analyze high volumes of logs, network data, and other attack artifacts in support of incident investigations.
- Provide guidance and technical expertise as needed for information security training and awareness programs.
- Participate in troubleshooting processes during and outside of normal business hours and participate in change management and root cause analysis.
- Mentor others regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
- Serve as an expert resource to others.
- Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
Bachelor's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
Eight (8) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
- Two (2) years of related experience
- Advanced knowledge of security tool administration.
- Experience with system administration.
- Experience with network architecture or some level of related technical training.
- Advanced understanding of risk and vulnerability management.
- Experience with incident response.
- Advanced knowledge of industry standard security and compliance frameworks.
Additional Qualifications Considered
This position will primarily work in the area of information security risk management. The ideal candidate will have experience in the field of information security risk. Responsibilities may include, but are not limited to: assessing information security reviews to identify business risk, making recommendations for implementation of security controls, performing gap analysis of contracts and ensuring appropriate data security verbiage is included in contracts, documenting excessive risk via institutional risk acceptance processes, participating on projects with data security concerns to represent the office of information security and ensure appropriate documentation is in place, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes, and supervision/mentorship of co-op and student workers. CISSP, CISM, GISP or similar information security certification(s) are preferred.
Physical Requirements/Work Environment
- Repetitive hand motion (such as typing) - Continuously
- Standing - Seldom
- Walking - Seldom
- Bending - Seldom
- Stooping - Seldom
- Kneeling, squatting - Seldom
- Crouching - Seldom
- Crawling - Seldom
- Reaching overhead - Seldom
- Pulling, pushing - Seldom
- Lifting - up to 20 pounds - Seldom
- Lifting - up to 50 pounds - Seldom
Compensation and Benefits
UC offers a wide array of complementary and affordable benefit options, to meet the financial, educational, health, and wellness needs of you and your family. Eligibility varies by position and FTE.
- Competitive salary range dependent on the candidate's experience.
- Comprehensive insurance plans including medical, dental, vision, and prescription coverage.
- Flexible spending accounts and an award-winning employee wellness program, plus an employee assistance program.
- Financial security via our life and long-term disability insurance, accident and illness insurance, and retirement savings plans.
- Generous paid time off work options including vacation, sick leave, annual holidays, and winter season days in addition to paid parental leave.
- Tuition remission is available for employees and their eligible dependents.
- Enjoy discounts for on and off-campus activities and services.
As a UC employee, and an employee of an Ohio public institution, if hired you will not contribute to the federal Social Security system, other than contributions to Medicare. Instead, UC employees have the option to contribute to a state retirement plan (OPERS, STRS) or an alternative retirement plan (ARP).
For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at
.The University of Cincinnati is an Equal Opportunity Employer.
REQ:97772
Location: Cincinnati, OH, US
Facility: Main Campus
Nearest Major Market: Cincinnati
Job Segment: Information Security, Developer, Computer Science, Risk Management, Technology, Finance, Security
University of Cincinnati | 2600 Clifton Ave. | Cincinnati, OH 45221 | ph:
#J-18808-Ljbffr
Recommended Skills
- Administration
- Certified Information Security Manager
- Certified Information Systems Security Professional
- Change Management
- Coaching And Mentoring
- Communication
Help us improve CareerBuilder by providing feedback about this job: Report this job
Job ID: le50j2b
CareerBuilder TIP
For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.
By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.