Cyber Security Analyst

Check out our Cyber Security Analyst jobs! If you’re passionate about identifying vulnerabilities, implementing security measures, and safeguarding sensitive data, we have rewarding roles where your expertise will be crucial in protecting the organization’s networks, ensuring secure operations, and responding to emerging cyber threats. Your contributions will help maintain a resilient security infrastructure, mitigate risks, and support business continuity.

Responsibilities:

  • Perform analysis, configuration, and security monitoring for IT systems, applications, and infrastructure to identify potential vulnerabilities and threats.
  • Implement and deploy encryption methods, such as SSL/TLS, to ensure secure communication and protect sensitive information across networks and systems.
  • Assist IT teams in establishing secure connections for applications, services, and external systems, ensuring compliance with security protocols.
  • Configure, analyze, and monitor security protocols like firewalls, access control lists, and multi-factor authentication to safeguard data and systems.
  • Support security teams by developing automation scripts for incident detection, response workflows, and vulnerability assessments.
  • Document cybersecurity procedures, incident response protocols, and configuration workflows to ensure consistent and reproducible security measures.
  • Coordinate and facilitate meetings to review security protocols, gather feedback, and report on threat management strategies and risk mitigation progress.

Skills & Experience:

  • Bachelor’s degree in Cyber Security, Computer Science, Information Technology, or a related field.
  • Strong analytical and technical skills with proficiency in programming languages like Python, Bash, or PowerShell for security automation and incident response.
  • Experience with security infrastructure, threat detection systems, and vulnerability management in both on-premise and cloud environments.
  • Expertise in security monitoring and threat analysis using tools like Splunk, SIEM systems, or intrusion detection/prevention systems (IDS/IPS).
  • Proficiency in securing cloud-based environments and applications, including platforms like AWS, Azure, or Google Cloud, with a focus on access control and data protection.
  • Experience in establishing and managing security protocols, performing risk assessments, and implementing monitoring systems to ensure compliance with industry standards.
  • Skilled in conducting security audits, managing security incidents, and recommending solutions to improve overall system security and reduce vulnerabilities.

Some of the Cyber Security Analyst Jobs
We Hire For

As tech recruiters, we consistently partner with organizations seeking skilled cybersecurity professionals who can defend their systems, data, and infrastructure from evolving digital threats. 

  • Cyber Security Analyst
  • Information Security Analyst
  • SOC Analyst (Security Operations Center)
  • Threat Intelligence Analyst
  • Incident Response Analyst
  • Network Security Analyst
  • Security Compliance Analyst
  • Risk Analyst – Cybersecurity
  • Cloud Security Analyst
  • Security Operations Analyst
  • Vulnerability Management Analyst
  • Malware Analyst
  • Penetration Testing Analyst
  • Security Monitoring Analyst
  • Governance, Risk, and Compliance (GRC) Analyst
  • Identity and Access Management (IAM) Analyst
  • Endpoint Security Analyst
  • Security Awareness Analyst
  • Forensics Analyst
  • Red Team Analyst
  • Blue Team Analyst
  • Cybersecurity Data Analyst
  • IT Security Analyst
  • Application Security Analyst
  • Cyber Defense Analyst

EEO Employer

We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. We strictly prohibit and do not tolerate discrimination against employees, applicants, or any other covered persons because of race, color, religion, creed, national origin or ancestry, ethnicity, sex, sexual orientation, gender (including gender identity and expression), marital or familial status, age, physical or mental disability, perceived disability, citizenship status, service in the uniformed services, genetic information, or any other characteristic protected under applicable federal, state, or local law. Applications from members of minority groups and women are encouraged.

 

© Copyright CompuForce 2025 – All rights reserved

we are all divisions of

The TemPositions Group of Companies