Information Security Analyst

Check out our Information Security Analyst roles! If you’re passionate about protecting organizations from cyber threats, identifying vulnerabilities, implementing robust security measures, and responding to incidents, we have rewarding positions where your expertise will be critical in safeguarding sensitive data, maintaining system integrity, and ensuring compliance with industry security standards.

Responsibilities:

  • Perform analysis, configuration, and security monitoring for information systems, devices, and infrastructure.
  • Implement and deploy encryption methods to secure communications and protect sensitive data across systems and networks.
  • Assist IT and development teams in establishing secure connections for applications, services, and third-party systems.
  • Configure, analyze, and monitor security protocols and access controls to safeguard data and ensure service integrity.
  • Support security teams by developing automation scripts to streamline incident response, vulnerability scanning, and security monitoring workflows.
  • Document security procedures, incident response protocols, and system configurations to ensure smooth operations and reproducibility.
  • Coordinate and facilitate meetings to review security processes, gather feedback, and report on security risks, mitigations, and project outcomes.

Skills & Experience:

  • Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field.
  • Strong analytical and technical skills with proficiency in security tools and technologies such as Python, Bash, or Go for automating security tasks and analysis.
  • Experience with cybersecurity frameworks, security protocols, and incident response within enterprise environments.
  • Expertise in security monitoring and threat detection using tools like Splunk, Snort, or Security Information and Event Management (SIEM) systems.
  • Proficiency in securing cloud-based environments, including platforms like AWS, Azure, or Google Cloud.
  • Experience in implementing security measures, conducting risk assessments, and ensuring compliance with standards such as GDPR, HIPAA, or ISO 27001.
  • Skilled in conducting security audits, vulnerability assessments, and penetration testing, and recommending solutions to enhance security posture, scalability, and system integrity.

Some of the Information Security Analyst Jobs We Hire For

As tech recruiters, we’re always hiring full stack developers who can work seamlessly across both front-end and back-end technologies. Here are just some of the full stack roles we regularly recruit for:

  • Information Security Analyst
  • Cybersecurity Analyst
  • Network Security Analyst
  • Cloud Security Analyst
  • SOC (Security Operations Center) Analyst
  • Threat Intelligence Analyst
  • Security Compliance Analyst
  • Risk and Governance Analyst
  • Vulnerability Management Analyst
  • Incident Response Analyst
  • Data Loss Prevention (DLP) Analyst
  • Identity and Access Management (IAM) Analyst
  • Endpoint Security Analyst
  • Security Awareness Analyst
  • Penetration Testing Analyst
  • Security Operations Analyst
  • Application Security Analyst
  • Malware Analyst
  • Security Monitoring Analyst
  • Red Team Analyst
  • Blue Team Analyst
  • Security Policy Analyst
  • Information Assurance Analyst
  • Forensics Analyst
  • Privacy and Compliance Analyst

EEO Employer

We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. We strictly prohibit and do not tolerate discrimination against employees, applicants, or any other covered persons because of race, color, religion, creed, national origin or ancestry, ethnicity, sex, sexual orientation, gender (including gender identity and expression), marital or familial status, age, physical or mental disability, perceived disability, citizenship status, service in the uniformed services, genetic information, or any other characteristic protected under applicable federal, state, or local law. Applications from members of minority groups and women are encouraged.

 

© Copyright CompuForce 2025 – All rights reserved

we are all divisions of

The TemPositions Group of Companies