Full-Time

Staff IT Security Analyst

Information Security, Cloud Security

Posted on 10/29/2025

Deadline 11/4/25
WGU

WGU

Compensation Overview

$140.2k - $217.2k/yr

+ Bonuses + Bonuses for the role? + Eligible for bonuses

Salt Lake City, UT, USA + 1 more

More locations: Raleigh, NC, USA

In Person

On-site roles based in Salt Lake City, UT or Raleigh, NC; no remote option stated.

Category
IT & Security (4)
, , ,
Requirements
  • Bachelor's Degree in IT Security, Computer Science, Engineering, or related field
  • 7 years of Information Security experience, including understanding of all security domains
  • Hands-on experience implementing MITRE ATT&CK Framework
  • Working experience creating, designing, and implementing SIEM content security rules to detect malicious, suspicious, and/or abnormal events
  • Hands-on experience maintaining cloud resources using infrastructure-as-code (CloudFormation, CDK, etc.)
  • Expert scripting language experience (Bash, Python, etc.) with strong working knowledge of automation
  • Experience with open-source security tools (i.e. Kali, Nessus, Fortify, AppScan, Nexpose, SAINT, Burp, NMap, Metasploit, Meterpreter, Wireshark, Kismet, Aircrack-ng, Eramba, etc)
  • Hands-on experience with AWS APIs, Lambda. DynamoDB, EC2, VPC, CloudFront, CloudTrail, CloudWatch, IAM
  • Relevant security certifications (CISSP, GIAC, ISACA, CEH, etc.)
  • Equivalent relevant experience performing the essential functions of this job may substitute for education degree requirements. Generally, equivalent relevant experience is defined as 1 year of experience for 1 year of education and is the discretion of the hiring manager.
Responsibilities
  • Monitor and analyze alerts from multiple data sources (SIEM, SOAR, UEBA, EDR, email gateways, cloud logs).
  • Lead investigations of complex incidents across hybrid (cloud/on-prem) environments.
  • Perform threat hunting and correlation of Indicators of Compromise (IoCs) using the MITRE ATT&CK framework.
  • Develop, tune, and maintain detections, alerting, and rules to improve signal-to-noise ratio and reduce alert fatigue.
  • Ensure proper data points are captured for calculating risk and detecting abnormalities in large datasets.
  • Research and deconstruct cyber-attacks into sequenced IOCs detectable through network device logs.
  • Lead the development and automation of SOC toolsets for real-time, automated configuration and control of cloud-based and software-defined infrastructure.
  • Maintain responsibility for automation and software delivery of security tools using CI/CD processes.
  • Design and implement SOAR functions to automate compliance enforcement, configuration management, and malicious activity remediation.
  • Collaborate with engineering teams to ensure complete log ingestion, data normalization, and data quality.
  • Integrate SOC tooling with ServiceNow and other enterprise systems for case management and workflow automation.
  • Lead the development of security content and use cases aligned to the MITRE ATT&CK Framework.
  • Design and document enterprise-wide detection logic and architectural policies from definition to implementation.
  • Conduct ROI and gap analyses for both new and existing tools and detections.
  • Create new detection processes and identify emerging threats and mitigation strategies.
  • Serve as escalation point for Tier 1–2 analysts; provide mentorship, QA, and technical guidance.
  • Drive continuous improvement in Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
  • Support post-incident reviews, root cause analyses, and executive reporting.
  • Document investigations, case notes, and lessons learned in alignment with SOC SOPs.
  • Participate in on-call rotations and after-hours escalations.
  • Engage with Security Architects to capture design requirements for cloud architectures and implementation strategies.
  • Identify gaps in the University’s security model and propose improvements in tools and processes.
  • Conduct requirements gathering, architecture design, and integration planning for SOC initiatives.
  • Perform ROI and risk analyses to support executive decision-making.
  • Ensure compliance and alignment with organizational cybersecurity frameworks and policies.
  • Act as team lead or project manager when required, managing internal SOC and security projects end-to-end.
  • Manage multiple simultaneous projects and tasks involving different teams.
  • Build and maintain strong cross-departmental relationships to promote security initiatives and awareness.
  • Mentor SOC analysts and engineers to enhance skills in investigation, detection engineering, and automation.
  • Research and stay current on emerging tools, threats, and technologies.
  • Identify and facilitate technical training opportunities for staff.
Desired Qualifications
  • 15 years of Information Security experience, including understanding of all security domains
  • Strong experience with distance education and distance learning students

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A

INACTIVE