Information Security Analyst
Eliassen Group
About the role
Job Title
Information Security Analyst
Location
Cranberry Township, PA
Type
Permanent
Category
Engineer
Industry
Manufacturing
Date Posted
03/02/2026
Description
Hybrid 3 in Cranberry Township, PA
Join our team as an Information Security Analyst and play a key role in protecting our organization's valuable information systems and data. In this dynamic position, you will actively monitor security events, analyze vulnerabilities, and effectively respond to incidents to enhance our security posture. We seek a dedicated individual with practical experience in SIEM, EDR, and vulnerability management tools, as well as a solid understanding of networking and operating systems.
This is a full-time, permanent opportunity that offers a competitive salary and an extensive benefits package. Applicants must be willing to work on a W2 basis.
Salary
$70,000 - $80,000/ yr. w2
Key Responsibilities
- Utilize security tools such as SIEM, EDR, IDS/IPS, firewalls, and cloud security platforms to monitor for threats.
- Examine alerts and events to pinpoint potential security incidents.
- Engage in all aspects of incident management including detection, containment, eradication, and recovery.
- Conduct vulnerability scans and interpret results to prioritize remediation efforts.
- Assist with risk assessments and comprehensive security audits.
- Support the configuration and maintenance of various security technologies.
- Maintain thorough documentation of incidents, dashboards, and reports.
- Promote security awareness through initiatives and training programs.
- Analyze and correlate security logs effectively.
- Track remediation activities and escalate any significant delays as necessary.
- Implement security best practices focusing on availability, integrity, confidentiality, risk management, threat modeling, monitoring, incident response, access management, and business continuity.
- Complete additional duties as assigned.
Qualifications
- Minimum of 2 years of experience in cybersecurity or IT security operations.
- Hands-on experience with SIEM platforms like Rapid7, Splunk, or Microsoft Sentinel.
- Familiarity with vulnerability management tools such as InsightVM, Nessus, or Qualys.
- Experience with EDR platforms including CrowdStrike, Sophos, or FireEye.
- Solid understanding of networking concepts including TCP/IP, DNS, VPN, and firewalls.
- Proficiency in Windows and/or Linux operating systems.
- Experience with cloud security tools is advantageous.
- Basic knowledge of threat hunting practices is preferred.
- Familiarity with DevSecOps practices is a plus.
Education
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field; or equivalent experience.
- CompTIA Security+ certification is preferred.
- CompTIA CySA+ certification is preferred.
Join us in making a difference in our organization and the communities we serve!
Requirements
- Minimum of 2 years of experience in cybersecurity or IT security operations.
- Hands-on experience with SIEM platforms like Rapid7, Splunk, or Microsoft Sentinel.
- Familiarity with vulnerability management tools such as InsightVM, Nessus, or Qualys.
- Experience with EDR platforms including CrowdStrike, Sophos, or FireEye.
- Solid understanding of networking concepts including TCP/IP, DNS, VPN, and firewalls.
- Proficiency in Windows and/or Linux operating systems.
Responsibilities
- Utilize security tools such as SIEM, EDR, IDS/IPS, firewalls, and cloud security platforms to monitor for threats.
- Examine alerts and events to pinpoint potential security incidents.
- Engage in all aspects of incident management including detection, containment, eradication, and recovery.
- Conduct vulnerability scans and interpret results to prioritize remediation efforts.
- Assist with risk assessments and comprehensive security audits.
- Support the configuration and maintenance of various security technologies.
- Maintain thorough documentation of incidents, dashboards, and reports.
- Promote security awareness through initiatives and training programs.
- Analyze and correlate security logs effectively.
- Track remediation activities and escalate any significant delays as necessary.
- Implement security best practices focusing on availability, integrity, confidentiality, risk management, threat modeling, monitoring, incident response, access management, and business continuity.
- Complete additional duties as assigned.
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free