We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cyber Security Analyst, Information Technology

Lipscomb University
United States, Tennessee, Nashville
Oct 22, 2025
Description

Essential Job Functions:

The Security Analyst position is responsible for the day-to-day operation of information security controls and training university employees on security policies and procedures.

Typical Duties and Responsibilities:



  • Security Monitoring: Continuously monitoring network and system logs, security tools, and intrusion detection/prevention systems to identify suspicious or malicious activities.
  • Incident Detection and Response: Analyzing security alerts and investigating potential security breaches or incidents. Respond promptly to contain and mitigate the impact of any security breaches.
  • Vulnerability Assessment: Conducting regular vulnerability assessments to identify weaknesses in the organization's systems and applications. This includes using scanning tools and performing manual tests.
  • Threat Intelligence Analysis: Staying up-to-date with the latest cybersecurity threats and trends by analyzing threat intelligence reports and collaborating with cybersecurity forums and communities.
  • Security Policy Enforcement: Enforcing security policies and procedures throughout the organization to ensure compliance with industry regulations and best practices.
  • Security Incident Documentation: Documenting all security incidents, including their analysis, response actions, and outcomes, for future reference and improvement.
  • Security Awareness and Training: Conducting cybersecurity awareness programs to educate employees about security best practices and potential risks.
  • Create and participate in Incident Response Tabletop exercises to test policies and procedures.
  • Endpoint Security Management: Managing and maintaining endpoint security solutions, including endpoint detection and response (EDR) and other monitoring tools.
  • Data Protection: Assisting in the implementation and maintenance of data encryption and data loss prevention (DLP) measures.
  • Security Incident Forensics: Performing digital forensics analysis on security incidents to determine the root cause and extent of the compromise.
  • Security Reports and Recommendations: Preparing security reports on a regular basis or as needed, summarizing incidents, trends, and security risks. Providing recommendations for improving the organization's security posture.
  • Security Tool Management: Managing and maintaining security tools to optimize their effectiveness.
  • Security Patch Management: Collaborating with IT Support to ensure timely patching and updates of systems and software to address known vulnerabilities.
  • Security Incident Coordination: Collaborating with other teams, such as IT Support, General Counsel, and management, during security incidents to ensure a coordinated response.


Judgment Required:

This position requires making informed decisions in various areas, including threat response analysis, vulnerability assessments, incident response, and risk management. Strong analytical skills, technical expertise, and the ability to weigh options and outcomes are all vital; however, policies and procedures must also strike a balance between security and usability.

Job Specifications/Position Qualifications (minimum):



  • Experience managing endpoint detection and response systems
  • Experience managing data loss protection tools
  • Experience managing phishing and Email security tools
  • Experience with cyber incident response
  • Experience in cyber-security investigation
  • Experience with cybersecurity user training tools
  • Understanding of current cyber legislation requirements
  • Understanding of cybersecurity best practices and their application in a non-corporate environment.
  • Understanding of risk management and prioritization of risk
  • Understanding of Incident Response steps
  • Understanding of cyber attack frameworks


Education: Degree in Information Security or equivalent professional certification and cybersecurity experience.

Experience: Minimum of 1 year of hands-on experience in the cybersecurity field

Licensure/Certification: Security+ certification or a similar cybersecurity certification is preferred but not required.

Personal Interaction/Communications: Works independently and is self-sufficient. Work routinely requires teamwork and cooperation with numerous individuals and groups, and daily written and verbal communications with other members of IT as well as students and employees outside the department.

Qualifications
Education
Bachelors of Information Technology (preferred)
Equal Opportunity Employer

This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights notice from the Department of Labor.
Applied = 0

(web-c549ffc9f-b5mrm)