Desktop Support & Security Analyst handling technical support and cybersecurity for the WHOI. Balancing responsibilities between End-User Technology support and Information Security operations while ensuring user functionality.
Responsibilities
Independently configure, deploy, maintain, troubleshoot, and support computer workstations, laptops, mobile devices, and A/V equipment across Windows, Apple, and Linux operating systems
Provide high-level technical support for computer-controlled scientific instrumentation and a variety of devices in the BYOD environment
Provide guidance and mentorship to other End User staff
Identify trends in issue reporting, develop long-term solutions, and seek opportunities for continuous improvement and automation of End User Technology processes
Develop curriculums, organize classes, and create videos to educate end-users and IS staff on new and implemented technologies
Assist in the management of the Institution's authentication and IAM systems and processes (Cloud/2FA/AD/LDAP)
Assist in the maintenance and operation of the Institution’s network security perimeters (firewalls, intrusion detection systems, analytics)
Diagnose and remediate information security issues on systems, including problems arising from viruses, malware, and improper system configuration
Work with IS Security staff to satisfy DoD security requirements across both restricted and general environments
Requirements
Bachelor’s degree in related field, or at least five (5) years of related experience
Strong experience diagnosing and resolving complex technical and security issues on Windows, MacOS, and Linux operating systems
Solid understanding of local and Internet networks, client/server environments, basic cybersecurity procedures, and fundamental principles of Identity & Access Management
Familiar with IT network infrastructure components and related technologies, such as switches, routers, TCP/IP, DNS, (DHCP/Static IP), wireless
Proficient with mobile platforms technologies such as iPhone, iPad, Android, Surface
Ability to obtain a DoD security clearance at level Secret or above
Strong ability to communicate effectively with both technical and non-technical personnel about computer and security matters
Information Security Analyst managing risk and compliance controls at USAA. Collaborating with key stakeholders to enhance information security and regulatory compliance processes.
Security Analyst managing security and compliance programs for fintech startup. Ensuring policies and evidence stay organized and collaborate with Head of Security for execution.
IT Security Analyst overseeing internal audits, security assessments, and compliance for CMC’s IT operations. Engaging in risk management and policy development while collaborating with cross - functional teams.
Specialist in PingFederate, PingDirectory and PingID for IAM infrastructure management. Collaborating with teams for stable operation and development in Cotia.
Senior Security Analyst developing and implementing security strategies for logistics operations. Focus on risk assessment, staff training, and policy compliance.
IT Security Analyst supporting the Supreme Court of Nevada in safeguarding judicial information systems. Implementing security controls, maintaining compliance, and conducting security assessments in a collaborative environment.
Information Security Analyst SME protecting information assets by designing and maintaining security policies. Ensuring compliance with security standards in a tech services company focused on digital transformation.