Georgia State University
Atlanta, Georgia

Security Analyst, Associate

Onsite$52,000 – $57,000/yrPosted 6 days agoWebsiteLinkedIn

Skip the busywork

ApplyBolt rewrites your resume for this exact role and hits submit. You just pick the jobs.

Resume tailored to this roleApplied in secondsTrack every application
Download the app

About this role

%3Cp class=%22MsoNoSpacing%22 style=%22text-align:center;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:14.0pt;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Cstrong%3ESecurity Analyst, Associate%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22 style=%22text-align:center;%22%3E%3Cspan style=%22color:black;font-family:%26quot;Arial%26quot;,sans-serif;font-size:14.0pt;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-themecolor:text1;%22%3E%3Cstrong%3EGeorgia State University%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22 style=%22text-align:center;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:14.0pt;%22%3E%3Cb style=%22mso-bidi-font-weight:normal;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;%22%3E%3Cstrong%3EInstructional Innovation and Technology%3C/strong%3E%3C/span%3E%3C/b%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22 style=%22text-align:center;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:14.0pt;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3E%3Cstrong%3ECyber Security Practice%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNoSpacing%22 style=%22text-align:center;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EWhy Work at Georgia State University (GSU)?%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EAre you ready to help transform lives through academic excellence, innovative technology, research, and strong community partnerships? Georgia State University is ranked among the Top 5 Most Innovative Universities by U.S. News %26amp; World Report (2025). As a dynamic research institution, GSU offers a collaborative and intellectually stimulating environment for staff, faculty, and students alike.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EJoin us in driving digital transformation in higher education and making a meaningful impact on our community. GSU’s vibrant culture, career growth opportunities, comprehensive benefits, and core values—respect, integrity, collaboration, and accountability—make it an employer of choice within the University System of Georgia.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EWhat Makes GSU a Great Place to Work?%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l10 level1 lfo2;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EGenerous benefits, including health, dental, vision, tuition assistance, and retirement plans.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l10 level1 lfo2;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EA flexible work environment that supports work-life balance.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l10 level1 lfo2;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EA knowledge-sharing organization that collaborates with various partners.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EWhy join our team in the Instructional Innovation and Technology (IIT) Division?%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-bottom:0in;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EThe IIT division is the hub for innovation, supporting learning, student success, research, and economic development. Here’s what makes IIT a great place to work:%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l9 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EOpportunities for professional development and career advancement%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l9 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EAccess to cutting-edge technologies%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l9 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EA collaborative and creative team culture%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;mso-list:l9 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EA strong sense of purpose and impact in our work%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-bottom:0in;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EPosition Overview:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EGeorgia State University’s Instructional Innovation and Technology (IIT) division is seeking a highly skilled and motivated %3C/span%3E%3C/span%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3ESecurity Analyst, Associate%3C/strong%3E%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E. Under the general supervision of the Information Security Manager, the Security Analyst, Associate supports proactive risk management planning and activities, essential to reducing business and IT risks. Examples include - performing continuous vulnerability management, conducting risk assessments and developing remediation roadmaps, and developing and maturing cyber security awareness to fundamentally change the behavior of our users and ultimately change the culture of security at GSU.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3ENOTE:%3C/strong%3E This role requires on%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Cambria Math%26quot;,serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:%26quot;Cambria Math%26quot;;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E‑%3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3Esite work. Remote or hybrid work options are not available for this position.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EKey Responsibilities%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EThe scope of responsibilities for this position will include but is not limited to the following essential duties:%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EResearch and Policy Development%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22line-height:115%;margin-bottom:0in;mso-add-space:auto;mso-list:l3 level1 lfo3;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EPerform targeted research to identify security solutions, policies, and practices that support the goals and objectives defined in the Information Security Annual plans and Information Security Management System objectives/goals.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3ESecurity Services Deployment%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l4 level2 lfo5;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EDeploy information security services accessible to departmental information security staff and the general university population to increase the overall security of their systems and the campus network.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin:0in 0in 0in .5in;mso-list:l4 level2 lfo5;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3ECreate and maintain necessary documentation and procedures to support new and current information technology security tools and solutions.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EIntrusion Detection and Analysis%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l5 level2 lfo7;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EAssist with conducting advanced intrusion detection and analysis utilizing information security monitoring systems.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l5 level2 lfo7;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EWork in tandem with other IIT personnel to diagnose and mitigate security incidents and threats to university IT resources and data.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin:0in 0in 0in .5in;mso-list:l5 level2 lfo7;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EConfigure and maintain information security solutions ensuring optimum levels of effectiveness and usage.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EStakeholder Collaboration%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l8 level2 lfo9;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EWork with GSU stakeholders and teams across the university’s college and business units, as well as third-party vendors for services such as Critical Infrastructure Systems, Networks, Applications, and cloud systems.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l8 level2 lfo9;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EAssist with supporting IaaS (Infrastructure as a Service), PaaS (Platform as a Service), MaaS (Monitoring as a Service), MDM (Mobile Device Management), CAMP (Cloud Application Management for Platforms), DaaS (Desktop as a Service), HPC (High Performance Computing), MSS (Managed Security Services), and XaaS (Anything as a Service).%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l8 level2 lfo9;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EIncrease responsibility in the successful implementation of standards such as NIST 800-171 and SANS Critical Controls.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22color:#4524E8;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3ECyber Security Program Support%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l7 level2 lfo11;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EUnder supervision, support the Georgia State University Cyber Security program in determining tools and procedures required to preserve, collect, and analyze electronically stored information (ESI) in a forensically sound manner.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin-left:.5in;mso-list:l7 level2 lfo11;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EPerform expert collection of ESI in accordance with best practice Forensics laboratories and standards.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin:0in 0in 0in .5in;mso-list:l7 level2 lfo11;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3EPerform required reporting and documentation and maintain the chain of custody of computer forensics evidence.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin:0in 0in 0in .25in;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;margin:0in;mso-list:l2 level2 lfo10;text-indent:0in;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:115%;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-fareast-font-family:Aptos;mso-font-kerning:1.0pt;mso-ligatures:standardcontextual;%22%3E%3Cstrong%3EApplication Deadline:%3C/strong%3E Applications must be submitted by March 18, 2026 (subject to change without notice).%3C/span%3E%3C/span%3E%3C/p%3E
%3Cp class=%22MsoNormal%22 style=%22margin-bottom:0in;%22%3E%3Cspan style=%22background-color:white;color:black;font-family:Arial;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-color-alt:windowtext;%22%3E%3Cstrong%3E%3Cu%3EMinimum Hiring Qualifications:%26nbsp;%3C/u%3E%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22margin-bottom:0in;%22%3E%3Cspan style=%22background-color:white;color:black;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-color-alt:windowtext;%22%3EBachelor%27s degree and one year of related experience; or a combination of education and related experience.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22margin-bottom:0in;%22%3E%3Cspan style=%22background-color:white;color:black;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-color-alt:windowtext;%22%3E%3Cstrong%3E%3Cu%3EPreferred Hiring Qualifications:%26nbsp;%3C/u%3E%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22background-color:white;line-height:normal;margin-bottom:0in;vertical-align:middle;%22%3E%3Cspan style=%22color:black;font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-color-alt:windowtext;mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EPreference may be given to applicants who, in addition to meeting the Minimum Qualifications, possess the following:%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EAbility to Provide Level 1 intrusion detection and information security incident analysis and support Level 2 staff.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EAbility to Mitigate Level 1 alerts and events; provide remediation and/or assistance where needed.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EAbility to analyze and detect sophisticated and nuanced attacks and discern false positives; provide results to information security incident handling staff%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EAbility to perform correlation of NIDS and HIDS logs with other records such as firewall/proxy logs, anti-virus, server audit trails and risk/vulnerability information obtained from other information security staff%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EStrong TCP/IP networking skills%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EDegree of packet analysis experience%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EAdministrator level 1 knowledge of UNIX and/or Windows systems%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EHands-on experience conducting in depth analysis using defined and undefined exploit and attack signatures to determine impact of an anomalous event and if it constitutes a false positive%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22mso-fareast-font-family:%26quot;Times New Roman%26quot;;%22%3EHands-on experience utilizing intrusion detection/prevention heuristic analysis tools%3C/span%3E%3C/span%3E%3C/p%3E%3Cp%3E%3Cspan style=%22font-family:%26quot;Arial%26quot;,sans-serif;font-size:12.0pt;%22%3E%3Cspan style=%22line-height:107%;mso-ansi-language:EN-US;mso-bidi-language:AR-SA;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-fareast-language:EN-US;%22%3EIntrusion detection analysis training and work experience%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:normal;mso-margin-bottom-alt:auto;mso-margin-top-alt:auto;%22%3E%26nbsp;%3C/p%3E
*!

To be fully considered for this position, all candidates at the time of submission must submit the following documents that clearly provide proof of education and relevant experience.

  • A complete and accurate GSU application
  • Resume
  • Three professional references. One must be a current or former supervisor.