Information Security Analyst - Jacksonville, FL

Job Summary

The Wounded Warrior Project (WWP) Information Security Analysts serves as a subject matter expert regarding the security effectiveness and posture of WWP’s technology infrastructure and information. This position monitors and investigates security events and educates the organization regarding security best practices.

Essential Duties & Responsibilities

  • Contribute to the development and implementation of security strategies, platforms and overall architecture
  • Monitor security platforms and solutions
  • Monitor security event management platform (SIEM) events
  • Serve as security subject matter expert to organization and vendors
  • Define, measure and report on security metrics
  • Provide technical guidance to other IT teammates
  • Conduct research and remain current with the latest security trends and threats
  • Investigate, remediate, and report on security threats and incidents
  • Evaluate new technologies and processes that enhance security capabilities
  • Monitor data encryption and data loss prevention solutions
  • Perform vulnerability scans, risk analysis and security assessments, and assists with remediation efforts
  • Analyze existing security measures and recommends improvements
  • Participate in the evaluation, selection, and implementation of technology solutions
  • Prepare and maintain security documentation to include the development of security training
  • Other related duties as assigned


Knowledge, Skills & Abilities

  • Strong knowledge of identity management, access controls, permissions and privileges, encryption, web security, intrusion prevention and data loss prevention
  • Passionate about technology and solving IT security challenges
  • Ability to work effectively with staff, peers, and others in and outside the organization to accomplish goals, objectives and to identify and resolve problems
  • Strong documentation and training skills
  • Highly analytical - strong problem analysis/diagnostic and resolution skills
  • Strong configuration and design skills
  • Self-motivated and able to work within a project-based environment; takes initiative to drive projects to completion
  • Demonstrated ability to work independently
  • Exercise confidentiality and good judgment when working with sensitive issues
  • Excellent verbal and written communication skills with ability to effectively communicate with users of diverse backgrounds and skill levels
  • Unequivocal commitment to the highest standards of personal and business ethics and conduct
  • Excellent organizational and multi-tasking skills
  • Contribute to a positive work environment and overall team effort in the department and organization
  • Ability to influence others without having direct authority
  • Ability to work well under pressure and handle multiple projects and deadlines
  • Exceptional interpersonal skills; team player
  • Ability to work in an extremely fast paced and changing environment
  • Independent thinker with the ability to utilize critical and analytical skills in problem solving
  • Strong problem determination and resolution skills
  • Team-oriented and a desire to engage with others on day to day activities
  • Demonstrated experience with defense in depth, access controls, privileges and permissions
  • Demonstrated experience with defining security strategies and architecture
  • Deep-seated experience with recent Microsoft desktop and server operating systems
  • Proficient with Microsoft Office and Visio

Education & Experience Requirements

  • Bachelor’s degree in Computer Science, Information Systems, or other related field or equivalent work experience required
  • Minimum of three (3) years of experience working in information security required
  • Minimum of three (3) years of experience performing incident and vulnerability management required
  • Minimum of one (1) year of experience working with software and hardware vendors preferred


Certifications & Licensure Requirements

  • Information Security certifications preferred (CISSP, CISM, CEH)






Back to top