security analyst

Location: Cincinnati, OH

Direct Hire 


Lead Security Analyst

This position is a member of the Cyber Threat/Incident Response team which is part of the Enterprise Information Security Group (EISG).  This role is expected to provide technical expertise and drive the strategy of continually assessing threats and maturing the Cyber Threat program within the company.  This position is responsible for managing the tools and technologies supporting intrusion detection and prevention at both the network and endpoint. The ideal candidate will have a strong network infrastructure and security operations background and be willing to multi-task between multiple projects and initiatives.  The environment consists of multiple locations, a complex architecture and involves significant collaboration with numerous IT and business functions.


  • Ensure intrusion detection and prevention technologies are implemented and managed including hands-on technical expertise 
  • Ensure endpoint protection technologies are implemented and managed  including hands-on technical expertise
  • Perform incident triage and remediation activities as needed
  • Develop and implement security strategies for the overall protection of the enterprise network
  • Identify IT Security risks and evaluate and propose mitigation strategies
  • Lead the Security Information and Event Management solution
  • Stay current and maintain a knowledge of industry threats, trends, and security technologies 
  • Mentor security operations and other team members as appropriate
  • Create logical and physical architecture diagrams as needed


  • College degree in technology / sciences or equivalent work experience
  • CISSP, GIAC or other security credential preferred 
  • 5-7 years of experience with security operations and incident response
  • Proven hands-on experience with network and endpoint security solutions such as threat hunting solutions (signature, reputation, and behavior based) firewalls, IDS/IPS, proxies, VPNs, malware protection, etc.
  • In-depth understanding of TCP/IP and networking
  • Experience with Linux, Mac and Windows operating systems
  • Experience with reverse engineering of malware a plus
  • Scripting experience a plus