Virginia Tech® home

Job Architecture Search

Analyst, Information Security

Classification Information

Information Security
Information Security provides security engineering, risk management, design, access and identity control, operational support, and consultation. Provides policy and governance oversight; security operational services; set-up, verification, and audit of user access and authorizations; and risk analysis and response.
Individual Contributor
In an individual contributor role, the positions work is primarily achieved through individual efforts or by participating as part of a team. Individual contributors may: Coordinate, influence, or review the work of others. Be the authority on a given program or process. Lead teams. A range of knowledge, complexity, autonomy, and impact may be needed to achieve results at certain levels. Individual contributor roles are reflected in the Academic Administration, Development, General Administration, Technical/STEM, and C1-C4 of the Clinical tracks.
Level 2
Intermediate: These positions require some experience and education but are not expected to act independently.
T - Technical/STEM
Technical roles, including technology and research.

Position Summary

An Analyst within Information Security plays a key role in supporting the organization’s security initiatives by monitoring, analyzing, and ensuring the protection of sensitive data and IT systems. This position involves working as part of a team to assess and mitigate risks, respond to security incidents, and maintain the integrity of access controls and user permissions. The Analyst is responsible for assisting in the development and enforcement of security policies, procedures, and protocols, ensuring that the organization’s information security infrastructure is both robust and compliant with industry standards. In this intermediate-level role, the Analyst works under the guidance of more experienced team members to assist with various security tasks, including risk assessments, vulnerability scanning, and the implementation of security measures. They actively participate in the monitoring of security systems, responding to alerts and incidents, and conducting forensic analysis in the event of a security breach. The Analyst also plays a part in the setup, verification, and auditing of user access and authorizations to ensure that the organization’s IT systems are protected from unauthorized access or misuse. The Information Security Analyst also contributes to continuous improvement by identifying potential weaknesses in the organization’s security infrastructure and suggesting enhancements. They collaborate closely with other teams within IT to ensure seamless integration of security practices into day-to-day operations and projects. Additionally, the Analyst supports the training of employees on security best practices and ensures that the organization remains compliant with internal policies and external regulations. This role is critical in maintaining a proactive security posture and supporting the overall cybersecurity strategy of the organization.