Virginia Tech® home

Job Architecture Search

Analyst, IT Security

Classification Information

IT Security
IT Security evaluates, tests, recommends, coordinates, monitors, and maintains information systems and cyber security policies, procedures and systems, including access management for hardware, firmware, and software.
Individual Contributor
In an individual contributor role, the positions work is primarily achieved through individual efforts or by participating as part of a team. Individual contributors may: Coordinate, influence, or review the work of others. Be the authority on a given program or process. Lead teams. A range of knowledge, complexity, autonomy, and impact may be needed to achieve results at certain levels. Individual contributor roles are reflected in the Academic Administration, Development, General Administration, Technical/STEM, and C1-C4 of the Clinical tracks.
Level 2
Intermediate: These positions require some experience and education but are not expected to act independently.
T - Technical/STEM
Technical roles, including technology and research.

Position Summary

The IT Security Analyst plays a key role in supporting the university’s efforts to protect information systems and ensure the integrity and confidentiality of data. In this position, the analyst is responsible for evaluating, testing, and monitoring IT security systems, ensuring compliance with policies and regulatory requirements. The analyst assists in implementing and managing security solutions such as firewalls, intrusion detection systems, and encryption technologies. Additionally, the role involves the identification, analysis, and mitigation of potential security risks across the institution’s network, software, and hardware platforms. In this intermediate-level position, the IT Security Analyst collaborates with team members and other departments to enforce security best practices and improve overall cybersecurity posture. The analyst supports the day-to-day operations of IT security, including user access management, security audits, vulnerability assessments, and incident response. By performing regular security scans and vulnerability assessments, the analyst helps identify areas of improvement and assists in troubleshooting security-related issues. The role also requires assisting in the development of security protocols, providing recommendations for improvements, and documenting security incidents and resolutions. The IT Security Analyst is responsible for maintaining security logs, monitoring real-time threats, and responding to security incidents. They work closely with senior IT security personnel to develop and implement strategies for enhancing security infrastructure and protocols. Additionally, the analyst contributes to the continuous improvement of the IT security environment by staying up-to-date with the latest cyber threats, security trends, and emerging technologies. This role provides valuable support in ensuring the security and integrity of the university's IT systems and helps mitigate the risks associated with cyberattacks and data breaches.