• Security Analyst

    Job Locations US-NC-Cary
    Job ID
    Hosting Operations
  • Overview

    At MercuryGate, every solution we create is designed to be The Future of Delivery. This same attribute applies to our dedicated team members, whose expertise and dedication have made MercuryGate an industry leader.


    As a member of our team, you will have the ability to work on projects for Fortune 500 companies, contributing actively in supporting their strategic initiatives. This opportunity will build your knowledge base and allow you to interact with some of the world’s most respected companies.


    Are you ready to work in a fun, fast-paced and energetic environment that challenges you and rewards you for innovation, creativity and initiative? If so, come play with the MercuryGate team of champions by applying for our Security Analyst opportunity today!

    Job Summary & Key Responsibilities

    As a security analyst, you will partner with other functions in the organization to manage and monitor our security practices and tools.

    The Security Analyst participates in the identification, tracking, and monitoring of information security threats and service operations. The candidate utilizes and enhances established processes and tools to focus on incident response, threat identification, analyses, and remediation. This position participates in the implementation and integration of risk management procedures. This role requires a strong team player that partners well with other functions.



    • Assist with building and maintaining information security related policies, standards, and procedures 
    • Daily review of SIEM to monitor activities within the company environments
    • Weekly review of Vulnerability Scans 
    • Weekly delivery of security awareness presentation for new hires
    • Ad Hoc assistance with virus/malware events 
    • Periodic work area assessments to validate physical security controls are in place at employee workstations
    • Assist with incident response activities
    • Quarterly access management reviews of key systems
    • Perform control validations on key systems


    Job Qualifications & Other Requirements

    • 3 years’ experience in an information security operational role with experience on one or more other security concepts such as Vulnerability Management, SIEM/SOC, administering and troubleshooting Security Incident and Event Management appliances etc.
    • The ability to certify and maintain information security related certification such as GSEC, Security+, CCNA Security. CISSP, CISA, CISM, etc. nice but not required. 
    • A Bachelor’s Degree ideally in Computer Science or equivalent experience
    • Thorough knowledge of networking protocols, TCP/IP and OSI layers, capturing, analyzing and troubleshooting network traffic and logs
    • Knowledge of NIST/ISO standards and regulatory requirements 
    • Effective analytical and problem solving skills 
    • Excellent communication skills 
    • Efficient organizational, multitasking, and time management abilities 
    • Aptitude to work independently, as well as in diverse teams across multiple IT disciplines 
    • Understanding of the current threat landscape and common attack types over network, web applications, wireless, and social engineering


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.