Information Security Analyst 1

The Church of Jesus Christ of Latter-day SaintsRiverton, UT
5dHybrid

About The Position

The Information Security Analyst 1 is an entry level, professional role that works on assignments with clear instruction and moderate supervision using designated tools and processes to monitor systems and networks. The primary purpose of monitoring systems and networks is to identify unusual or abnormal activity and report potential incidents through the appropriate channels for further investigation. This is an individual contributor role.   This is a US-based hybrid role, but non-local exceptions may be approved under special circumstances.   This individual works with divine guidance to provide or support technology that furthers the mission of the Church and reflects the eternal impact of the gospel. We value early, mid and late-career candidates and encourage all applicants with the posted skills and abilities to apply. Church employees find joy and satisfaction in using their unique talents and abilities to further the Lord’s work. From the IT professional who develops an app that sends the gospel message worldwide, to the facilities manager who maintains our buildings— giving Church members places to worship, teach, learn, and receive sacred ordinances—our employees seek innovative ways to share the gospel of Jesus Christ with the world. They are literally working in His kingdom. Only members of the Church who are worthy of a temple recommend qualify for employment. Apart from this, the Church is an equal opportunity employer and does not discriminate in its employment decisions on any basis that would violate U.S. or local law. Qualified applicants will be considered for employment without regard to race, national origin, color, gender, pregnancy, marital status, age, disability, genetic information, veteran status, or other legally protected categories that apply to the Church. The Church will make reasonable accommodations for qualified individuals with known disabilities.

Responsibilities

  • monitor systems and networks
  • identify unusual or abnormal activity
  • report potential incidents through the appropriate channels for further investigation
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service