Protect company networks and data through security monitoring (SIEM), vulnerability assessments and penetration testing, incident response, firewall/encryption management, audits for compliance, vendor risk reviews, employee security training, and policy development.
An Information Security Analyst is the digital "guardian" of a company's data. Their primary mission is to protect the organization's computer networks and systems from cyberattacks, data breaches, and unauthorized access.
Core Roles & Responsibilities
- Security Monitoring: Using SIEM (Security Information and Event Management) tools like Splunk or IBM QRadar to monitor network traffic for suspicious activity.
- Vulnerability Assessment: Conducting regular scans and Penetration Testing to find "holes" in the company's defenses before hackers do.
- Incident Response: Leading the "fire drill" when a breach occurs—containing the threat, investigating the root cause, and restoring secure operations.
- Firewall & Encryption Management: Setting up and maintaining Firewalls and data encryption programs to protect sensitive "data at rest" and "data in transit."
- Security Auditing: Performing internal audits to ensure the company meets regulatory standards like SOC2, ISO 27001, or HIPAA.
- Risk Assessment: Evaluating the security of third-party vendors and new software before they are integrated into the company ecosystem.
- Employee Awareness Training: Educating staff on how to spot Phishing emails and follow "clean desk" policies to prevent human-error breaches.
- Policy Development: Drafting and enforcing the "rules of the road," such as Password Policies and Access Control (who gets to see what data).
Essential Technical Stack
- Endpoint Protection: Mastery of tools like CrowdStrike or SentinelOne.
- Cloud Security: Securing environments in AWS, Azure, or Google Cloud.
- Networking: Deep knowledge of TCP/IP, DNS, and VPN protocols.
Top Skills
Splunk,Ibm Qradar,Siem,Crowdstrike,Sentinelone,Aws,Azure,Google Cloud,Firewall,Encryption,Tcp/Ip,Dns,Vpn,Penetration Testing,Soc2,Iso 27001,Hipaa,Endpoint Protection,Cloud Security
Similar Jobs
Insurance • Financial Services
The Information Security Analyst I monitors and analyzes security-related activities, identifies data risks, and supports information security investigations and compliance efforts.
Top Skills:
Data Loss Prevention TechnologiesNetwork+Security+
Security
The Information Security Compliance Analyst manages digital risk, supports audits, promotes security awareness, and ensures compliance with cybersecurity policies.
Top Skills:
CisNist Csf
Healthtech
The Sr. IT Security Analyst manages IT security and risk across the enterprise, conducts vulnerability assessments, develops security policies, and coordinates with vendors. They also provide training and report on risk remediation efforts.
Top Skills:
CisspMicrosoft Windows EnterpriseNetworkingNist Cybersecurity Framework
What you need to know about the Boston Tech Scene
Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.
Key Facts About Boston Tech
- Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
- Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
- Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
- Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
- Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories



