Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

IT Security Analyst

Student Activities Board
Grantham
1 week ago
Create job alert

Jobs.messiah.edu

  • Home
  • Search Jobs
  • Log In /Create Account
  • Help
  • FAQs
  • Human Resources & Compliance
  • Office of the Provost
  • Student Employment
  • Graduate Studies

IT Security Analyst

Below you will find the details for the position including any special instructions, supplementary documentation and questions you should review before applying for the opening. To apply for the position, please click the Apply for this Job link.

If you would like to bookmark this position for later review, click on the Bookmark this Posting link. If you would like to print a copy of this position for your records, click on the Print Preview link.

Bookmark this Posting Print Preview | Apply for this Job

Position Details

Classification Details

FLSA Status Exempt

Position Information

Position Title IT Security Analyst Position Type Staff Employee Group Administrative Time Status Full-Time Time Category Full Time (1560-2080 hours) Annual Hours 2080 # of Months 12 Hours Per Week 40 Work Dates

July 1 – June 30

Campus Main Campus (Grantham)

Position Description

Position Summary

To provide coordination of IT Security policies and procedures that govern access to University computing resources, and to promote security awareness and compliance within the University community. Work with groups within IT that are responsible for data integrity and its maintenance, as well as user accounts and physical security of IT resources.

Education Required

Bachelor’s degree with coursework in information systems. Professional certification(s) or willingness to pursue certification(s) in related security areas.

Preferred Required

Education Preferred Experience Required

Two year of experience in IT security planning or monitoring.

Experience Preferred

  • Familiar with identity protocols such as LDAP, CAS, SAML and network protocols such as TCP/IP, DHCP, DNS, SMTP, SNMP
  • Experience in securing complex environments including Linux, Windows, Active Directory.
  • Experience with VMware and/or cloud environments.
  • Experience with automation using scripts and other tools.

Skills, Characteristics Required For Position

  • Thorough knowledge of information security and privacy and best practices.
  • Excellent analytical skills; proactive problem-solving approach.
  • Strong communication skills including the ability to deliver effective training
  • Strong organizational skills, including time management skills and ability to prioritize multiple responsibilities.
  • Ability to work both independently and collaboratively with others
  • Demonstrated commitment to continued learning and professional development
  • Ability to maintain strict confidentiality
  • Basic understanding of scripting and development languages (e.g., PHP, Java, PowerShell)
  • Technical knowledge of Linux and Apache

Special Working Conditions

N/A

Driving Requirements

N/A

Duties

Essential Employee N/A Primary Duties

  • Assist in the development and documentation of information security policies, standards and procedures for faculty, staff and students.
  • Assist in the evaluation and development of an annual program of testing network, mobile, and data security protocols and procedures.
  • Collaborate with Network Services in monitoring intrusion detection/firewall activity.
  • Keep abreast of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to the mission of the University and ensure that University policies comply.
  • Collaborate in the development and testing of the annual disaster recovery / business continuity plans.
  • Monitor campus community compliance with information security policies.
  • Participate in security investigations and violations and recommend improvements and corrections to current policy or procedures.
  • Assist in the development and delivery of training on information security and privacy for employees and students as needed.
  • Assist in the coordination of data retention and data destruction
  • Implement and automate security related procedures and technology across all systems.
  • Assist in the securing of data protection procedures including backup, restore, and replication.
  • Maintain consistent and reliable attendance.

Secondary Duties

  • Coordinate projects within ITS as assigned. This may include working with vendors, ITS staff and end users to manage meetings, timelines, and deliverables related to IT security policies and procedures.
  • Participate in meetings and campus committees as appropriate.
  • Other duties as assigned

Supervises: # of Administrative 0 Supervises: # of Staff 0 Supervises: # of Student 0 Posting Date 08/11/2025 Open Until Filled Yes Application Deadline Diversity

Messiah University’s commitment to diversity and inclusive excellence draws inspiration from its mission “to educate men and women toward maturity of intellect, character and Christian faith in preparation for lives of service, leadership and reconciliation in church and society.” The university has pursued this vision through a strategic planning process that encourages diversity through employee and student composition, campus climate, and an educational program that seeks to equip and enable educators and students to embrace diversity. Candidates should clearly articulate why diversity and inclusive excellence matter to them as persons of faith as well as in their profession. Candidates will speak to how as a potential employee, they will contribute to the advancement of this vision through their teaching-learning, research, institutional service, and public engagement.

Posting Specific Questions

Required fields are indicated with an asterisk (*).

Applicant Documents

Required Documents

  • Cover Letter/Letter of Interest
  • Resume

Optional Documents

Human Resources: One University Avenue Suite 3015 Mechanicsburg PA 17055; 717-796-5300

Student Employment: One University Avenue Suite 3015 Mechanicsburg PA 17055; 717-796-1800 x.2900
#J-18808-Ljbffr

Related Jobs

View all jobs

IT Security Analyst

IT Security Analyst

IT Security Analyst

IT Security Analyst

IT Security Analyst

IT Security Analyst

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.