Cybersecurity Analyst


Elk River
Permanent
USD60000 - USD90000
Cybersecurity​
PR/560045_1757345286
Cybersecurity Analyst

Role Summary

Glocomms is looking for a Cybersecurity Analyst interested in joining an innovative medical equipment manufacturer to support it's IT and security operations. This role combines technical support, risk management, and employee education to strengthen our cybersecurity posture and promote a culture of security across the organization. This is a great fit for someone who enjoys both hands-on work and program coordination.

Key Responsibilities

Security Operations

  • Support daily monitoring, incident response, and vulnerability management.
  • Help manage tools for endpoint protection, logging, email security, and access control.
  • Assist with security projects like patching, encryption, and policy enforcement.

Access & Identity Management

  • Contribute to improving identity and access practices.
  • Support role-based and Just-In-Time access implementations.
  • Lead initiatives aligned with Zero Trust principles.
  • Participate in account and privilege reviews.

Employee Awareness & Training

  • Develop and run cybersecurity training and phishing simulations.
  • Provide onboarding and ongoing education for staff.
  • Act as a resource for employee cybersecurity questions.

Risk & Resilience

  • Maintain business continuity and disaster recovery plans.
  • Facilitate tabletop exercises and document improvements.
  • Collaborate with teams to identify and reduce operational risks.
  • Support documentation for audits, insurance, and customer requirements.

Governance & Reporting

  • Help draft and update cybersecurity policies.
  • Track training compliance, incidents, and risk metrics.
  • Stay informed on emerging threats and recommend improvements.
  • Coordinate with vendors and internal teams on security tools and projects.

Qualifications

Required

  • Bachelor's degree in Cybersecurity, IT, or related field.
  • 2+ years of experience in IT or cybersecurity.
  • Strong communication skills, especially with non-technical audiences.
  • Familiarity with Zero Trust, MFA, and identity tools.
  • Knowledge of phishing, endpoint protection, and threat mitigation.
  • Organized and detail-oriented.

Preferred

  • Security certifications (e.g., Security+, SSAP, GSEC).
  • Experience with IAM tools (e.g., Azure AD, Okta, Duo).
  • Familiarity with phishing platforms (e.g., Mimecast, KnowBe4).
  • Background in business continuity and disaster recovery.
  • Exposure to frameworks like NIST, ISO 27001, or CIS Controls.
  • Experience in manufacturing or regulated environments.

FAQs

Congratulations, we understand that taking the time to apply is a big step. When you apply, your details go directly to the consultant who is sourcing talent. Due to demand, we may not get back to all applicants that have applied. However, we always keep your CV and details on file so when we see similar roles or see skillsets that drive growth in organisations, we will always reach out to discuss opportunities.

Yes. Even if this role isn’t a perfect match, applying allows us to understand your expertise and ambitions, ensuring you're on our radar for the right opportunity when it arises.

We also work in several ways, firstly we advertise our roles available on our site, however, often due to confidentiality we may not post all. We also work with clients who are more focused on skills and understanding what is required to future-proof their business. 

That's why we recommend registering your CV so you can be considered for roles that have yet to be created. 

Yes, we help with CV and interview preparation. From customised support on how to optimise your CV to interview preparation and compensation negotiations, we advocate for you throughout your next career move.

Handpicked roles for you