Cybersecurity Analyst


Elk River
Permanent
USD65000 - USD90000
Cybersecurity​
PR/560517_1757536042
Cybersecurity Analyst

Role Summary

Glocomms is looking for a Cybersecurity Analyst interested in joining an innovative medical equipment manufacturer to support it's IT and security operations. This role combines technical support, risk management, and employee education to strengthen our cybersecurity posture and promote a culture of security across the organization. This is a great fit for someone who enjoys both hands-on work and program coordination.

Key Responsibilities

Security Operations

  • Support daily monitoring, incident response, and vulnerability management.
  • Help manage tools for endpoint protection, logging, email security, and access control.
  • Assist with security projects like patching, encryption, and policy enforcement.

Access & Identity Management

  • Contribute to improving identity and access practices.
  • Support role-based and Just-In-Time access implementations.
  • Lead initiatives aligned with Zero Trust principles.
  • Participate in account and privilege reviews.

Employee Awareness & Training

  • Develop and run cybersecurity training and phishing simulations.
  • Provide onboarding and ongoing education for staff.
  • Act as a resource for employee cybersecurity questions.

Risk & Resilience

  • Maintain business continuity and disaster recovery plans.
  • Facilitate tabletop exercises and document improvements.
  • Collaborate with teams to identify and reduce operational risks.
  • Support documentation for audits, insurance, and customer requirements.

Governance & Reporting

  • Help draft and update cybersecurity policies.
  • Track training compliance, incidents, and risk metrics.
  • Stay informed on emerging threats and recommend improvements.
  • Coordinate with vendors and internal teams on security tools and projects.

Qualifications

Required

  • Bachelor's degree in Cybersecurity, IT, or related field.
  • 2+ years of experience in IT or cybersecurity.
  • Strong communication skills, especially with non-technical audiences.
  • Familiarity with Zero Trust, MFA, and identity tools.
  • Knowledge of phishing, endpoint protection, and threat mitigation.
  • Organized and detail-oriented.

Preferred

  • Security certifications (e.g., Security+, SSAP, GSEC).
  • Experience with IAM tools (e.g., Azure AD, Okta, Duo).
  • Familiarity with phishing platforms (e.g., Mimecast, KnowBe4).
  • Background in business continuity and disaster recovery.
  • Exposure to frameworks like NIST, ISO 27001, or CIS Controls.
  • Experience in manufacturing or regulated environments

FAQs

Congratulations, we understand that taking the time to apply is a big step. When you apply, your details go directly to the consultant who is sourcing talent. Due to demand, we may not get back to all applicants that have applied. However, we always keep your resume and details on file so when we see similar roles or see skillsets that drive growth in organizations, we will always reach out to discuss opportunities.

Yes. Even if this role isn’t a perfect match, applying allows us to understand your expertise and ambitions, ensuring you're on our radar for the right opportunity when it arises.

We also work in several ways, firstly we advertise our roles available on our site, however, often due to confidentiality we may not post all. We also work with clients who are more focused on skills and understanding what is required to future-proof their business. 

That's why we recommend registering your resume so you can be considered for roles that have yet to be created. 

Yes, we help with resume and interview preparation. From customized support on how to optimize your resume to interview preparation and compensation negotiations, we advocate for you throughout your next career move.

Handpicked roles for you