Security Analyst II

Posted on August 19, 2025

Location

Hybrid (Wisconsin)
146269

Position Details

Full-Time

Job Summary

Beacon Technologies is seeking a Security Analyst II for our client partner. The IT Security & Compliance Coordinator oversees and facilitates agency IT security compliance, technology intake processes, IT audit readiness, and overall IT risk management. Regularly performing complex risk assessments related to cloud-hosted solutions (e.g., SaaS, PaaS, IaaS), Artificial Intelligence (AI) technology and AI use cases, agency data governance and privacy protections, and application security governance; the IT Security & Compliance Coordinator acts as a key liaison to external partners and collaborates closely with internal IT teams, division leadership, program staff, regulatory bodies, and vendors to strengthen the agency’s security and compliance posture.

Additionally, this role is responsible for performing log analysis using SIEM tools and interpreting IT vulnerability scans while producing executive-level IT security, risk, and compliance related reports. It coordinates the agency vulnerability management program, firewall and security exception requests with managed service provider, supports and facilitates incident response planning, and leads cybersecurity awareness training in coordination with agency leadership. The IT Security & Compliance Coordinator also performs PCI DSS attestation (i.e., SAQ A & SAQ B-IP) for all merchant locations. This is a hybrid position requiring on-site work 1-3 days per week varying based on project and operational demands. Remote work may be permitted on a scheduled basis after an initial onboarding period. Candidates MUST be WI residents or willing to relocate to WI prior to starting the role at their own expense.

Responsibilities:

Technology Intake & Vendor Security Review:

  • Capture business use cases, data classification, and required security controls for software and cloud services.
  • Collect and review vendor T&Cs, license agreements, privacy policies, and security artifacts (e.g., SOC 2, FedRAMP/StateRAMP).
  • Initiate, monitor, and shepherd intake workflows with service providers, coordinating to closure and ensuring alignment with agency compliance requirements.

Monitoring, Reporting, and Vulnerability Coordination:

  • Use enterprise/agency tools (e.g., SIEM, email security, vulnerability scanners) to review security posture and risk trends.
  • Build recurring and ad‑hoc reports that provide security value (threat/anomaly insights) and business intelligence (usage/adoption trends).
  • Translate technical findings into clear summaries for diverse audiences, including executive leadership.
  • Coordinate vulnerability scan interpretation, dashboards, and remediation tracking; escalate and track actions with system owners and service providers until resolved.

AI & Emerging Technology Governance:

  • Maintain inventories of AI applications, direct and indirect risks, and approved use cases.
  • Coordinate intake and review of AI business use cases; prepare forms and guide staff through enterprise and agency requirements.
  • Evaluate vendor AI features and emerging technologies for security, privacy, and ethical risks (e.g., bias, data exposure), ensuring compliance with enterprise and agency policies.
  • Draft/refine policies that balance innovation with secure adoption of AI and other emerging tech.

IT Compliance, Audit Response, & Risk Management:

  • Develop, maintain, and monitor adherence to IT security/compliance policies aligned to NIST, PCI DSS, CIS, ISO 27001, and state standards.
  • Identify and track risks; collaborate with service providers and internal technical teams on mitigation strategies and exception handling.
  • Oversee data governance activities and support application security governance (secure design guidance, vendor compliance reviews).
  • Prepare audit responses and evidence for oversight/regulatory bodies; lead PCI DSS SAQ processes for all merchant locations.
  • Support vendor contract reviews by identifying and recommending security and privacy requirements to be included in agreements

Incident Response Planning and Execution:

  • Maintain and test incident response plans/playbooks; educate staff on roles and procedures.
  • Participate in investigations, documentation, notifications/status updates, and post‑incident reviews, track root cause and preventive actions.

Cybersecurity Awareness and Training:

  • Lead agency-wide cybersecurity education and compliance initiatives, ensuring awareness and adherence to PCI DSS, NIST-based, and state-level standards.
  • Develop and deliver cybersecurity awareness programs to educate employees about security best practices and emerging threats.
  • Regularly create engaging training materials and conduct workshops to promote a security-conscious culture.
  • Regularly champion, provide guidance, and promote awareness on cybersecurity, data governance, and responsible technology use across the organization.

Minimum Qualifications:

  • 5+ years of experience in cybersecurity or network operations, audit and compliance coordination, or related IT risk management.
  • Experience running search queries, generating, and automating reports from industry standard IT security tools (e.g., Splunk, IronPort, Tenable, Cloudflare).
  • Experience managing IT security review processes, security exception workflows, vulnerability management processes, and developing security policies or procedures.
  • Proven ability to coordinate complex risk assessments and compliance activities
  • Experience evaluating AI tools or emerging technologies for compliance, security, or ethical risks with a strong knowledge of direct and indirect AI-related risks
  • Working knowledge of AWS and Microsoft 365 Entra ID security controls (e.g., IAM, logging/monitoring, encryption, MFA/Conditional Access), with the ability to interpret read‑only outputs and coordinate remediation with service providers.
  • Strong knowledge of IT Security Incident Response planning and preparation, including experience coordinating with managed service providers (MSP) or third-party vendors
  • Strong understanding of common security frameworks or compliance standards (e.g., NIST, PCI DSS, CIS, ISO 27001), and privacy protection practices.
  • Experience collaborating with cross-functional IT teams and program area staff, external auditors, and regulatory agencies.
  • Excellent communication and analytical skills, with ability to translate complex IT security related topics for diverse often non-technical audiences.

Desired Qualifications:

  • Prior experience in public-sector compliance or multi-agency single tenant environments.
  • Prior experience with PCI DSS SAQ preparation and attestation.
  • Prior experience coordinating vendor-performed internal penetration testing.

 

About Beacon Technologies

Are you looking to advance your career in information technology? Beacon Technologies offers career advancement opportunities, extensive training, and excellent benefits including paying for health and dental premiums for salaried employees. In addition to providing interesting opportunities, Beacon Technologies provides that old fashioned, personal touch, so you feel like a part of the Beacon team.

Beacon Technologies, Inc. is an equal employment opportunity employer with a functioning Affirmative Action Plan. It is the policy of Beacon Technologies, Inc. to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, sex, sexual orientation, gender identity or expression, age, disability, marital status, citizenship, national origin, genetic information, ethnicity, ancestry, disability, medical condition, military and veteran status, or any other characteristic protected by law. Beacon Technologies, Inc. prohibits any such discrimination or harassment.