Qureos

Find The RightJob.

Cybersecurity Analyst

Position Summary


PRTC is seeking a Cybersecurity Analyst to support the cooperative’s security operations, incident response capabilities, and continuous improvement of the organization’s cybersecurity posture.
This position will be responsible for monitoring cybersecurity activity, coordinating incident response efforts, and identifying risks across the organization’s infrastructure. The analyst will work across endpoint security, network security, vulnerability management, identity monitoring, and data protection controls.

In addition to strengthening PRTC’s internal cybersecurity program, this role will contribute to the development of cybersecurity services that can be delivered to cooperative members and business customers through PRTC’s managed services offerings.

The ideal candidate is a hands-on security professional who can analyze security events, investigate suspicious activity, and translate findings into meaningful improvements to the organization’s security posture.
Essential Job Functions:
Incident Response:
Serve as the primary point of contact for security incident response activities. 
Coordinate early-stage response efforts and escalate incidents to appropriate personnel when necessary. 
Document investigative findings throughout the life cycle of an incident, and recommend improvements to prevent recurrence. 
Maintain and improve incident response procedures and documentation.
Security Monitoring & Threat Detection:
Monitor, analyze and respond to security events across all endpoints in the network through our SOC, EDR, SIEM and internal logging systems. 
Validate that security telemetry and logging sources are functioning properly and providing adequate visibility daily.
Email Security & Phishing Response:
Review user-reported phishing submissions and suspicious email activity. 
Investigate potential phishing incidents and coordinate remediation actions. 
Support user awareness training and suggest security improvement initiatives related to phishing and social engineering threats.
Network Security: 
Review network access control policies and security rules set by PRTC. Suggest changes or additions that could protect PRTC’s data further.
Vulnerability Management:
Coordinate and assist in vulnerability assessment activities across organizational systems. 
Review vulnerability findings and suggest prioritization of remediation efforts. 
Produce reports and track remediation progress with relevant teams. 
Possess the ability to develop design specifications, technical requirements, technical diagrams and documentation needed to ensure successful data protection. 
Support protection of Customer Proprietary Network Information (CPNI) and other sensitive organizational data.
AI Security & Emerging Technology:
Review internal usage of artificial intelligence technologies for potential security risks or data exposure. 
Assess current security policies and organizational controls to ensure they address emerging threats associated with AI adoption.
Security Governance & Continuous Improvement:
Maintain documentation related to security processes and change management activities. •
Review company policies to ensure compliance with security standards and practices.

Knowledge, Skills, and Abilities:

 3+ years of experience in cybersecurity, security operations, or a related technical field.
 Experience investigating security alerts, suspicious activity, and incident response scenarios.
 Strong understanding of network protocols, system hardening, authentication, and modern attack techniques and tool sets used for those attacks.
 Experience working with security monitoring platforms, vulnerability management processes, and endpoint protection technologies.
 Familiarity with NIST CSF, ISO 27001, PCI-DSS, and MITRE ATT&CK frameworks.
 Ability to clearly document technical findings and communicate security risks to both technical teams and leadership.
 Experience securing hybrid infrastructure environments, including cloud and on-premises systems.

Education and Experience:
 Current industry certifications such as CISSP, GIAC, Security+, SecurityX, CySA+, CCSP, or similar are preferred.


Education and Experience:

  • Current industry certifications such as CISSP, GIAC, Security+, SecurityX, CySA+, CCSP, or similar are preferred.

© 2026 Qureos. All rights reserved.