Manufacturing and Lab Security Analyst at Waters Corporation
Wexford, County Wexford, Ireland -
Full Time


Start Date

Immediate

Expiry Date

13 Sep, 25

Salary

0.0

Posted On

14 Jun, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cyber Security, Manufacturing

Industry

Information Technology/IT

Description

Overview
The Manufacturing and Lab Security Analyst II is a member of the Information Security Team – which performs analysis on cyber threats, reviews and triages security alerts, and other suspicious system or network activity with a focus on Lab and Manufacturing environments. The Manufacturing and Lab Security Analyst identifies methods to mitigate future risks to networked systems.
The Manufacturing and Lab Security Analyst researches external malicious cyber activity to proactively identify ways to mitigate risk to the network. Also, as part of the Information Security Team the Manufacturing and Lab Security Analyst will be a liaison between the Lab and Manufacturing user community.
Responsibilities

EXPERIENCE:

  • 2+ years experience in various cyber security, lab, or manufacturing roles
Responsibilities
  • Identify and implement solutions to mitigate risk to the Lab or Manufacturing environments
  • Analyze vulnerabilities and threats, determine their potential impact, and recommend strategies for risk prevention
  • Assist with network segmentation projects
  • Test new network security systems and changes to the existing network security device
  • Develop technical project plans, requirement documentation, test plans, change requests, and communications to users
  • This position will maintain frequent contact with the Lab and Manufacturing user community as well as external vendors to maintain communications related to problem resolution, systems upgrades, services, and product research
  • Ensure compliance with relevant security standards, policies, and regulations
  • Coordinate efforts among multiple groups to enhance mitigation efforts, improve security posture, and avoid duplication of efforts
Loading...