Information Security Analyst I

TLDR

Play a hands-on role in security operations and contribute to enhancing security controls to safeguard critical applications and infrastructure in a collaborative environment.

divdivdivspan style="font-family: sans-serif , arial , helvetica;font-size: 12.0pt;"Join Laserfiche as an Information Security Analyst I and play a hands-on role in defending the systems that power a global leader in digital transformation. In this dynamic position, you’ll dive into real security operations—monitoring, detection engineering, vulnerability management, and security configuration—while helping grow the enterprise security program./span/divdivspan style="font-family: sans-serif , arial , helvetica;font-size: 12.0pt;"You’ll work across cloud and on‑prem environments, implementing and continuously improving security controls that safeguard critical applications, data, and infrastructure. This is a highly collaborative role where you’ll partner with teams across ITS, the Business Transformation Office, GRC, Development, and more to ensure Laserfiche’s security posture is strong, scalable, and aligned with business goals./span/divdivspan style="font-family: sans-serif , arial , helvetica;font-size: 12.0pt;"If you’re passionate about hands-on security work, eager to learn, and excited to make a direct impact on enterprise protection, this role offers the opportunity to grow, innovate, and contribute from day one./span/div/div/divdiv /divdivdivdivstrongspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Location:/span/strong/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Hybrid: Three days per week (Tuesday, Wednesday and Thursday) in-office in Long Beach, CA/span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Remote work from home on Mondays and Fridays/span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Periodic after-hours support may be required for security incidents or maintenance activities. /span/li/ul/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivdivstrongspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"About the Role - Key Responsibilities:  /span/strong/divdiv /divdivdivspan style="text-decoration: underline;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Security Engineering and Control Implementation/span/span/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Configure and manage security tools including endpoint detection and response (EDR), SIEM, vulnerability management platforms, email security, identity and access management (IAM) and other security technologies. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Support ITS and Development teams in integrating security controls into system architecture and deployment workflows./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Assist in the evaluation and implementation of new security technologies to enhance prevention, detection and response capabilities./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Safeguard Laserfiche information in accordance with Laserfiche Information Security Policies./span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="text-decoration: underline;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Security Monitoring and Incident Response/span/span/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Monitor security events and alerts from SIEM, EDR, cloud-native logging tools and other detection platforms./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Perform triage, investigation and root cause analysis of security incidents and suspicious activity./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Support incident response efforts in coordination with ITS and business stakeholders./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Develop and tune detection rules, alerts and automated response playbooks to improve security visibility and reduce false positive rates./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Document incidents, response actions and lessons learned to strengthen operational maturity./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Participate in tabletop exercises and incident response testing activities./span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="text-decoration: underline;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Vulnerability Management and Threat Mitigation/span/span/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Perform recurring vulnerability scans across infrastructure, endpoints, applications and cloud environments. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Validate findings, prioritize remediation based on risk and track mitigation progress with system owners./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Conduct configuration reviews and security assessments of systems and cloud resources./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Stay current on emerging threats, vulnerabilities and exploit techniques, and recommend appropriate countermeasures./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Partner with ITS and Development teams to drive timely remediation of security findings./span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="text-decoration: underline;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Cloud and Identity Security/span/span/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Support security configuration and monitoring of cloud and SaaS environments including AWS, Microsoft 365 and Okta. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Review IAM roles, policies and permissions to enforce least privilege and proper access controls. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Assist in the secure implementation of new cloud services and infrastructure changes. /span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="text-decoration: underline;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Collaboration, Documentation and Continuous Improvement/span/span/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Contribute to security awareness initiatives, including phishing simulations, training content and employee communications to promote a security-conscious culture./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Provide technical security guidance to internal stakeholders and assist in responding to security-related customer or vendor inquiries./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Support internal audits and compliance initiatives by gathering technical evidence of control implementation./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Participate in risk assessments, vendor reviews and architecture design discussions./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Help refine security policies, standards and procedures based on operational experience./span/li/ulp /pdivstrongspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"About You - Essential Qualifications: /span/strong/divdiv /divdivulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Bachelor’s degree in cybersecurity, information systems, computer science or related field. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Experience in security operations, information security or a related technical role./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Relevant certifications such as Splunk, Security+, CySA+, BTL1, PSAA or AWS Cloud Practitioner are preferred./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Experience supporting on-premises, hybrid and cloud environments./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Foundational understanding of security operations, including monitoring, incident response and vulnerability management./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Familiarity with SIEM platforms (Splunk preferred), EDR solutions and vulnerability management tools. /span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Foundational understanding of network security principles including segmentation, firewall management, VPN technologies and traffic analysis./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Experience with Windows and Linux system administration and hardening practices./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Awareness of common attack frameworks such as MITRE ATTCK and prevalent adversary techniques./span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Strong analytical and problem-solving skills with attention to detail./span/li/ulp /pp /pdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"The salary range varies, and pay is based on several factors including but not limited to education, certifications (if applicable), candidate’s geographic region, job-related knowledge, skills and years of experience amongst other factors. /span/divulli style="font-family: sans-serif , arial , helvetica;font-size: 12.0pt;"span style="font-family: sans-serif , arial , helvetica;font-size: 12.0pt;"$40.87 - $52.88 per hour/span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivstrongspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Perks Benefits at a Glance                                  /span/strong/divulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Generous time off:/spanulli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"15 Days of Vacation/span/li/ululli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"3 Floating Holidays/span/li/ululli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"2 Paid Volunteer Days/span/li/ululli style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"9 Paid Holidays/span/li/ul/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Hybrid Work Environment/span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Free Parking: covered and EV charging stations/span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Various 401 (k) Investment Options and Generous Company Match/span/lili style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"HMO and PPO Medical Care Options /span/li/uldivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Applicants must be authorized to work for Laserfiche in the United States on a full-time basis without the need for employer sponsorship. We are unable to sponsor new employment visas, or take over sponsorship of existing employment visas, at this time./span/divdivbr /strongspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"About Us/span/strongbr /divspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Laserfiche is a global leader in intelligent document management and business process automation, dedicated to helping organizations drive digital transformation. Headquartered in Long Beach, California, Laserfiche empowers businesses of all sizes—from dynamic startups to Fortune 500 enterprises—to accelerate productivity, improve collaboration, and deliver exceptional customer experiences./span/divdivbr /span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Through scalable workflows, customizable digital forms, and AI-powered automation, the Laserfiche platform enables teams to simplify complex processes and operate with greater efficiency. Our no-code solutions empower employees to innovate, adapt quickly, and make data-driven decisions that move their organizations forward./spanbr /span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /spanbr /span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"With a strong global presence and offices across North America, Europe, and Asia, Laserfiche is recognized for its commitment to innovation, quality, and customer success. Our people-first culture fosters professional growth, continuous learning, and collaboration—making Laserfiche a place where talented individuals can shape the future of digital enterprise technology./span/div/divdivbr /span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Learn more about our team a href="https://laserfiche1.wistia.com/medias/xelunw23au"here/a. /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivbr /span style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"a href="https://www.laserfiche.com/"Laserfiche /acomplies with all Equal Opportunity and Affirmative Action regulations. Laserfiche makes all employment decisions – such as recruiting, hiring, training, promotion, compensation, professional development practices, discipline and termination – without regard to race, religion, color, national origin, ancestry, citizenship, sex, pregnancy, age, creed, physical or mental disability, medical condition, genetic characteristic, marital status, veteran status, gender identity/expression, sexual orientation or any other characteristic protected by law, except as may be permitted by law.                                                       /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"a href="https://www.laserfiche.com/"Laserfiche/a provides reasonable accommodations for applicants with disabilities upon request. For more information, please contact Talent Acquisition at a href="https://www.laserfiche.com/contact/"a target="url" href="https://www.laserfiche.com/contact/"https://www.laserfiche.com/contact//a/a or 562-988-1688. /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, and the Los Angeles Fair Chance Initiative for Hiring Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, meet client expectations, standards, and accompanying requirements, and safeguard business operations and company reputation. /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;" /span/divdivspan style="font-size: 12.0pt;font-family: sans-serif , arial , helvetica;"#LI-Hybrid/span/div/div/div/div/div

Laserfiche builds powerful solutions for intelligent document management and business process automation, helping organizations enhance productivity and streamline operations. Its platform caters to a diverse customer base, from startups to large enterprises, and distinguishes itself with no-code solutions that enable users to innovate and adapt quickly. By incorporating AI-powered automation and customizable workflows, Laserfiche simplifies complex processes, allowing teams to focus on delivering exceptional results.

View all jobs
Salary
$40 – $52 per hour
Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Information Security Analyst Q&A's
Report this job
Apply for this job