Balfour Beatty US · 2 days ago
IT Security Analyst
Balfour Beatty US is an industry-leading provider of general contracting and construction management services. They are seeking an IT Security Analyst to ensure the company's digital assets are protected from unauthorized access, involving securing infrastructures and mitigating risks before breaches occur.
Construction
Responsibilities
Ability to gather, interpret, document, and act on threat intelligence from multiple sources—including internal logs, external feeds, and open-source intelligence—to support proactive detection and response to emerging threats
Collaborate with vendors and leverage online resources to identify, understand, and document security threats, vulnerabilities, and exploits that could impact the enterprise environment
Coordinate response of security events that require urgent response, containment, and remediation
Provide analysis on various security enforcement technologies including, but not limited to authentication logs, SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc
Maintain knowledge base (KB) and standard operating procedure (SOP) articles, and coordinating meetings to share information and document identified threats, mitigation strategies, and best practices across the team
Provide documented IT security recommendations and best practices for threat detection, operational processes, system configuration, and policy development, ensuring guidance is clear, actionable, and aligned with organizational standards
Monitor existing platforms for latest IT Security features, then coordinate implementation
Perform IT Security incident investigations and reporting
Assist with development and maintenance of IT security policies and audit configuration of existing technologies and platforms
Coordinate and document tabletop exercises and regularly test incident response plans, capturing lessons learned and recommendations to strengthen organizational readiness and response capabilities
Research emerging information security technologies, document findings, and present actionable recommendations for potential adoption and integration into the organization’s security strategy
Perform miscellaneous duties as assigned
Qualification
Required
Bachelor's degree in information technology, Cybersecurity, or Business Administration, combined with a minimum of 5 years of direct professional experience in the Information Security domain
Ability to gather, interpret, document, and act on threat intelligence from multiple sources—including internal logs, external feeds, and open-source intelligence—to support proactive detection and response to emerging threats
Collaborate with vendors and leverage online resources to identify, understand, and document security threats, vulnerabilities, and exploits that could impact the enterprise environment
Coordinate response of security events that require urgent response, containment, and remediation
Provide analysis on various security enforcement technologies including, but not limited to authentication logs, SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc
Maintain knowledge base (KB) and standard operating procedure (SOP) articles, and coordinating meetings to share information and document identified threats, mitigation strategies, and best practices across the team
Provide documented IT security recommendations and best practices for threat detection, operational processes, system configuration, and policy development, ensuring guidance is clear, actionable, and aligned with organizational standards
Monitor existing platforms for latest IT Security features, then coordinate implementation
Perform IT Security incident investigations and reporting
Assist with development and maintenance of IT security policies and audit configuration of existing technologies and platforms
Coordinate and document tabletop exercises and regularly test incident response plans, capturing lessons learned and recommendations to strengthen organizational readiness and response capabilities
Research emerging information security technologies, document findings, and present actionable recommendations for potential adoption and integration into the organization's security strategy
Proven ability to rapidly adapt to evolving technologies and threat landscapes, with a continuous learning mindset toward emerging tools, platforms, and cybersecurity methodologies
Previous experience serving as an escalation point for IT security incidents, including participation in after-hours on-call rotations to support urgent threat response and remediation activities
TCP/IP knowledge and understanding of network infrastructure: firewalls, routers, switches, load balancers, remote access technology (VPN)
Strong ability to troubleshoot complex technical issues, lead root cause analysis investigations, and manage support queues to ensure timely resolution and continuous improvement of security operations
Working knowledge of the CIS (Center for Internet Security) Top 20 Critical Security Controls, with practical application in risk mitigation, compliance alignment, and security posture improvement
Understanding of global data privacy regulations, including GDPR, CCPA, and other applicable frameworks, with practical experience supporting policy implementation, user data protection, and regulatory reporting
Experience conducting IT security audits and supporting compliance initiatives, including security control assessments, evidence collection, and remediation tracking
Experience conducting third-party vendor cyber assessments
MITRE ATT&K framework familiarity for mapping adversary tactics
Proactive threat hunting using behavioral analytics and threat intel feeds
Familiarity with DLP technologies
Experience encoding/decoding Base64
Familiarity with REST APIs for integrating security tools, automating workflows, and retrieving threat intelligence data
Able to read and understand packet level data
Microsoft Office 365, Entra ID, and Intune administration
Experience with Amazon web services administration
Experience with vulnerability scans and pen testing
Understanding of Microsoft Windows platforms including: Active Directory user and group management, GPO configuration, and domain services
Malware: Ability to identify phishing email, analyze malicious URL threats, and decode encrypted HTML attachments (base64)
Preferred
Industry-recognized certifications such as CISSP, CISM, CEH, or Security+ are strongly preferred
Experience collaborating with Managed Detection and Response (MDR) providers and/or Managed Security Service Providers (MSSPs) to triage and respond to security incidents, analyze threat intelligence reports, and process Indicators of Compromise (IOCs) across hybrid environments
Experience implementing and supporting NIST and CMMC cybersecurity frameworks, including control mapping, audit preparation, and reporting activities aligned with compliance requirements
Time management skills, operational reporting, and cross-functional communication—essential for coordinating with internal teams and external partners such as MSSPs, auditors, and compliance stakeholders
Ability to produce clear, actionable written reports and IT security recommendations tailored to technical and non-technical audiences, including executive stakeholders, auditors, and compliance teams
Experience with On-prem Exchange and Exchange Online administration
Message header analysis and message trace
TLS encryption and mail transport rules
Whitelist / blacklist management for threat mitigation
Experience with email hygiene products such as Google, Proofpoint, Barracuda, or Symantec
Configuration of DMARC, DKIM, SPF, and MX DNS records
Privilege escalation techniques
Common mitigation controls and system hardening
Experience with monitoring and administration of a commercial endpoint AV solution
Ability to identify common false positives and make suggestions on tuning whitelists, policies, and rules
Experiencing creating endpoint protection policies
Log auditing and analysis
Operating system hardening to reduce attack surface, including patching, privileged access reviews, and recommendations for disabling unnecessary applications and services
Setup isolated systems to detonate malicious payloads
Understanding of malware mitigation controls in an enterprise environment
Benefits
Medical, Dental, Vision and Life Insurance
Health Savings Account
401(k) with company match
Flexible Spending Accounts (Dependent & Medical Reimbursement)
Vacation Time
Sick Time
Holidays
Paid Volunteer time
Tuition Assistance
Employee Referral Bonus
Company
Balfour Beatty US
Balfour Beatty US is an industry-leading provider of general contracting, at-risk construction management and design-build services for public and private sector clients across the nation.
H1B Sponsorship
Balfour Beatty US has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (6)
2024 (5)
2023 (8)
2022 (7)
2021 (2)
2020 (9)
Funding
Current Stage
Late StageLeadership Team
Recent News
Morningstar.com
2025-11-18
Los Angeles Business Journal
2025-09-02
Company data provided by crunchbase