Undertakes analytical activities and delivers analysis output, in accordance with customer needs and conforms to agreed standards.
Specifies and develops test scenarios to test that new/updated processes deliver improved ways of working for the end user at the same time as delivering efficiencies and planned business benefits. Records and analyses test results and reports any unexpected or unsatisfactory outcomes. Uses test plans and outcomes to specify user instructions.
Investigate operational requirements, problems, and opportunities, seeking effective business solutions through improvements in automated and non-automated components of new or changed processes. Assists in the analysis of stakeholder objectives, and the underlying issues arising from investigations into business requirements and problems and identifies options for consideration. Identifies potential benefits, and available options for consideration. Works with clients/users in defining acceptance tests.
Operational day-to-day support of targeted security products/systems.
Selects and uses tools and methods to establish, clarify and communicate the user experience, users' characteristics and tasks, and identifies the technical, organizational and physical environment in which complex products or systems will operate.
Audits the First Solar AD structure to verify that only those rights and privileges necessary are properly assigned.
Response to security incidents and provide fault resolution and escalation.
Develops implementation plans for dealing with more complex requests for change, evaluates risks to integrity of infrastructure inherent in proposed implementations, seeks authority for those activities, reviews the effectiveness of change implementation, and suggests improvement to organizational procedures governing change management. Leads assessment, analysis, development, documentation and implementation of changes based on requests for change.
Reviews requirements and specifications and defines test conditions. Designs test cases and test scripts under own direction, mapping back to pre-determined criteria, recording and reporting outcomes. Analyses and reports test activities and results. Identifies and reports issues and risks associated with own work.
Monitor and audit security aspects of IT and product operations.
Apply data analysis and data modeling techniques to establish, modify or maintain a data structure and its associated components (entity descriptions, relationship descriptions, attribute definitions).
Defines scope and business priorities for small-scale changes and may assist in larger scale scoping exercises. Elicits and discovers requirements from operational management and other stakeholders. Selects appropriate techniques for the elicitation of detailed requirements taking into account the nature of the required changes, established practice and the characteristics and culture of those providing the requirements. Specifies and documents business requirements as directed, ensuring traceability back to source. Analyses them for adherence to business objectives and for consistency, challenging positively as appropriate. Works with stakeholders to priorities requirements.
Identifies and resolves issues with applications, following agreed procedures. Uses application management software and tools to collect agreed performance statistics. Carries out agreed applications maintenance tasks.
Investigates, troubleshoots, analyzes and resolves problems related to the IT security infrastructure as well as application and system problems that have been escalated for senior level support.
Information Security Analyst I will be responsible for the technical analysis and support of specific security products and/or systems (examples: IdM, IDS/IPS, EDR, SIEM … etc.). Their primary responsibility will be focused on the day-to-day functions in the Security Operation Center.
Analyses business processes, identifies alternative solutions, assesses feasibility, and recommends new approaches. Contributes to evaluating the factors which must be addressed in the change program. Help establish requirements for the implementation of changes in the business process.
Works on various projects related to evaluating, testing, and deployment of new software systems/technology.
Requirements
siem
firewalls
windows server
python
wireshark
bachelor's
Strong understanding of event analysis, incident response, threat intelligence.
Less than 5%.
Minimum 2 years of relevant work experience.
Working knowledge or prior experience with SEIM preferred.
Working knowledge of enterprise Firewalls is required.
1+ years of experience with IdM, IPS/IDS a plus.
Experience in the security monitoring of distributed environments.
1+ years of experience with network security scanning tools (Nessus, Qualys, ISS, etc.) a plus.
Working knowledge and/or prior experience with Digital Rights Management a plus.
Experience with Microsoft Windows Server operating systems a plus.
Bachelor’s degree from an accredited college or related discipline or equivalent work experience.
1+ years of experience with Microsoft Windows operating systems is required.
Hands on technical experience with and very knowledgeable of security operations, scripts reading and understanding, basic knowledge in different languages: JS, Python, PowerShell, C#.
Thorough knowledge of software’s such as WireShark, VMware, Burp Suite.
Excellent Organization / Communication Skills.
Working knowledge ard/or demonstrated experience security tools is required.
Experience with TCP/IP and knowledgeable with common standard IP protocols such as ARP, IP, ICMP, TCP, UDP, SIP, etc.
1+ years with Network server /Active Directory (AD) administration experience required.
Benefits
$61,000-$87,00 Annually.
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
all candidates receiving an offer must successfully complete a background check.
Company
Overview
20 GW
Solar Installations Completed
Completed over 20 gigawatts of solar installations globally, demonstrating significant contributions to renewable energy projects worldwide.
Focuses on manufacturing advanced photovoltaic (PV) solar modules and providing utility-scale PV power plants.
Offers a range of solutions, from manufacturing to large-scale solar power projects, emphasizing sustainability.
Pioneers a closed-loop recycling process for solar panels, reducing environmental impact.
Drives clean energy transformation with integrated solutions including development, financing, and operation of solar plants.
Culture + Values
“Responsible Solar” — commitment to environmental stewardship from sourcing through end‑of‑life management
“Principled foundation” — zero tolerance for human rights abuses and strong governance
Transparency — first solar manufacturer to publish onsite third‑party social‑audit findings globally
Since 2008, GHG intensity reduced ~77%; since 2020, energy per watt down 15%, water intensity down 48%
2023: manufacturing water recycling up 88%, 318M L recycled; water intensity down 6%, waste intensity down 28%
Series 6 Plus and Series 7 TR1 modules achieved EPEAT Climate+ (≤400 kg CO₂ e/kWp)
Manufacturing energy intensity per watt reduced 65% since 2009; goal: 74% by 2028
Inclusion & Diversity
Conducted RBA‑validated third‑party social audits across global manufacturing: U.S. and Vietnam received platinum rating; Malaysia facility assessed and corrective actions underway