Post job

Cyber security analyst jobs in Durant, OK - 713 jobs

All
Cyber Security Analyst
Network Security Analyst
Information Security Analyst
Intrusion Detection Analyst
Securities Analyst
Senior Cyber Security Analyst
  • Application Security Analyst

    Trilyon, Inc.

    Cyber security analyst job in Plano, TX

    For over 16 years, Trilyon has been at the forefront of providing comprehensive global workforce solutions and staffing services. Leveraging our extensive expertise across multiple domains such as Cloud technology, Salesforce, AI, Machine Learning, and Technical Writing, we consistently exceed expectations in catering to a wide range of requirements. Currently we are seeking a “Application Security Analyst” for one of our clients that is a leading multination corporation. Position: Application Security Analyst Duration: 12 month (Possible extension) Location: Plano TX (Hybrid) Interview process: 1st round virtual 2nd round onsite Job Description What we're looking for: We are seeking a skilled and proactive Application Security Analyst to integrate security practices into our DevOps processes. The ideal candidate will work closely with development and operations team to ensure secure software delivery pipelines, automate security controls, and foster a culture of shift left in the organization. What you'll be doing Design, implement, and maintain secure CI/CD pipelines. Integrate security tools (SAST, DAST, SCA, etc.) into development workflows. Collaborate with development and operations teams to remediate vulnerabilities. Automate security testing and compliance checks. Monitor and respond to security incidents in cloud and container environments. Develop and enforce security policies, standards, and procedures. Stay current with emerging security threats and DevSecOps best practices. Requirements: Qualifications/ What you bring (Must Haves) - Highlight Top 3-5 skills Bachelor's degree in Computer Science, Cybersecurity, or related field. 3+ years of experience in DevOps, Security Engineering, or related roles. 2-3 years of security experience. Overall, 6 years Strong understanding of CI/CD tools (e.g., Jenkins, Harness). Development knowledge on Java, Python, .Net, etc Experience with security tools (e.g., Veracode, GHAS, Orca). Proficiency in scripting languages (e.g., Python, Bash). Familiarity with containerization and orchestration (Docker, Kubernetes). Knowledge of cloud platforms (AWS, Azure, GCP) and their security features. Understanding of secure coding practices and application security principles. Knowledge of Infrastructure as Code (Terraform, Ansible). Regards Kush Deshmukh | Trilyon, Inc. P: ************ Fax: ************** E: ************************ | *********************** Equal Employment Opportunity Trilyon is an Equal Opportunity Employer, committed to fairness and respect for all individuals. We value diversity in age, disability, ethnicity, gender, gender identity, religion, and sexual orientation, believing it drives innovation and better service. Employment decisions are made impartially, without regard to any protected characteristic under federal, state, or local law. Our diverse team drives innovation, competitiveness, and creativity, enhancing our ability to effectively serve our clients and communities. This commitment to diversity makes us stronger and more adaptable.
    $66k-93k yearly est. 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Security Analyst with Active Directory, SIEM and EDR skills - 100% onsite

    Calance 4.3company rating

    Cyber security analyst job in Arlington, TX

    3 month contract to hire Rate: $55-60/hr Salary: $100-120k/yr The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure and addressing security risk and incidents. Essential Duties and Responsibilities include the following. Other duties may be assigned. · Active Directory Management o Domain controller maintenance and troubleshooting o ADCS (Active Directory Certificate Services) · Active Directory Federation Services o ADFS Server maintenance and troubleshooting o Work with IT Operations and Development teams with ADFS authentication · DNS (Domain Name Service) o Creation and management of DNS records o Management of F5 DNS VIPs and pools · Active Directory Sites and Services o Management of sites and subnets · Active Directory Domains and Trusts o Management of domain trust configuration · Group Policy Management o Troubleshooting and cleanup of GPOs · Patching Operations o Patching research and preparation § Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment § Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching o SCCM (System Center Configuration Manager) o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly · Forensic Operations o Security Monitoring § Monitor security alerts and tools for signs of compromise or malicious behavior § Monitoring network alerts and traffic for DDoS attacks · Forensic Investigation o Investigate the root cause of compromise incidents or exploited vulnerabilities o Investigate infrastructure weaknesses and report on malicious activity or potential risk · Project Operations o Assist with delegated duties for all security projects o Partner with other security or IT operations team members for deployments or maintenance · Conducts all business in a professional and ethical manner to serve customers and increase the goodwill and profit of the company · Ability to participate in a weekly call rotation · IT Operations o Monitor and assist with any and all IT operational emergencies to keep business applications operational · On-Call Responsibilities o Respond and escalate all IT security incidents as needed · Mentoring and Training o .Responsible for the mentoring of Security Administrators · Ability to travel overnight Qualifications Education and/or Experience · High school diploma or general education degree (GED) · One to four years' experience in an IT related field · Knowledge of IT Security Operations and Forensic Operations · Experience with computer networks · Experience with project management and delegation · Business communication and collaboration skills · Documentation skills · Ability to work well within a team, and work alone to accomplish tasks independently · Ability to interpret research into solutions to actual problems · Customer Service skills · Ability to apply common sense understanding to carry out instructions furnished in written oral form or via DRH applications · Proficiency with MS Office and email
    $100k-120k yearly 3d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline Corporation 4.1company rating

    Cyber security analyst job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS * Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities * Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. * Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. * Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. * Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. * Knowledge of TSA security requirements and regulations. * Knowledge of identity management processes and procedures. * Skill in project management. * Ability to manage, track and analyze information. * Ability to effectively work and cooperate with supervisors, co-workers, and vendors. * Ability to follow corporate policies and the directions of supervisors. * Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 28d ago
  • Senior Cyber Security Analyst

    University Health 4.6company rating

    Cyber security analyst job in San Antonio, TX

    /RESPONSIBILITIES The Senior Cyber Security Analyst must have a deep understanding of information security protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data. In this role, the Senior Analyst will be instrumental in establishing and maintaining security standards across Community First. The Senior Analyst will be required to develop, implement, and manage security solutions; and must demonstrate the ability to communicate complex security concepts to both technical and non-technical audiences. The Senior Analyst champions awareness and influences compliance with security policies and provides solutions for business-specific security issues. Oversees day-to-day identity access management and quarterly required audits. Owns and oversees the disaster recovery plans; coordinates business continuity plans with the compliance and risk management team. Serves as a thought leader and enterprise subject matter expert (SME) for federal and state information security regulations and standards. EDUCATION/EXPERIENCE Bachelor's degree plus five years of progressive experience working in information technology, security, or risk management. Must possess one or more of the following certifications: CISSP, CASP+, CRISC, CISA. Healthcare experience is highly desirable. Must have a functional understanding of federal/state regulations and compliance mandates, including but not limited to HIPAA, HITRUST, SOC, and other regulatory audits. MITRE ATT&CK experience in building threat detections, performing threat hunting and/or conducting incident response. Familiarity with enterprise logging technologies such as Splunk. Must have Business Continuity Plan and Disaster Recovery planning and testing experience. Five years minimum with below technologies or areas: Network Security: IDS/IPS, NGFW, NGAV Operating Systems: Windows, Linux, mac OS. Security: EDR/XDR, SIEMs, Data Loss and Prevention (DLP), Vulnerability Scanning and Assessment tools.
    $84k-107k yearly est. 22h ago
  • Intrusion Analyst 3

    Intelligenesis LLC

    Cyber security analyst job in San Antonio, TX

    * Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources * Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained from metadata analysis * Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs) * Develop and implement mitigation strategies * Have a network and/or host-based focus Required Skills: * US Citizens Only * Active TS/SCI Clearance and Polygraph required * Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master's degree or eight (8) years of relevant experience and a Bachelor's degree or ten (10) years of relevant experience and an Associate's degree required. * One or more of the following certifications required: * CISSP * CEH * Sec+ * Net+ * GIAC GREM * CREA * Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university * Relevant experience must be in malware analysis * Programming experience in C, C#, C++, Java, Perl, or Python is preferred Compensation Range: $57,463.60 - $126,419.91
    $57.5k-126.4k yearly 7d ago
  • Intrusion Analyst 3

    Gormat

    Cyber security analyst job in San Antonio, TX

    Gormat is looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. You will categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). You will also develop and implement mitigation strategies. The ideal candidate will have a network and/or host-based focus. The Intrusion Analyst shall possess the following capabilities: Relevant experience must be in malware analysis Programming experience in C, C#, C++, Java, Perl, or Python is preferred. CISSP, GIAC GREM or CREA Certification is preferred for level 1. Supporting CSD; deep understanding of cyber threat intelligence, preferably against hard targets like state-sponsored APTs. Strong skills using customer toolset and depth of experience leveraging the sigint system for technical data. Qualifications: Level 1: Bachelor's Degree with 2 years of relevant experience. Associates degree with 4 years of relevant experience. Level 2: Master's Degree with 3 years of relevant experience. Bachelor's Degree with 5 years of relevant experience. Associates degree with 7 years of relevant experience. Level 3: Doctoral degree plus 4 years of relevant experience Master's degree with 6 years of relevant experience Bachelor's Degree with 8 years of relevant experience Associates degree with 10 years of relevant experience Level 4: Doctoral degree plus 7 years of relevant experience Master's degree with 9 years of relevant experience Bachelor's Degree with 11 years of relevant experience Associates degree with 13 years of relevant experience All Levels: Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university. Certifications Required: CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3 TS/SCI with polygraph is required.
    $69k-99k yearly est. 11d ago
  • Cyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)

    City of San Antonio, Tx 4.4company rating

    Cyber security analyst job in San Antonio, TX

    Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff. Work Schedule 7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department Essential Job Functions * Leads analysis and development of the integration, testing, operations, and maintenance of system security. * Leads assessments of systems and networks and identifies deviations. * Maintains access control and collection gaps. * Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards. * Prepares and executes system tests to evaluate optimization. * Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response. * Executes and manages a Security Awareness Training Program and provides data for reports. * Leads security "tiger team" in the prosecution of vectors, hackers, and various threats. * Assist superiors in the production of the Alamo Region Security Operation Center products. * Performs related duties and fulfills responsibilities as required. Job Requirements * Bachelor's degree from an accredited college or university. * Four (4) years of relevant technical, cyber security, and business work experience. * CompTIA Security+. * GIAC: GPEN or GWAPT. * Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions. Preferred Qualifications * Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations. * Experience leading agile efforts. * Experience in coaching and mentoring team members. * Scrum Master, Agile Certifications. Applicant Information * Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university. * Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted. * Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application. * If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents. may be attached to the application for consideration in advance. Knowledge, Skills, and Abilities * Knowledge of 7 NICE Framework Workforce Categories. * Knowledge of business operations, systems requirements, and IT processes and technologies. * Knowledge of information and data analysis and reporting. * Knowledge of Cyber Security system design, programming principles, processes, and tools. * Knowledge of strategic planning and change management. * Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI. * Skill in interpersonal communications and analytical thinking. * Skill in technical writing. * Ability to perform all the essential functions of the position, with or without accommodations. * Ability to work in an office environment.
    $59k-76k yearly est. 20d ago
  • Network Security Analyst

    Techtalenthunt

    Cyber security analyst job in Austin, TX

    Requirement details: Internal job ID:TWK_2002 Network Security Analyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only. Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification. Job Description: This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services. This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security SKILLS AND QUALIFICATIONS Years Required Experience 2 Required Information security analysis work or related IT security work 4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally 2 Preferred with a cybersecurity architecture and data flow documentation 2 Preferred with a Vulnerability Management programs 2 Preferred doing web application security scans/assessments 2 Preferred with custom dashboards and/or configurations of SIEM tools 2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
    $67k-91k yearly est. 60d+ ago
  • Network Security - Cisco ASA Checkpoint

    Cloud Space LLC

    Cyber security analyst job in Plano, TX

    Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint Type: Contract We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments. Primary Technical Skills SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat. Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection. Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies. Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules. Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback. Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis. High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments. Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing. Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows. User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance. Secondary Technical Skills SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution. Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP. Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks. SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel. Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement. DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection. Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies. Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning. Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls. Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation. Required Experience 8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations. Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement. Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation. Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking. Experience in incident response, forensics, and policy rollback in production SSE environments. Preferred Qualifications Experience with hybrid cloud security models and multi-cloud segmentation strategies. Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs). Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS. Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning. Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration. Nice to Have Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA) AWS/Azure Security Specialty CISSP or CCSP
    $66k-90k yearly est. 5d ago
  • Network Security Analyst

    Cymertek

    Cyber security analyst job in San Antonio, TX

    Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $67k-91k yearly est. Easy Apply 60d+ ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Cyber security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 12h ago
  • Security Systems Analyst

    Artech Information System 4.8company rating

    Cyber security analyst job in Plano, TX

    Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost. Job Description • Deploy and maintain a full suite of endpoint security products. • Responsible for ensuring high level of systems security compliance. • Maintain pertinent site location details to ensure proper incident management ticket routing. • Perform incident triage and handling by determining scope, urgency and potential impact • Provide support for vulnerability assessments tools across multiple vendors. • Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists. • Maintain and expand related information security metrics. Qualifications • 5+ years supporting workstation and server operating systems. • 1 year incident response and malware removal experience • 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc. • Basic knowledge of network and perimeter security methodologies and tools. Additional Information Looking only for W2, No C2C ( Referral and H1B Transfer will work )
    $90k-121k yearly est. 60d+ ago
  • Network Security Audit

    Stem Xpert

    Cyber security analyst job in Irving, TX

    Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services. We strongly believe: " If something cannot be measured, it cannot be managed. " TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core. We are an Equal Employment Opportunity Employer M/F/V/D Recognitions: 2015 -America's Fastest Growing Company by Inc.com 2015- SPARK FastTrack Award from Ann Arbor SPARK 2015 -Honoree of Diversity Focused Company by Corp! Magazine 2014- America's Fastest Growing Company by Inc.com 2014- Michigan 50 Companies to Watch 2014 - DiSciTech Award in Technology by Corp! Magazine 2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine 2014- SPARK FastTrack Award from Ann Arbor SPARK Specialties: Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration Position details: Senior Systems Engineer - Network Security Audit Location: Irving TX Duration: 6+ months Job Description: Current CCNP, CCNA, CISSP or equivalent - Experience in auditing network security compliance - 8+ years' experience with IIS - 8 + years' experience in Windows System Administration and Active Directory - Experience in network design, operational support, hands-on implementation and configuration of network infrastructure - Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms - Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing Additional Information Regards, Swati swati(dot)********************** ************
    $67k-90k yearly est. Easy Apply 60d+ ago
  • IT Network / Security Analyst

    Txo Partners Gp LLC

    Cyber security analyst job in Fort Worth, TX

    The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape. Duties and Responsibilities: Network Operations & Monitoring Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components. Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats. Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations. Travel as required (up to 25%) to support field locations. Incident Response & Troubleshooting Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation). Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience. Participate in on-call rotations for critical incident response. Network Security Administration Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement. Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data. Oversee security patching and firmware upgrades across network infrastructure. Vulnerability & Compliance Management Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses. Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations. Assist with periodic audits, reporting findings, and driving corrective actions. Threat Intelligence & Reporting Stay up to date on evolving attack vectors, especially those targeting enterprise networks. Leverage threat intelligence to proactively adjust network defenses. Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture. Collaboration & Training Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations. Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting. Knowledge, skills, and abilities: Technical Knowledge Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures. Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus). Familiarity with security technologies such as SIEM (Splunk, ELK) a plus. Hands-on experience with enterprise network firewalls and network equipment. Experience with enterprise endpoint protection. Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access. Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations. Skills Proficiency in troubleshooting complex network and security issues in enterprise environments. Strong analytical mindset with the ability to distinguish between performance-related issues and security threats. Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences. Effective multitasking and prioritization in 24/7 operations environments. Abilities Ability to balance proactive network performance management with rapid cyber threat response. Commitment to continuous learning in both network operations and cybersecurity trends. Adaptability to shifting operational demands and evolving attack landscapes. Strong teamwork skills with the discretion to handle sensitive information responsibly. Education and Experience Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred. 3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred. Relevant certifications highly desirable, such as: Network-focused: CCNA, CCNP, CompTIA Network+ Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH) Equal Opportunity Employer Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information. Edit job description
    $67k-90k yearly est. Auto-Apply 60d+ ago
  • Information Security Risk & Compliance Analyst

    Midfirst Bank 4.8company rating

    Cyber security analyst job in Oklahoma City, OK

    The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise. The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment. Key Result Areas: Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including: Develop and maintain enterprise security policies and procedures Assist in the coordination and completion of information security risk assessments and documentation Work with information security management to develop strategies and plans to enforce security requirements and address identified risks Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance Work with IT department and members of the information security team to identify, select and implement technical controls Provide direct support to the business and IT staff for security related Maintain an awareness of security and control issues in emerging technologies Perform other duties as assigned Knowledge, skills, and experience required: Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.) Strong analytical and problem-solving skills to enable effective security incident and problem resolution Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously Ability to work well under minimal supervision Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting Strong customer/client focus with the ability to manage expectations appropriately General understanding of risk management Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas) Preferred Qualifications: Understanding of enterprise risk management systems and automation platforms Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions *This position is on-site located in Oklahoma City, must reside within the area to be considered. *Position requires a minimum of 3 years of relevant US based experience. #LI-Onsite #LI-DNI
    $77k-104k yearly est. 34d ago
  • Information Security Analyst 2

    Cdo Technologies Inc. 4.5company rating

    Cyber security analyst job in San Antonio, TX

    Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service. Position Summary: This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers. This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension. Job Responsibilities: Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO) Develop, complete, and process System Categorization Document and System Security Plans Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS) Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families Process and submit Plans of Action and Milestones (POA&Ms) Ensure DISA STIGs/SRGs are implemented and enforced Perform Risk Analysis and Vulnerability Assessments Perform annual security reviews in accordance with FISMA reporting Review PPS, HW/SW listings, NSS checklists (all A&A artifacts) Minimum Requirements: An active Secret Security Clearance is required Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE 2+ years of experience in support of cybersecurity for the purposes of RMF Experience developing and sustaining RMF A&A packages Preferred Qualifications & Experience: Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs) Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc. Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs) Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc. Experience with code languages and frameworks (Java, C+, Apex, etc.) End-to-end experience with attaining system ATOs What can a CDO employee expect? At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave. CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
    $67k-93k yearly est. Auto-Apply 18d ago
  • Information Security Compliance Analyst

    Lee College 3.1company rating

    Cyber security analyst job in Baytown, TX

    Starting Salary Range is $71,905.60 - $75,573. The initial salary offer is commensurate with education and related work experience. The Information Security Compliance Analyst is the designated administrator of the Lee College Information Security Program TAC 202. This position provides assistance to the Chief Information Officer in the operations of the Lee College Information Security Program, as well as oversight and implementation of system-wide information security strategies and solutions. Specific areas include IT policy, continuity of IT operations, information security risk assessment, information security operations review, and security life cycle for information systems. Please Note: This position offers a hybrid work arrangement, blending onsite presence with remote flexibility. * Develop, recommend, and establish policies, procedures, and practices as necessary to protect Lee College information resources against unauthorized or accidental modification, destruction, or disclosure. * Design, coordinate and execute audit process, monitoring and procedures to assess and measure company Governance, risks, compliance with its security policies and procedures. Monitor advancements in information privacy laws to ensure organizational adaptation and compliance. * Identify and implement proactive and reactive technical measures to detect vulnerabilities and to defend against external and internal security threats. * Plan, implement and overseeing risk-related programs as per TAC 202 and other industry related frameworks & compliances. Creating and coordinating proper reporting channels for compliance issues. Developing compliance communications. Coordinating and scheduling required compliance training for employees. * Provide consulting and technical support services to owners, custodians, and users in defining and deploying cost-effective security controls and protections. * Ensures College functions in a legal and ethical manner while meeting its business goals. Responsible for developing Risk & compliance programs, reviewing company policies, and advising management on possible risks as per TAC202 state program and other best practices. * Establish, maintain, and institutionalize security incident response procedures to ensure that security events are thoroughly investigated, documented, and reported; that damage is minimized, that risks are mitigated, and that remedial actions are taken to prevent recurrence. * Investigate or direct Governance, Risk and compliance security issues, assess product, vulnerabilities, compliance, or operational risks and develop risk management strategies. * Establish and publicize a security awareness program to achieve and maintain a security-conscious user community. * Document, maintain, and obtain ongoing support for all aspects of the information security program. * Monitor the effectiveness of strategies, activities, measures, and controls designed to protect the College information resources. * Assure executive management's awareness of legal and regulatory changes that might impact the College information security and privacy policies and practices. * Serve as Lee College internal and external point of contact for information security matters. * Report frequently (at least annually) on the status and effectiveness of the information security program as directed by the Chief Information Officer (see TAC §202.73(a)). * Have authority for information security for the entire institution (see TAC §202.71(a)(2)). * Develop and recommend policies and establish procedures and practices, in cooperation with the information-owners and custodians, necessary to ensure the security of information and information resources against unauthorized or accidental modification, destruction, or disclosure. * Coordinate the review of the data security requirements, specifications, and, if applicable, third-party risk assessment of any new computer applications or services that receive, maintain, and/or share confidential data. * Verify that security requirements are identified, and risk mitigation plans are developed and contractually agreed to and obligated prior to the purchase of information technology hardware, software, and systems development services for any new high impact computer applications or computer applications that receive, maintain, and/or share confidential data. * Serve as liaison with assigned Lee College educational centers for the purpose of monitoring information security program effectiveness and compliance with program requirements. Perform other duties as assigned. * Bachelor's (or higher) degree in a related field * Five (5) years of experience designing, implementing, auditing, and/or managing information resources, information security, or risk management projects, operations, and/or programs * Experience in the implementation of governance, risk, and compliance strategies preferred * Experience working in a higher education setting preferred * Experience in Texas State government preferred * Must be able to work evenings and weekends as required
    $71.9k-75.6k yearly 14d ago
  • Intrusion Analyst 3

    Intelligenesis

    Cyber security analyst job in Boerne, TX

    Job Description Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained from metadata analysis Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs) Develop and implement mitigation strategies Have a network and/or host-based focus Required Skills: US Citizens Only Active TS/SCI Clearance and Polygraph required Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master's degree or eight (8) years of relevant experience and a Bachelor's degree or ten (10) years of relevant experience and an Associate's degree required. One or more of the following certifications required: CISSP CEH Sec+ Net+ GIAC GREM CREA Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university Relevant experience must be in malware analysis Programming experience in C, C#, C++, Java, Perl, or Python is preferred Compensation Range: $57,463.60 - $126,419.91 _____________________________________________________________________________________________________ Compensation ranges encompass a total compensation package and are a general guideline only and not intended as a guaranteed and/or implied final compensation or salary for this job opening. Determination of official compensation or salary relies on several different factors including, but not limited to: level of position, complexity of job responsibilities, geographic location, candidate's scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements and alignment with local market data. Our compensation includes other indirect financial components designed to support employees' total well-being, which should be considered when evaluating our competitive benefits package. These monetary benefits include medical insurance, life insurance, disability, paid time off, maternity/paternity leave, 401(k) company match, training/education reimbursements and other work/life programs. _____________________________________________________________________________________________________ IntelliGenesis is committed to providing equal opportunity to all employees and applicants for employment. The Company is an Equal Opportunity Employer (EOE), and as such, does not tolerate discrimination, retaliation, or harassment of its employees or applicants based upon race, color, religion, gender, sexual orientation, national origin, age, genetic information, disability, or any other protected characteristic under local, state, or federal law in any employment practice. Such employment practices include, but are not limited to: hiring, promotion, demotion, transfer, recruitment, or recruitment advertising, selection, disciplinary action layoff, termination, rates of pay, or other forms of compensation and selection of training. IntelliGenesis is committed to the fair and equal employment of individuals with disabilities. It is the Company's policy to reasonably accommodate qualified individuals with disabilities unless the accommodation would impose an undue hardship on the organization. In accordance with the Americans with Disabilities Act (ADA) as amended, reasonable accommodations will be provided to qualified individuals with disabilities, when such accommodations are necessary, to enable them to perform the essential functions of their jobs or to enjoy the equal benefits and privileges of employment. This policy applies to all applicants for employment and all employees. Powered by JazzHR r6Q1S4orSF
    $57.5k-126.4k yearly 2d ago
  • Intrusion Analyst 3

    Gormat

    Cyber security analyst job in San Antonio, TX

    Job Description Gormat is looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. You will categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). You will also develop and implement mitigation strategies. The ideal candidate will have a network and/or host-based focus. The Intrusion Analyst shall possess the following capabilities: Relevant experience must be in malware analysis Programming experience in C, C#, C++, Java, Perl, or Python is preferred. CISSP, GIAC GREM or CREA Certification is preferred for level 1. Supporting CSD; deep understanding of cyber threat intelligence, preferably against hard targets like state-sponsored APTs. Strong skills using customer toolset and depth of experience leveraging the sigint system for technical data. Qualifications: Level 1: Bachelor's Degree with 2 years of relevant experience. Associates degree with 4 years of relevant experience. Level 2: Master's Degree with 3 years of relevant experience. Bachelor's Degree with 5 years of relevant experience. Associates degree with 7 years of relevant experience. Level 3: Doctoral degree plus 4 years of relevant experience Master's degree with 6 years of relevant experience Bachelor's Degree with 8 years of relevant experience Associates degree with 10 years of relevant experience Level 4: Doctoral degree plus 7 years of relevant experience Master's degree with 9 years of relevant experience Bachelor's Degree with 11 years of relevant experience Associates degree with 13 years of relevant experience All Levels: Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university. Certifications Required: CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3 TS/SCI with polygraph is required. Job Posted by ApplicantPro
    $69k-99k yearly est. 10d ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Cyber security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Durant, OK?

The average cyber security analyst in Durant, OK earns between $58,000 and $104,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Durant, OK

$77,000
Job type you want
Full Time
Part Time
Internship
Temporary