Application Security Analyst
Cyber security analyst job in Plano, TX
Bachelor's degree in Computer Science, Cybersecurity, or related field.
3+ years of experience in DevOps, Security Engineering, or related roles. 2-3 years of security experience. Overall, 6 years
Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
Development knowledge on Java, Python, .Net, etc
Experience with security tools (e.g., Veracode, GHAS, Orca).
Proficiency in scripting languages (e.g., Python, Bash).
Familiarity with containerization and orchestration (Docker, Kubernetes).
Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Understanding of secure coding practices and application security principles.
Knowledge of Infrastructure as Code (Terraform, Ansible).
Cyber Security Engineer
Cyber security analyst job in Dallas, TX
• DevSecOps' expertise in building and supporting security solutions for Windows, Linux, above mentioned platforms, including services such as Enterprise Vulnerability Management, data protection, privacy and compliance, network protection.
• Building and deploying security solutions using technologies such as Docker, Kubernetes, and GIT Hub.
• Experience in low code environments such as Appian and Microsoft Power Platforms is mandatory.
• Experience with Alteryx ETL and Workflow Designer platform is plus.
• Experience with Identity and Access, Endpoint, Vulnerability management and other cybersecurity automation workflows.
• Experience writing Automation scripts in Python and deploying them leveraging APIs.
• Experience with AI enabled automation workflows.
• Experience with Agile methodology and Atlassian tools including JIRA and Confluence.
• Communicating with various audiences, including business leaders, engineers, clients, and team members, with excellent ability to convey information that is relevant
to the audience.
• Written communication for excellent documentation and reporting.
• Outstanding teamwork across multidiscipline plan-build-run teams.
• Applying your understanding and expertise with systems automation platforms and technologies.
• Automating security controls, data, and processes to provide metrics and operational support.
• Employing cloud-based APIs when suitable to integrate and orchestrate across various systems in the automation workflow.
• Developing and delivering solutions using Agile methodology.
“Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
Application Security Analyst
Cyber security analyst job in Plano, TX
Job Title: Application Security Analyst
Project Duration: 12+ months will extend and/or be a temp to perm.
Requirements Qualifications/ What you bring (Must Haves) -
We're looking for diverse, talented team members who want to Dream. Do. Grow. with us. What we're looking for We are seeking a skilled and proactive Application Security Analyst to integrate security practices into our DevOps processes.
The ideal candidate will work closely with development and operations team to ensure secure software delivery pipelines, automate security controls, and foster a culture of shift left in the organization. What you'll be doing
• Design, implement, and maintain secure CI/CD pipelines.
• Integrate security tools (SAST, DAST, SCA, etc.) into development workflows.
• Collaborate with development and operations teams to remediate vulnerabilities.
• Automate security testing and compliance checks.
• Monitor and respond to security incidents in cloud and container environments.
• Develop and enforce security policies, standards, and procedures.
• Stay current with emerging security threats and DevSecOps best practices.
Highlight Top 3-5 skills
• Bachelor's degree in Computer Science, Cybersecurity, or related field.
• 3+ years of experience in DevOps, Security Engineering, or related roles. 2-3 years of security experience. Overall, 6 years
• Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
• Development knowledge on Java, Python, .Net, etc
• Experience with security tools (e.g., Veracode, GHAS, Orca).
• Proficiency in scripting languages (e.g., Python, Bash).
• Familiarity with containerization and orchestration (Docker, Kubernetes).
• Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
• Understanding of secure coding practices and application security principles.
Senior Information Security Analyst
Cyber security analyst job in Plano, TX
The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective.
Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives.
Translate complex information and documentation into clear and simple concepts for end-users.
Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture.
Stay informed about the latest cybersecurity threats, trends, and best practices.
Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmark policies against industry standards and best practices.
Develop and implement governance frameworks for cybersecurity policy management.
Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls.
Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Lead and support internal and external audits and assessments of cybersecurity policies and practices.
Ensure identified audit and assessment findings and actions are tracked to closure.
Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities.
Communicate policy requirements and updates to relevant stakeholders.
Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans.
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred).
Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency with data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA (highly desirable).
Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Understanding of risk management concepts, control frameworks, and compliance auditing.
Ability to provide consultation and recommendations to management.
Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
Senior Security Engineer - Privileged Access Management
Cyber security analyst job in Dallas, TX
Glocomms is partnered with an integral financial services corporation seeking a Security Engineer focused on Privileged Access & Automation to design and maintain secure authentication, authorization, and secrets management systems across on-prem and cloud environments. This role focuses on privileged access management, security architecture, and automation, leveraging AI-based capabilities to ensure operational integrity and compliance.
Responsibilities
Implement and manage privileged access systems (CyberArk, HashiCorp Vault) and secrets lifecycle management.
Design and support authentication/authorization frameworks (Active Directory, oAuth 2.0, OIDC, AWS IAM, PKI, certificates).
Maintain operational integrity through patching, version control, upgrades, troubleshooting, and break-fixes.
Apply security as code principles using Terraform, Ansible, Jenkins pipelines, and CI/CD deployments.
Develop automation scripts in Go, Bash, Python, PowerShell for secure integrations.
Integrate AI-based security capabilities for detection, remediation, and automated workflows.
Collaborate cross-functionally with engineering, cloud, and compliance teams; participate in 24x7 operational support.
Qualifications
5+ years in security engineering, architecture, or operations within complex environments.
Hands-on experience with CyberArk, HashiCorp Vault, PKI, and privileged access methodologies.
Strong knowledge of Active Directory, Kerberos, LDAPS, oAuth 2.0, OIDC, and AWS IAM.
Familiarity with Kubernetes security, HSMs, and cloud ecosystems.
Proficiency in Go, Bash, Python, PowerShell; experience with Terraform, Ansible, Jenkins.
Understanding of security architecture principles, confidentiality, integrity, availability, and compliance frameworks.
Exposure to AI-enabled security tools and automation strategies preferred.
This is a hybrid role requiring 3 days per week onsite in Dallas, TX. Candidates must be fully authorized to work in the United States. Unfortunately, visa sponsorship is not available for this role.
Applications must include candidate's full name (first and last) and contact information in order to be considered.
Security Engineer, Corporate Security
Cyber security analyst job in Dallas, TX
About the Role
Eden Prescott is partnering with one of our top AI security clients, a fast-growing company that's seen significant momentum over the past year, to help them hire a Security Engineer focused on Corporate security.
This is a hands-on opportunity to build and scale the foundational systems that protect an AI-driven infrastructure from evolving threats. You'll work closely with engineering, IT, and compliance teams to ensure deep visibility across environments, strengthen detection capabilities, and automate key workflows that keep the company secure as it scales.
What You'll Do
Partner with engineering and infrastructure teams to design and build pipelines for collecting and correlating security telemetry.
Develop and maintain scalable, high-performance monitoring and detection infrastructure.
Create detection strategies to identify anomalous or malicious activity and ensure critical systems remain protected.
Triage, investigate, and resolve security alerts and incidents, driving them to closure with minimal business impact.
Collaborate with engineering to eliminate recurring issues and continuously refine detection rules.
Stay ahead of emerging threats and continuously evolve detection and response capabilities.
Contribute to the strategy, risk management, and automation roadmap for security operations.
Work with compliance and audit teams to maintain certifications and ensure alignment with security frameworks.
Implement pragmatic, business-driven controls across multi-cloud environments.
What You'll Bring
5+ years of experience in security engineering
Must have EDR, Identity (MFA, PAM, phishing-resistant authentication methods), Azure governance (policies), and CWPP/CSPM.
Strong track record building and scaling SOC operations in cloud-native environments.
Hands-on experience with SIEM/SOAR tools (e.g., Splunk, Microsoft Sentinel, Trellix) and telemetry instrumentation.
Familiarity with CNAPP solutions (e.g., Wiz, Orca, Defender, Singularity) across multi-cloud ecosystems.
Fluency in scripting languages such as Python, PowerShell, or JavaScript.
Automation experience with Azure Functions, Logic Apps, AWS Lambda, or Runbooks.
Expertise in IAM analysis, anomaly detection, and real-time threat response across cloud environments.
Strong communication, decision-making, and collaboration skills in a distributed team setting.
Ability to prioritize and execute in a dynamic, high-growth environment.
Bonus: familiarity with DevOps practices and experience in AWS, GCP, or Azure deployments.
AI Security Engineer
Cyber security analyst job in Plano, TX
AI Security Engineer (Generative AI Focused)
Plano, Texas, United States
Contract
We're looking for an experienced AI Security Engineer to join us, someone skilled in both artificial intelligence (AI) and cybersecurity. This role focuses on ensuring the security and integrity of AI systems and applications.
Requirements
Qualifications to be Successful:
Strong understanding of AI technologies and security vulnerabilities.
Experience with machine learning, neural networks, and AI methodologies.
Knowledge of cybersecurity principles, frameworks, and standards.
Proficiency in Python or R, common languages used in AI.
Minimum Qualifications:
Bachelor's degree in computer science, information security, or related field (advanced degree preferred).
3+ years of cybersecurity experience, with a focus on securing AI systems.
Strong understanding of machine learning techniques, algorithms, and AI frameworks.
Familiarity with cybersecurity standards, regulations, and compliance requirements.
Hands-on experience with security tools and technologies.
Proficiency in programming languages used in AI development.
Excellent analytical, communication, and interpersonal skills.
Relevant certifications such as CISSP, CISM, CEH, or GIAC are beneficial.
Experience with cloud computing and containerization technologies is desirable.
Thanks,
Vikas.
************************
Security Engineer-ONLY W2(No C2C)
Cyber security analyst job in Plano, TX
We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities.
Key Responsibilities
Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool.
Deploy and configure Flex ID to enable passwordless, frictionless identity experiences.
Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications.
Ensure robust identity and access management (IAM) implementations using industry best practices.
Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows.
Monitor, troubleshoot, and optimize identity workflows for performance and security.
Document technical solutions and provide knowledge transfer to internal teams.
Required Qualifications
✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform.
✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification.
✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration.
✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively.
✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc.
✅ Strong communication and documentation skills.
Preferred Qualifications
Experience integrating identity services with CI/CD pipelines or DevOps environments.
Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA).
Background in cybersecurity, software engineering, or cloud architecture.
Deputy, Global Information Security Officer
Cyber security analyst job in Richardson, TX
The Deputy, Global Information Security Officer is responsible for leading the security strategy roadmap, consulting with security solution partners and defining company security policies and standards. Will have oversight of global security operations, incident response and both US and international Aerospace and Defence (A&D) security and compliance. The right candidate will have the required presence, confidence, and knowhow to quickly gain trust, credibility, and respect. They will have a proven record of taking a fact-based approach to the assessment of the current state of operations and the implementation of pragmatic solutions to address business needs. They will extract maximum value from existing technology investments while leveraging industry trends to introduce new and relevant technologies to deliver the necessary protection to the enterprise.
Detailed Description:
Performs tasks such as, but not limited to, the following:
Drive the overall security strategy for Celestica, aligning security initiatives with business objectives, influencing stakeholders, and securing buy-in for security investments.
Act as a champion for security across the organization, fostering a security-conscious culture and promoting best practices.
Provide leadership to the information security organization.
Take ownership of the incident response program, including developing and testing incident response plans, coordinating response activities, and conducting post-incident reviews to improve future response capabilities.
Leverage data analytics to inform security strategy, identify threats, and measure the effectiveness of security controls. This includes promoting a data-driven security culture within the team.
Drive improvements and efficiencies within the security operating model including identifying areas for optimization, streamlining processes, and championing change.
Drive the development and implementation of security standards and policies. This includes ensuring compliance with relevant regulations and industry frameworks, and staying abreast of emerging security threats and best practices.
Actively scans laws, guidelines, and regulations in all the countries that we operate to ensure that any major exposure on data privacy is addressed or mitigated.
Establish, implement and monitor strategic processes to maintain and improve IT solutions, infrastructure and support services.
Coordinate with external authorities to assure monitoring posture is at a high level of attentiveness.
Accountable for monitoring suspicious network and endpoint activities, and taking corrective actions, as required.
Responsible for managing security partners and other third-party security relationships.
Appraise CIO/CISO of cybersecurity trends and threats.
Responsible for developing and testing threat identification, containment, and recovery plans.
Accountability for cybersecurity awareness, training, and internal phishing campaigns.
Key liaison and collaboration with physical security.
Collaborate on pre-acquisition requirements with stakeholders assuring that security standards are met prior to acquisition.
Facilitate the necessary efforts and resources to ensure that duration of exposure to cyber events is addressed rapidly
Participate on company world-wide teams to share information, help implement global initiatives, leverage IT resources and investments, and develop future state of company architecture.
Build, manage, and mentor a high-performing security team. This includes setting clear goals, providing development opportunities, and fostering a collaborative and innovative work environment.
Responsible for maturing the Information Security function and driving discipline on execution of all security initiatives to ensure they are delivered on-time, on-budget, and with quality.
Knowledge/Skills/Competencies:
Advanced knowledge of project management and Full Project Scope Experience
Experience in partnering with the business in promoting cybersecurity initiatives
Demonstrated experience implementing Security strategies and solution designs
Advanced understanding of virtualized cloud computing environments
Performing full security compliance and risk assessments
Advanced knowledge of Information Security Penetration Testing, IT Vulnerability Assessments
Mastery level of understanding in IT Risk Management and IT Governance/Audit Procedures
Advanced understanding of Cybersecurity incident Response Management and advanced experience in incident response activities
Advanced understanding of IT Security Architecture
Advanced knowledge of Security Standards, Regulations, and Best Practices
Extensive knowledge of IT design and deployment, and operations process
Knowledge and understanding of the business unit and how decisions impact customer satisfaction, product quality, on-time delivery and the profitability of the unit
Information security forensics
Knowledge of common information security frameworks and IT controls frameworks, such as NIST 800-171, ISO/IEC 27001, and ITIL
Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. Knowledge of global requirements
Effectively manage relationships with security vendors, negotiating contracts and ensuring the organization is getting the best value for its security investments.
Experience working with customers on security assessments and audits
Proven ability to influence and promote safe technology usage, practices and behaviours across all levels of the entire organization by leveraging direct and indirect resources, delivering effective global communication, and enforcing policy attestation and mandatory employee training.
Demonstrated understanding of how security decisions impact the business, including customer trust, brand reputation, and revenue generation.
Ability to articulate the value of security investments in business terms.
Ability to communicate complex security concepts clearly and concisely to a variety of audiences, including senior management, board members, and external stakeholders. This includes building consensus, influencing decision-making, and securing support for security initiatives.
Required knowledge of the U.S. GOVERNMENT COMPLIANCE but not limited to, DFAR ************/NIST 800-171, DFARS ************, ************, and ************, CMMC Model Version 2.0 and associated testing requirements, and 48 CFR 52.204-21
Physical Demands:
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Typical Experience:
15+ years of IT experience with a proven track record of delivering global capabilities around risk management, information security and progressive IT roles.
5+ years of Senior-level IT Security leadership experience within an organization of comparable scale and complexity, experience in the manufacturing industry is preferred.
Knowledge of all aspects of IT business.
Typical Education: Bachelor's Degree.
Notes:
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Cloud Security Engineer
Cyber security analyst job in Dallas, TX
An exciting opportunity for an experienced Cloud Security Engineer to join a global SaaS company, in a hyper growth stage. This is a crucial customer-facing role where you will be instrumental in designing, implementing, and securing complex cloud environments for clients across Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Services (AWS).
Key Responsibilities:
Cloud Security Operations
Perform penetration testing activities
Network Security Expertise
Firewall & WAF Management
SaaS Security Best Practice
SIEM Integration & Optimization
Customer Engagement & Presentation
Requirements:
8+ years of cybersecurity experience
4+ years cloud security engineering
Strong expertise with Google Cloud Platform (GCP)
Strong practical experience with Microsoft Azure and AWS
Expertise in SaaS applications
Demonstrable experience with firewall management and WAFs
Hands-on experience with SIEM platforms
CISSP Certified
Security Analyst with Active Directory, SIEM and EDR skills - 100% onsite
Cyber security analyst job in Arlington, TX
3 month contract to hire
Rate: $55-60/hr
Salary: $100-120k/yr
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
· Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
· Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
· DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
· Active Directory Sites and Services
o Management of sites and subnets
· Active Directory Domains and Trusts
o Management of domain trust configuration
· Group Policy Management
o Troubleshooting and cleanup of GPOs
· Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
· Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
· Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
· Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
· Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
· Ability to participate in a weekly call rotation
· IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
operational
· On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
· Mentoring and Training
o .Responsible for the mentoring of Security Administrators
· Ability to travel overnight
Qualifications
Education and/or Experience
· High school diploma or general education degree (GED)
· One to four years' experience in an IT related field
· Knowledge of IT Security Operations and Forensic Operations
· Experience with computer networks
· Experience with project management and delegation
· Business communication and collaboration skills
· Documentation skills
· Ability to work well within a team, and work alone to accomplish tasks independently
· Ability to interpret research into solutions to actual problems
· Customer Service skills
· Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
· Proficiency with MS Office and email
Chief Information Security Officer
Cyber security analyst job in Dallas, TX
The CISO will lead the development and execution of a comprehensive information and cybersecurity strategy aligned with WFSDallas' mission. This role will oversee the protection of digital and physical assets, data of job-seekers, employers and partners, and ensure secure, reliable operations across all service channels. The CISO will be a strategic advisor to senior leadership and the board, while managing day-to-day security operations, risk management, compliance and business continuity.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
This is intended to identify the essential functions of a position and should not be interpreted as all-inclusive. The employee may be required to perform or assume additional job-related responsibilities other than those stated in this . Typical duties include:
• Develop and implement enterprise-wide information cybersecurity strategy and governance framework including policies, procedures, and training to ensure compliance and security awareness organization-wide adhering to the National Institute of Standards and Technology (NIST) 800.53 Version 5 and Texas Cybersecurity Framework (TCF).
• Lead risk assessment, regulatory compliance (federal/state grants, data privacy, workforce system regulations) and vendor/partner security oversight.
• Oversee security operations: threat intelligence, vulnerability management, incident response, identity & access management, cloud/endpoint security.
• Build and lead the information security team; cultivate a security-aware culture across workforce centers, staff and partner organizations.
• Collaborate with IT, operations, legal, HR, training and executive leadership to embed security into all programs and services.
• Evaluate and implement emerging security technologies and approaches to support digital transformation.
Develops and implements agency policies for encryption of data transmissions and the erection of firewalls to conceal information as it is being transmitted and to eliminate tainted digital transfers. Serve as liaison to the Board of Directors and external stakeholders regarding security posture, incidents and audits.
• Oversees cybersecurity budgets, contracts, and resource planning to ensure efficient and effective allocation of security resources.
• Regularly reports cybersecurity posture, risk assessments, and incident outcomes to executive leadership and the Board.
• Leads, mentors, and develops information technology and cybersecurity staff to build organizational capability and succession strength.
RISK MANAGEMENT & COMPLIANCE
• Identify, assess and manage information security risks across all WFSDallas' operations-digital systems, workforce centers, training portals, partner systems.
• Ensure compliance with relevant laws, regulations and standards (including federal workforce grant requirements, data privacy, state/county regulations).
• Monitors changes in state and federal legislation and advises leadership on potential impacts to agency cybersecurity posture.
• Lead internal and external security audits, assessments and remedial actions.
• Monitor and evaluate third-party vendor security and partner integrations.
SECURITY OPERATIONS
• Lead the architecture, deployment and operation of security infrastructure: network security, endpoint security, cloud security, identity & access management.
• Oversee vulnerability management, threat intelligence, detection and response capabilities.
• Develop and maintain incident response plan, coordinate response to security events, and lead investigations.
• Collaborate with IT teams supporting WFSDallas' centers, online portals, job-seeker data systems, and employer portals.
Develops performance metrics to measure effectiveness of cybersecurity controls and drives continuous improvement across all security domains.
BUSINESS CONTINUITY & DATA PROTECTION
• Develop and maintain disaster recovery and business continuity plans for mission-critical systems (career services platform, job-matching system, training portals, partner integrations).
• Protect sensitive data (jobseeker information, employer information, partner data) with appropriate encryption, access controls, retention policies.
• Lead the development of a data classification and handling program aligned to the organization's operations.
SUPERVISORY RESPONSIBILITIES:
This position is responsible to the President. Work is performed under general guidance and supervision and according to Workforce Solutions procedures and policies.
MINIMUM QUALIFICATIONS:
• Bachelor's degree in Computer Science, Information Security, Cybersecurity or similar (Master's preferred) or equivalent combination of education and relevant work experience
• At least 10 years of progressive experience in information security/IT risk management; 5+ years in a senior leadership role.
• Experience in a multi-site, multi-channel service delivery environment (preferred: public sector, non-profit, workforce systems).
• Strong working knowledge of security frameworks (e.g., NIST CSF, ISO 27001, COBIT).
• Proven ability to lead incident response and manage regulatory/compliance demands.
PREFERRED QUALIFICATIONS:
• Certifications such as CISSP, CISM, CISA.
• Experience with managing third-party/vendor risk, cloud security, identity & access management in hybrid environments.
• Excellent communication skills-capable of translating technical issues for executive/board audiences.
• Demonstrated ability to align security initiatives with organizational mission and business objectives.
LANGUAGE SKILLS:
Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals; ability to write routine reports and correspondence; and to effectively communicate with diverse audiences (colleagues, vendors, supplier, landlords, general public).
REASONING ABILITY:
Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
OTHER SKILLS and ABILITIES:
Knowledge of general office administration; office protocol; regulations for acquisition and inventory control; use and maintenance of computer systems; organization and accurate record-keeping. Type 50-60 words per minute accurately; compose complex correspondence and documentation; operate a variety of office equipment; train others; interact with visitors, Board of Directors, and subcontractors in a professional manner.
TRAVEL
Due to nature of job, travel will be required approximately 30-40% of work time. Must possess own method of transportation.
PHYSICAL DEMANDS:
The physical demands described here are representative of those which must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee is frequently required to stand; walk; and stoop, kneel, crouch, or crawl. The employee must regularly lift and/or move up to 10 pounds, frequently lift and/or move up to 25 pounds, and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, and ability to adjust focus.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts, fumes or airborne particles, and outside weather conditions. The noise level in the work environment is usually moderate.
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may be modified any time with or without notice or due to funding changes.
Workforce Solutions Greater Dallas is an EEO/AA/Drug Free Workplace Employer and complies fully with the Americans with Disabilities Act (ADA). Auxiliary aids and services are available upon request to individuals with disabilities. This position is grant funded.
Chief Information and Security Officer
Cyber security analyst job in Dallas, TX
Chief Information Security Officer
Chief Information Security Officer
The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position.
Required Knowledge, Skills, and Abilities
Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies.
Must also demonstrate strong written communication skills.
Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.
Must possess strong problem-solving skills to effectively influence decision-making in key negotiations.
Ability to perform hands-on, operational work when necessary.
Ability to maintain the security or integrity of the critical infrastructure of the institution.
Qualifications
Minimum Qualifications
Bachelor's degree and additional education in Information Security.
Prior managerial experience in Information Technology and service context.
Professional IT security management certification (e.g., CISSP, CISM).
10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability.
Experience running a security program in a complex environment.
Strong understanding of security protocols and operations.
Knowledge of current IT risks and experience implementing security solutions.
Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP.
EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization.
Bilingual or multilingual preferred.
***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.***
Key Responsibilities
IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction.
IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats.
Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework).
Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response.
Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts.
Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies.
Training: Develop and implement security training for faculty and staff.
Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches.
Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations.
Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience.
Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response.
Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies.
Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention.
Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year.
The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance.
Physical Requirements
Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
GO Fullstack Engineer with RBAC Security-- SINDC5697433
Cyber security analyst job in Dallas, TX
Job Title: GO Fullstack Engineer with RBAC Security - W2 only - We can provide sponsorship
Duration: Long Term
Skillset:
Strong background in several of the following:
Go,
Angular,
Python,
JavaScript,
AWS,
RESTful services,
Ruby,
MVC,
Jenkins CI/CD,
Configuration Automation (Chef, Ansible).
RBAC security roles and access management best practices
The Skills You Bring
RBAC security roles and access management best practices
Bachelor's degree or equivalent experience in Computer Science or Software Engineering preferred.
6+ Years IT experience.
Strong background in several of the following: Go, Angular, Python, JavaScript, AWS, RESTful services, Ruby, MVC, Jenkins CI/CD, Configuration Automation (Chef, Ansible).
Preferred background in: Bootstrap, HTML/CSS, Shell Scripting, messaging frameworks (MQ), Service Oriented/Micro-service Architectures, OpenStack, Relational Databases (PostgreSQL).
Comfortable working in both Linux, and Windows environments.
Experience with deploying and using open source tools, utilities and applications.
Working experience with Agile, 10-factor CI/CD, and testing environments/frameworks (Unit, Integration, TDD).
Understands the Spotify model for agile development and delivery.
Experience working in an ever-evolving DevOps environment.
The Expertise You Have
Demonstrates a drive for continuous improvement and enjoys tackling complex problems across various domains, even beyond the current role.
Possesses expertise in crafting scalable, cloud-friendly systems.
Quickly adapts to the evolving needs of the business and delivers timely results.
Maintains awareness of both current and new technologies.
Exhibits a strong desire to innovate and develop future technologies.
Capable of creating clear and compelling arguments to communicate decisions using available information and assumptions.
Cyber Security
Cyber security analyst job in Dallas, TX
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Network Security - Cisco ASA Checkpoint
Cyber security analyst job in Plano, TX
Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint
Type: Contract
We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments.
Primary Technical Skills
SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat.
Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection.
Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies.
Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules.
Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback.
Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis.
High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments.
Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing.
Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows.
User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance.
Secondary Technical Skills
SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution.
Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP.
Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks.
SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel.
Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement.
DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection.
Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies.
Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning.
Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls.
Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation.
Required Experience
8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations.
Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement.
Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation.
Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking.
Experience in incident response, forensics, and policy rollback in production SSE environments.
Preferred Qualifications
Experience with hybrid cloud security models and multi-cloud segmentation strategies.
Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs).
Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS.
Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning.
Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration.
Nice to Have
Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA)
AWS/Azure Security Specialty
CISSP or CCSP
Network Security Audit
Cyber security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplySecurity Systems Analyst
Cyber security analyst job in Plano, TX
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Description
• Deploy and maintain a full suite of endpoint security products.
• Responsible for ensuring high level of systems security compliance.
• Maintain pertinent site location details to ensure proper incident management ticket routing.
• Perform incident triage and handling by determining scope, urgency and potential impact
• Provide support for vulnerability assessments tools across multiple vendors.
• Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists.
• Maintain and expand related information security metrics.
Qualifications
• 5+ years supporting workstation and server operating systems.
• 1 year incident response and malware removal experience
• 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc.
• Basic knowledge of network and perimeter security methodologies and tools.
Additional Information
Looking only for W2, No C2C ( Referral and H1B Transfer will work )
System Security Analyst
Cyber security analyst job in Plano, TX
A System Security Analyst analyzes and implements system(s) security measures to protect sensitive data and infrastructure.
Implement and maintain security software like firewalls, encryption programs, and intrusion detection systems
Identify vulnerabilities in systems and networks, conduct penetration testing, and recommend mitigation strategies
Work closely with the systems team and Info Sec team to implement and enforce security policies and procedures, ensuring compliance with industry standards
Stay informed about the latest IT security trends and threats, and research new security solutions
Verify the security of third-party vendors and collaboration to meet security requirements
Technical knowledge of enterprise-class technologies such as cloud (AWS and Azure), firewalls, routers, switches, wireless access points, VPNs, and desktop and server operating systems
Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office 365, and the Windows server and desktop operating systems, patching and vulnerabilities analysis
Hands-on experience with the following technology vendors and products: CyberArk, Okta, CyberReason, Splunk, Vulnerability Scanners
Qualifications:
Bachelor's degree or equivalent with certifications related to Information Security e.g. CISA, CISSP,
5-7 years of relevant experience
Preferred: Technical knowledge of enterprise-class technologies such as cloud (AWS and Azure), firewalls, routers, switches, wireless access points, VPNs, and desktop and server operating systems. Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office 365, and the Windows server and desktop operating systems patching and vulnerabilities analysis
Skills:
CyberSecurity trends and latest threats and ethical hacker training
Working knowledge of Microsoft Excel and MS Word; basic keyboarding and calculator skills, must be able to do simple math and carry out written instructions
Travel to a variety of locations to perform work and/or attend meetings as required
Work occasionally requires more than 40 hours per week to perform the essential functions of the position
Lifting in an office setting may be required up to 30lbs.
ANBTX strongly encourages candidates that are fluent in English and Spanish to apply. Jobs that specifically require candidates to be bilingual will be posted as a requirement.
Information Security Specialist #2905
Cyber security analyst job in Dallas, TX
Information Security Specialist Permanent Opportunity We are excited to partner with our client in the search for an Information Security Specialist protect the organization's critical data and infrastructure. In this role, you will implement and maintain security controls, assess system vulnerabilities, and work collaboratively to ensure compliance with security policies and industry standards. If you have a passion for cybersecurity and a strong technical background, this is an excellent opportunity to grow your career.
Join an innovative organization that values its employees and offers a competitive compensation package, including a strong benefits plan, career development opportunities, and more. Become part of a company with a dynamic team that fosters growth and success!
Required Qualifications:
Bachelor's degree or equivalent experience in Information Technology or a related field.
5+ years of relevant experience in information security or related disciplines.
Professional certifications such as CISA, CISSP, or equivalent are preferred.
Strong knowledge of Microsoft enterprise platforms, including Azure, Active Directory, SQL, Office 365, and Windows OS patching and vulnerability management.
Prior experience with security tools and platforms related to identity management and access control, such as Okta and CyberArk.
Solid understanding of current cybersecurity trends and ethical hacking principles.
Proficiency with Microsoft Office applications, including Excel and Word.
Key Responsibilities:
Implement and manage security solutions, including firewalls, encryption technologies, and intrusion detection systems.
Conduct vulnerability assessments and penetration testing to identify potential risks, and recommend effective mitigation strategies.
Partner with IT and security teams to enforce policies and maintain compliance with internal and external requirements.
Stay current on emerging cybersecurity threats and evaluate new security technologies.
Assess the security posture of third-party vendors and collaborate to ensure alignment with organizational security standards.
Manage enterprise technologies across cloud platforms, network infrastructure, and operating systems.
Utilize experience with identity and access management platforms and security monitoring tools to support secure operations.
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.