Cyber Security Engineer
Cyber security analyst job in Dallas, TX
Hiring: Cybersecurity Engineer
Duration: 12 months contract
About the Role
We are seeking an experienced Lead Cybersecurity Engineer to join our dynamic team and drive secure-by-design principles across our cloud and application environments. In this role, you will collaborate closely with development teams to identify, assess, and remediate security vulnerabilities, ensuring robust protection across our AWS and Azure ecosystems.
Key Responsibilities
Lead Security by Design and integrate security throughout the SDLC.
Perform security defect management - analyze, validate, and consult on issues found via tools like CodeQL, Rapid7, penetration tests, and bug bounty programs.
Provide engineering consulting to developers, architects, and product teams on secure design and implementation best practices.
Manage tool enablement and monitoring for automated vulnerability detection tools (CodeQL, Rapid7, etc.).
Coordinate security testing and onboarding, including penetration testing and assurance assessments.
Technical Skills
Required:
Application Security (OWASP, CWE/CVE, SANS 25)
Enterprise Security Architecture, Threat Modeling, and Risk Analysis
SDLC, DevSecOps, and API Security
Cloud Security (AWS, Azure)
SCA / SAST / DAST tools
Hands-on development experience in Java, Python, .NET, or JavaScript
Automation and scripting for security processes
Security certifications preferred (CISSP, CCSP, GWAPT, GWEB, AWS Certified Security, etc.)
Preferred:
Web Services Security
CSSLP, GISCP, or other advanced security certifications
Experience integrating security technologies in enterprise environments
#Cybersecurity #AWS #DevOps #Python #SDLC #IaC #SAST #DAST #CISSP #CCSP
Security Analyst - 100% onsite
Cyber security analyst job in Arlington, TX
3 month contract to hire
Rate: $55-60/hr
Salary: $100-120k/yr
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
· Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
· Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
· DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
· Active Directory Sites and Services
o Management of sites and subnets
· Active Directory Domains and Trusts
o Management of domain trust configuration
· Group Policy Management
o Troubleshooting and cleanup of GPOs
· Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
· Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
· Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
· Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
· Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
· Ability to participate in a weekly call rotation
· IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
operational
· On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
· Mentoring and Training
o .Responsible for the mentoring of Security Administrators
· Ability to travel overnight
Qualifications
Education and/or Experience
· High school diploma or general education degree (GED)
· One to four years' experience in an IT related field
· Knowledge of IT Security Operations and Forensic Operations
· Experience with computer networks
· Experience with project management and delegation
· Business communication and collaboration skills
· Documentation skills
· Ability to work well within a team, and work alone to accomplish tasks independently
· Ability to interpret research into solutions to actual problems
· Customer Service skills
· Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
· Proficiency with MS Office and email
Red Team Cyber Security Engineer
Cyber security analyst job in Dallas, TX
One of our key clients within the financial industry is looking for a Red Team Cyber Security Engineer for a full-time position.
This position will be 2 days on-site in Chicago or Dallas and 3 days remote. Please note, only US citizens or Green-card holders are eligible for this position.
Job Description:
Perform cloud assessments, web application penetration testing and mobile application testing
Carry out reviews of security, network, applications, and cloud environments
Plan/Design security activities with automation as the primary driver to align with the security strategy
Ensure alignment of security controls, supporting services and related policies with regulations and industry-standard best practices
Assist management with the improvement of policy/procedure to support Cloud Security Engineering
Participate in developing a security roadmap, adopt security best practices, and implement new ideas and innovations according to the industry trends
Experience required:
Penetration Testing experience within Network, Application, Web Application or Mobile Applications
Experience cloud environments (AWS, Azure, IaaS/PaaS/SaaS).
Good applicable knowledge of policy and procedure development, systems analysis, Information Assurance (IA) policy, vulnerability management, and risk management
Good understanding of regulatory standards including CSF, NIST, PCI, SSAE 16, SAS 70, HIPPA, FIPS 199, COBIT 5 and others as needed.
Strong experience with custom scripting (python, PowerShell, bash, etc.) and process automation.
Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nmap, Qualys etc.
Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.
Experience with using ServiceNow is a plus.
We look forward to receiving your application!
Application Security Analyst
Cyber security analyst job in Plano, TX
Bachelor's degree in Computer Science, Cybersecurity, or related field.
3+ years of experience in DevOps, Security Engineering, or related roles. 2-3 years of security experience. Overall, 6 years
Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
Development knowledge on Java, Python, .Net, etc
Experience with security tools (e.g., Veracode, GHAS, Orca).
Proficiency in scripting languages (e.g., Python, Bash).
Familiarity with containerization and orchestration (Docker, Kubernetes).
Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Understanding of secure coding practices and application security principles.
Knowledge of Infrastructure as Code (Terraform, Ansible).
Cyber Security Engineer
Cyber security analyst job in Dallas, TX
• DevSecOps' expertise in building and supporting security solutions for Windows, Linux, above mentioned platforms, including services such as Enterprise Vulnerability Management, data protection, privacy and compliance, network protection.
• Building and deploying security solutions using technologies such as Docker, Kubernetes, and GIT Hub.
• Experience in low code environments such as Appian and Microsoft Power Platforms is mandatory.
• Experience with Alteryx ETL and Workflow Designer platform is plus.
• Experience with Identity and Access, Endpoint, Vulnerability management and other cybersecurity automation workflows.
• Experience writing Automation scripts in Python and deploying them leveraging APIs.
• Experience with AI enabled automation workflows.
• Experience with Agile methodology and Atlassian tools including JIRA and Confluence.
• Communicating with various audiences, including business leaders, engineers, clients, and team members, with excellent ability to convey information that is relevant
to the audience.
• Written communication for excellent documentation and reporting.
• Outstanding teamwork across multidiscipline plan-build-run teams.
• Applying your understanding and expertise with systems automation platforms and technologies.
• Automating security controls, data, and processes to provide metrics and operational support.
• Employing cloud-based APIs when suitable to integrate and orchestrate across various systems in the automation workflow.
• Developing and delivering solutions using Agile methodology.
“Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
Application Security Analyst
Cyber security analyst job in Plano, TX
Client is looking for:
Client is seeking a skilled and proactive Application Security Analyst to integrate security practices into client's DevOps processes.
The ideal candidate will work closely with development and operations team to ensure secure software delivery pipelines, automate security controls, and foster a culture of shift left in the organization.
Candidate will be doing:
Design, implement, and maintain secure CI/CD pipelines.
Integrate security tools (SAST, DAST, SCA, etc.) into development workflows.
Collaborate with development and operations teams to remediate vulnerabilities.
Automate security testing and compliance checks.
Monitor and respond to security incidents in cloud and container environments.
Develop and enforce security policies, standards, and procedures.
Stay current with emerging security threats and DevSecOps best practices.
Requirements:
Qualifications/ What candidate bring (Must Haves) - Highlight Top 3 to 5 skills:
Bachelor's degree in Computer Science, Cybersecurity, or related field.
3 plus years of experience in DevOps, Security Engineering, or related roles.
2 to 3 years of security experience. Overall, 6 years
Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
Development knowledge on Java, Python, .Net, etc
Experience with security tools (e.g., Veracode, GHAS, Orca).
Proficiency in scripting languages (e.g., Python, Bash).
Familiarity with containerization and orchestration (Docker, Kubernetes).
Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Understanding of secure coding practices and application security principles.
Knowledge of Infrastructure as Code (Terraform, Ansible).
IT Network / Security Analyst
Cyber security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Information Security Engineer
Cyber security analyst job in Dallas, TX
Job Title: Information Security Engineer
Hybrid: 3 days Onsite & 2 days REMOTE
Duration: 6 Months (CONTRACT TO HIRE)
Description:
Junior to mid-level Information Security Engineer
Hands-on role with responsibility for building and managing security detections
Responsibilities, Skills & Experience Needed:
Strong background in cloud infrastructure (Azure preferred)
Experience with Azure Sentinel for monitoring and detection
Ability to build detection use cases and monitor system performance
Familiarity with databases to ensure log integrity and reliability
Experience with Infrastructure as Code (IaC), preferably Terraform
Python programming experience strongly preferred
Knowledge of blockchain technologies is a plus
Cloud security
Seeking a skilled Information Security Engineer to design, implement, and maintain robust security systems that protect our organization's systems.
This role involves assessing vulnerabilities, managing threat detection tools, and ensuring compliance with industry standards and regulations.
The ideal candidate will have experience with firewalls, intrusion detection systems, SIEM platforms, and cloud security frameworks.
You'll collaborate with IT and development teams to integrate security best practices into infrastructure and application design, respond to incidents, and continuously improve our security posture.
Desired Skills and Experience
Azure cloud infrastructure, Azure Sentinel, Terraform, Python, Cloud security, SIEM
Dexian is a leading provider of staffing, IT, and workforce solutions with over 12,000 employees and 70 locations worldwide. As one of the largest IT staffing companies and the 2nd largest minority-owned staffing company in the U.S., Dexian was formed in 2023 through the merger of DISYS and Signature Consultants. Combining the best elements of its core companies, Dexian's platform connects talent, technology, and organizations to produce game-changing results that help everyone achieve their ambitions and goals.
Dexian's brands include Dexian DISYS, Dexian Signature Consultants, Dexian Government Solutions, Dexian Talent Development and Dexian IT Solutions. Visit ******************* to learn more.
Dexian is an Equal Opportunity Employer that recruits and hires qualified candidates without regard to race, religion, sex, sexual orientation, gender identity, age, national origin, ancestry, citizenship, disability, or veteran status.
Senior Information Security Analyst
Cyber security analyst job in Plano, TX
The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective.
Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives.
Translate complex information and documentation into clear and simple concepts for end-users.
Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture.
Stay informed about the latest cybersecurity threats, trends, and best practices.
Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmark policies against industry standards and best practices.
Develop and implement governance frameworks for cybersecurity policy management.
Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls.
Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Lead and support internal and external audits and assessments of cybersecurity policies and practices.
Ensure identified audit and assessment findings and actions are tracked to closure.
Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities.
Communicate policy requirements and updates to relevant stakeholders.
Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans.
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred).
Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency with data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA (highly desirable).
Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Understanding of risk management concepts, control frameworks, and compliance auditing.
Ability to provide consultation and recommendations to management.
Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
Security Engineer-ONLY W2(No C2C)
Cyber security analyst job in Plano, TX
We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities.
Key Responsibilities
Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool.
Deploy and configure Flex ID to enable passwordless, frictionless identity experiences.
Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications.
Ensure robust identity and access management (IAM) implementations using industry best practices.
Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows.
Monitor, troubleshoot, and optimize identity workflows for performance and security.
Document technical solutions and provide knowledge transfer to internal teams.
Required Qualifications
✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform.
✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification.
✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration.
✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively.
✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc.
✅ Strong communication and documentation skills.
Preferred Qualifications
Experience integrating identity services with CI/CD pipelines or DevOps environments.
Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA).
Background in cybersecurity, software engineering, or cloud architecture.
Artificial intelligence Security Engineer
Cyber security analyst job in Dallas, TX
World Wide Technology is looking for a Associate AI/Cybersecurity Engineer. This role is part of WWT's Strategic Resourcing services and is a contract role. The candidate will be supporting a WWT customer and will be employed by one of WWT's preferred partners. The partner will provide full compensation and benefit information prior to employment with the partner.
Why WWT?
At World Wide Technology, we work together to make a new world happen. Our important work benefits our clients and partners as much as it does our people and communities across the globe. WWT is dedicated to achieving its mission of creating a profitable growth company that is also a Great Place to Work for All. We achieve this through our world-class culture, generous benefits, and by delivering cutting-edge technology solutions for our clients.
WWT was founded in 1990 in St. Louis, Missouri. We employ more than 10,000 people globally and close nearly $20 billion in revenue in 2023. We have an inclusive culture and believe our core values are the key to company and employee success. WWT is proud to have been included on the FORTUNE "100 Best Places to Work For " list 12 years in a row!
Job Title: Associate AI/Cybersecurity Engineer
Job Location: Dallas, Texas OR Plano, TX OR Middletown, NJ
Job Mode: Hybrid
Employment Type: Contract
Duration: 12 months
Rate/Salary: A reasonable estimate of the current pay range for this position is $100.00 to $105.00 hourly on W2 . Actual pay will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs, and will be set by your employer. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in base pay.
:
World Wide Technology (WWT) is seeking a Associate AI/Cybersecurity Engineer for a 12 months contract position based in USA , as part of our Strategic Resourcing Services and staff augmentation efforts.
In this role, the selected consultant will work directly with a WWT client, supporting their internal team and business objectives. While WWT facilitates the position, the consultant will be employed by one of WWT's preferred partner organizations, which will provide complete details regarding compensation and benefits before employment.
Job Description
Key Responsibilities
The Associate AI/Cyber Engineer will assist in the development, implementation, and optimization of advanced AI and machine learning algorithms to detect and mitigate cyber threats.
This role is focused on hands-on technical engineering, involving deep research into AI security models and working closely with other teams to integrate AI solutions into cybersecurity architectures.
Key Responsibilities:
Design, develop, and optimize AI-driven security solutions to identify, predict, and prevent cyber threats.
Implement machine learning models, neural networks, and other AI techniques to enhance threat detection capabilities.
Collaborate with data scientists, security engineers, and other stakeholders to integrate AI technologies into the existing cybersecurity infrastructure.
Analyze data from security incidents to continuously improve AI models and methodologies.
Stay current on industry trends and advancements in both AI and cybersecurity.
Requirements:
Strong knowledge and experience with AI Agents, multi-agent workflows, tool-using agents, and orchestrations frameworks.
Strong understanding of MCP authentication, sandboxing, plugin lifecycle, and secure tool invocation patterns.
Experience implementing guardrails, red-team testing, and automated security scanning for AI pipelines.
Ability to detect, prevent, and remediate AI threats/vulnerabilities such as prompt injection, data poisoning, output manipulations, and other AI specific threats.
Bachelors in Computer Science or equivalent experience.
Specific knowledge and passion for AI and Cybersecurity. AI specific training and certifications are highly preferred.
If you have any questions or concerns about this posting, please email ****************** within five days of the posting's publication.
Equal Opportunity Employer Minorities/Women/Veterans/Differently Abled
Security Engineer, Corporate Security
Cyber security analyst job in Dallas, TX
About the Role
Eden Prescott is partnering with one of our top AI security clients, a fast-growing company that's seen significant momentum over the past year, to help them hire a Security Engineer focused on Corporate security.
This is a hands-on opportunity to build and scale the foundational systems that protect an AI-driven infrastructure from evolving threats. You'll work closely with engineering, IT, and compliance teams to ensure deep visibility across environments, strengthen detection capabilities, and automate key workflows that keep the company secure as it scales.
What You'll Do
Partner with engineering and infrastructure teams to design and build pipelines for collecting and correlating security telemetry.
Develop and maintain scalable, high-performance monitoring and detection infrastructure.
Create detection strategies to identify anomalous or malicious activity and ensure critical systems remain protected.
Triage, investigate, and resolve security alerts and incidents, driving them to closure with minimal business impact.
Collaborate with engineering to eliminate recurring issues and continuously refine detection rules.
Stay ahead of emerging threats and continuously evolve detection and response capabilities.
Contribute to the strategy, risk management, and automation roadmap for security operations.
Work with compliance and audit teams to maintain certifications and ensure alignment with security frameworks.
Implement pragmatic, business-driven controls across multi-cloud environments.
What You'll Bring
5+ years of experience in security engineering
Must have EDR, Identity (MFA, PAM, phishing-resistant authentication methods), Azure governance (policies), and CWPP/CSPM.
Strong track record building and scaling SOC operations in cloud-native environments.
Hands-on experience with SIEM/SOAR tools (e.g., Splunk, Microsoft Sentinel, Trellix) and telemetry instrumentation.
Familiarity with CNAPP solutions (e.g., Wiz, Orca, Defender, Singularity) across multi-cloud ecosystems.
Fluency in scripting languages such as Python, PowerShell, or JavaScript.
Automation experience with Azure Functions, Logic Apps, AWS Lambda, or Runbooks.
Expertise in IAM analysis, anomaly detection, and real-time threat response across cloud environments.
Strong communication, decision-making, and collaboration skills in a distributed team setting.
Ability to prioritize and execute in a dynamic, high-growth environment.
Bonus: familiarity with DevOps practices and experience in AWS, GCP, or Azure deployments.
Cloud Security Engineer - SRE
Cyber security analyst job in Frisco, TX
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Cloud Security Engineer
Cyber security analyst job in Dallas, TX
An exciting opportunity for an experienced Cloud Security Engineer to join a global SaaS company, in a hyper growth stage. This is a crucial customer-facing role where you will be instrumental in designing, implementing, and securing complex cloud environments for clients across Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Services (AWS).
Key Responsibilities:
Cloud Security Operations
Perform penetration testing activities
Network Security Expertise
Firewall & WAF Management
SaaS Security Best Practice
SIEM Integration & Optimization
Customer Engagement & Presentation
Requirements:
8+ years of cybersecurity experience
4+ years cloud security engineering
Strong expertise with Google Cloud Platform (GCP)
Strong practical experience with Microsoft Azure and AWS
Expertise in SaaS applications
Demonstrable experience with firewall management and WAFs
Hands-on experience with SIEM platforms
CISSP Certified
information security systems engineers
Cyber security analyst job in Rockwall, TX
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
L3Harris Engineering & Security Hiring Event - Richardson, Texas
Must have a minimum of 3 years relevant experience and be eligible to obtain a DOD Secret Security Clearance, which requires US Citizenship. Please note, this event is not for recent or new college graduates.
Date: Tuesday, December 9th
Time: 2:00 - 5:30pm
Location: DoubleTree Hotel - 1981 N Central Expy, Richardson, TX 75080
We will be interviewing and hiring for the following positions in the Greenville, Plano, and Rockwall areas:
Systems Engineers
Software Engineers
Structural Engineers
Aerospace Engineers
Electrical Engineers
Mechanical Engineers
Project Engineers
Integration & Test Engineers
Information Security Systems Engineers
Specialty Engineering (Technical Writers, Product Trainers, System Safety Engineers, and Configuration/Data Management)
Security (Cyber Intelligence, Security Systems, Security Officers, Personnel Security Specialist (PERSEC), CSSO, Industrial Security)
Click 'APPLY NOW' to register for this event.
L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.
Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.
By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
Chief Information Security Officer
Cyber security analyst job in Dallas, TX
The CISO will lead the development and execution of a comprehensive information and cybersecurity strategy aligned with WFSDallas' mission. This role will oversee the protection of digital and physical assets, data of job-seekers, employers and partners, and ensure secure, reliable operations across all service channels. The CISO will be a strategic advisor to senior leadership and the board, while managing day-to-day security operations, risk management, compliance and business continuity.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
This is intended to identify the essential functions of a position and should not be interpreted as all-inclusive. The employee may be required to perform or assume additional job-related responsibilities other than those stated in this . Typical duties include:
• Develop and implement enterprise-wide information cybersecurity strategy and governance framework including policies, procedures, and training to ensure compliance and security awareness organization-wide adhering to the National Institute of Standards and Technology (NIST) 800.53 Version 5 and Texas Cybersecurity Framework (TCF).
• Lead risk assessment, regulatory compliance (federal/state grants, data privacy, workforce system regulations) and vendor/partner security oversight.
• Oversee security operations: threat intelligence, vulnerability management, incident response, identity & access management, cloud/endpoint security.
• Build and lead the information security team; cultivate a security-aware culture across workforce centers, staff and partner organizations.
• Collaborate with IT, operations, legal, HR, training and executive leadership to embed security into all programs and services.
• Evaluate and implement emerging security technologies and approaches to support digital transformation.
Develops and implements agency policies for encryption of data transmissions and the erection of firewalls to conceal information as it is being transmitted and to eliminate tainted digital transfers. Serve as liaison to the Board of Directors and external stakeholders regarding security posture, incidents and audits.
• Oversees cybersecurity budgets, contracts, and resource planning to ensure efficient and effective allocation of security resources.
• Regularly reports cybersecurity posture, risk assessments, and incident outcomes to executive leadership and the Board.
• Leads, mentors, and develops information technology and cybersecurity staff to build organizational capability and succession strength.
RISK MANAGEMENT & COMPLIANCE
• Identify, assess and manage information security risks across all WFSDallas' operations-digital systems, workforce centers, training portals, partner systems.
• Ensure compliance with relevant laws, regulations and standards (including federal workforce grant requirements, data privacy, state/county regulations).
• Monitors changes in state and federal legislation and advises leadership on potential impacts to agency cybersecurity posture.
• Lead internal and external security audits, assessments and remedial actions.
• Monitor and evaluate third-party vendor security and partner integrations.
SECURITY OPERATIONS
• Lead the architecture, deployment and operation of security infrastructure: network security, endpoint security, cloud security, identity & access management.
• Oversee vulnerability management, threat intelligence, detection and response capabilities.
• Develop and maintain incident response plan, coordinate response to security events, and lead investigations.
• Collaborate with IT teams supporting WFSDallas' centers, online portals, job-seeker data systems, and employer portals.
Develops performance metrics to measure effectiveness of cybersecurity controls and drives continuous improvement across all security domains.
BUSINESS CONTINUITY & DATA PROTECTION
• Develop and maintain disaster recovery and business continuity plans for mission-critical systems (career services platform, job-matching system, training portals, partner integrations).
• Protect sensitive data (jobseeker information, employer information, partner data) with appropriate encryption, access controls, retention policies.
• Lead the development of a data classification and handling program aligned to the organization's operations.
SUPERVISORY RESPONSIBILITIES:
This position is responsible to the President. Work is performed under general guidance and supervision and according to Workforce Solutions procedures and policies.
MINIMUM QUALIFICATIONS:
• Bachelor's degree in Computer Science, Information Security, Cybersecurity or similar (Master's preferred) or equivalent combination of education and relevant work experience
• At least 10 years of progressive experience in information security/IT risk management; 5+ years in a senior leadership role.
• Experience in a multi-site, multi-channel service delivery environment (preferred: public sector, non-profit, workforce systems).
• Strong working knowledge of security frameworks (e.g., NIST CSF, ISO 27001, COBIT).
• Proven ability to lead incident response and manage regulatory/compliance demands.
PREFERRED QUALIFICATIONS:
• Certifications such as CISSP, CISM, CISA.
• Experience with managing third-party/vendor risk, cloud security, identity & access management in hybrid environments.
• Excellent communication skills-capable of translating technical issues for executive/board audiences.
• Demonstrated ability to align security initiatives with organizational mission and business objectives.
LANGUAGE SKILLS:
Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals; ability to write routine reports and correspondence; and to effectively communicate with diverse audiences (colleagues, vendors, supplier, landlords, general public).
REASONING ABILITY:
Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
OTHER SKILLS and ABILITIES:
Knowledge of general office administration; office protocol; regulations for acquisition and inventory control; use and maintenance of computer systems; organization and accurate record-keeping. Type 50-60 words per minute accurately; compose complex correspondence and documentation; operate a variety of office equipment; train others; interact with visitors, Board of Directors, and subcontractors in a professional manner.
TRAVEL
Due to nature of job, travel will be required approximately 30-40% of work time. Must possess own method of transportation.
PHYSICAL DEMANDS:
The physical demands described here are representative of those which must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee is frequently required to stand; walk; and stoop, kneel, crouch, or crawl. The employee must regularly lift and/or move up to 10 pounds, frequently lift and/or move up to 25 pounds, and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, and ability to adjust focus.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts, fumes or airborne particles, and outside weather conditions. The noise level in the work environment is usually moderate.
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may be modified any time with or without notice or due to funding changes.
Workforce Solutions Greater Dallas is an EEO/AA/Drug Free Workplace Employer and complies fully with the Americans with Disabilities Act (ADA). Auxiliary aids and services are available upon request to individuals with disabilities. This position is grant funded.
Chief Information and Security Officer
Cyber security analyst job in Dallas, TX
Chief Information Security Officer
Chief Information Security Officer
The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position.
Required Knowledge, Skills, and Abilities
Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies.
Must also demonstrate strong written communication skills.
Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.
Must possess strong problem-solving skills to effectively influence decision-making in key negotiations.
Ability to perform hands-on, operational work when necessary.
Ability to maintain the security or integrity of the critical infrastructure of the institution.
Qualifications
Minimum Qualifications
Bachelor's degree and additional education in Information Security.
Prior managerial experience in Information Technology and service context.
Professional IT security management certification (e.g., CISSP, CISM).
10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability.
Experience running a security program in a complex environment.
Strong understanding of security protocols and operations.
Knowledge of current IT risks and experience implementing security solutions.
Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP.
EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization.
Bilingual or multilingual preferred.
***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.***
Key Responsibilities
IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction.
IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats.
Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework).
Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response.
Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts.
Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies.
Training: Develop and implement security training for faculty and staff.
Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches.
Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations.
Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience.
Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response.
Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies.
Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention.
Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year.
The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance.
Physical Requirements
Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
Network Security - Cisco ASA Checkpoint
Cyber security analyst job in Plano, TX
Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint
Type: Contract
We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments.
Primary Technical Skills
SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat.
Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection.
Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies.
Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules.
Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback.
Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis.
High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments.
Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing.
Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows.
User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance.
Secondary Technical Skills
SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution.
Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP.
Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks.
SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel.
Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement.
DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection.
Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies.
Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning.
Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls.
Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation.
Required Experience
8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations.
Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement.
Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation.
Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking.
Experience in incident response, forensics, and policy rollback in production SSE environments.
Preferred Qualifications
Experience with hybrid cloud security models and multi-cloud segmentation strategies.
Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs).
Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS.
Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning.
Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration.
Nice to Have
Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA)
AWS/Azure Security Specialty
CISSP or CCSP
Network Security Audit
Cyber security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyIT Network / Security Analyst
Cyber security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-Apply