Information Technology Analyst
Information Security Analyst job 171 miles from Abilene
Spectrum Staffing Group is actively recruiting an IT Business Analyst for a company in downtown Dallas. This job is instrumental in human capital management and configuring the system for efficiency and compliance. The ideal candidate will have an HR background with an IT mind and requires outstanding written and spoken communication skills.
This role is 100% onsite in downtown Dallas. Local candidates only.
Job Overview
Seeking an experienced HR technology professional to manage, optimize, and support Human Resources Information Systems (HRIS) and Applicant Tracking Systems (ATS). This role focuses on improving system functionality, ensuring data integrity, supporting end users, and partnering with cross-functional teams to drive process improvements and automation.
Key Responsibilities
Administer and optimize HRIS and ATS platforms (e.g., iCIMS, UKG, Workday)
Manage system updates, patches, upgrades, and integrations
Document system configurations, procedures, and user training materials
Analyze and streamline HR and recruiting processes through automation
Collaborate with stakeholders to gather requirements and implement solutions
Provide technical support and resolve system issues
Build and maintain custom reports and dashboards
Oversee user access, system security, and compliance protocols
Coordinate with vendors for support and issue resolution
Partner with IT to ensure smooth data flow between systems
Monitor performance and maintain data integrity
Deliver training and support to end users
Qualifications
Bachelor's degree or equivalent experience in IT, HR, or related field
5+ years of experience with HRIS/ATS platforms (e.g., iCIMS, UKG, Workday)
Strong understanding of HR systems, processes, and best practices
Skilled in configuration, testing, deployment, and system integration
Proficient in reporting, analytics, and data visualization
Familiar with API connectivity and database concepts (SQL preferred)
Strong project management and problem-solving skills
Effective communicator with ability to translate technical concepts
Experience with change management and training delivery
Knowledge of HR compliance and data privacy standards
Relevant certifications (e.g., Workday, UKG, iCIMS) preferred
Spectrum Staffing Group welcomes in-market candidates only for this role. If you're local and a technical match with the matching qualifications, please respond immediately to this post.
Cyber Security Architect
Information Security Analyst job 171 miles from Abilene
Role Title: Cyber Security Architect
Term: Contract
Mandatory Skills: AWS and On-prem Datacenter security design & implementation Splunk ES design & implementation Assessment of FedRAMP & FISMA controls
Role Description Skills:
At least 12+ years of experience in the IT industry with strong technical knowledge on Cyber Security & Cloud security services.
Minimum 5+years of experience in leading any major security domains like Cloud Security Engineering, Security risk management, DevSecOps, IT Compliance, Information Security assessments, Security project management.
Lead and mentor a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement.
Experience in designing and implementing a Secured and highly available, fault-tolerant architectures for cloud-based applications.
Good understanding of security controls related to regulatory requirements, such as NIST, PCI, ISO 27001, HIPAA compliance etc
Strong experience working on enterprise security solutions such as WAF, IPS, DDOS, and SIEM.
Experience working on managing alerts and insights from security solutions like SIEM, SOAR, CSPM, EDR & AppSec toolsets.
Strong experience working on industry leading security toolsets like Splunk ES, Trend Micro, Prisma, SonarQube, Tenable, and Cloud native security services.
Ensure compliance with regulatory standards & internal policies across all IT systems and processes. Experience in performing and/or participating in technical assessments in direct support of compliance efforts such as (FedRAMP, HIPAA, PCI, GxP, SOC2, ISO27001, ISO27002)
Conduct comprehensive security assessments and actively manage the vulnerability lifecycle.
Monitor and analyze the organization's security posture and report on threats, breaches, and security weaknesses.
Coordinate with cross-functional teams to resolve security issues and enhance the overall security infrastructure.
Experience in developing and reviewing system security plans, information security policies and procedures, contingency plans, incident response plans, etc.
Update & maintain security policies, procedures, and guidelines in accordance with regulatory requirements. • Ability to drive incident response process, including investigation and reporting of security incidents.
Experience creating security reports for senior management and executives.
Architecture certification (Google, Amazon, Azure) from a major cloud platform.
Stay current with emerging security trends, threats, and technologies.
Must be CISSP certified.
Information Security Analyst III
Information Security Analyst job 219 miles from Abilene
It's about taking care of people, our people.
Are you known for your ability to think outside the box? Are you never satisfied with good enough? Does solving complex problems and ensuring top-quality standards excite you? If so, being an Information Security Analyst III with Frost could be for you.
At Frost, it's about more than a job. It's about having a flourishing career where you can thrive, both in and out of work. At Frost, we're committed to fostering an environment that reflects our values and encourages team members to be the best they can be. In joining our adaptable, integrity-driven team, you'll become part of Frost's over 150-year legacy of providing unparalleled banking services.
Who you are:
As an Information Security Analyst III,
you
are our security champion. In this role, you'll keep Frost data and IT Systems secure by analyzing and responding to IT security alerts. You will coordinate applications and enterprise vulnerability and penetration tests. You will also be responsible for performing and monitoring security processes across the organization. You believe in servant leadership and will provide technical expertise to the IT Security team.
What you'll do:
Investigate and respond to significant cyber security alerts on a rotational 24/7 coverage schedule. Serve as the incident escalation point for other IT Security Analysts and lead incident response efforts
Effectively communicate while leading incident response efforts, engaging executive and board-level leadership with clear, concise, and strategic updates
Demonstrate effective presentation skills by clearly articulating security risks, incident impacts, and mitigation strategies to both technical and non-technical stakeholders, ensuring alignment with business objectives
Analyze security alerts and process outputs including specified logging, intrusion detection, and malware detection reports. Distribute directives and threat advisories to the affected stakeholders
Manage, maintain, and continuously enhance security platforms and solutions to improve effectiveness, resilience, and alignment with evolving threats and business needs
Perform and document security processes including compliance monitoring, vulnerability detection, alert investigation, and threat intelligence analysis
Coordinate and perform application and enterprise vulnerability and penetration testing, analyze the results, and initiate remediation processes
Lead, coordinate, and execute threat hunting activities and tabletop exercises, providing strategic insights and guidance to enhance the organization's threat detection, response capabilities, and overall security maturity
Design, configure, test, implement, maintain, and document detection, prevention, and response processes in alignment with regulatory and compliance requirements
Maintain a current and high level of knowledge of cyber security threats and vulnerabilities, industry and regulatory standards, and market innovations
Evaluate new security technologies to identify potential business value
Represent the IT Security department on interdepartmental projects and collaborative efforts
Always take action using Integrity, Caring, and Excellence to achieve all-win outcomes
What you'll need:
Bachelor's degree in IT Security, in a related field, or equivalent experience
5+ years of experience in IT Operations or Information Security
Technical expertise in two or more of the following: IDS/IPS, web proxy, SEIM, forensics, automation technologies, vulnerability scanning, configuration monitoring, and/or endpoint detection response
CISSP or the ability to attain within 6 months
Excellent written and verbal communication skills
Proficient in Microsoft computer applications
Additional Preferred Skills:
A+ certification, Security+ certification, or GSEC certification
Our Benefits:
At Frost, we care about your health, your family, and your future and strive to have our benefits reflect that. This includes:
Medical, dental, vision, long-term disability, and life insurance
401(k) matching
Generous holiday and paid time off schedule
Tuition reimbursement
Extensive health and wellness programs, including our Employee Assistance Program
Referral bonus program + more!
Since 1868, Frost has dedicated their expertise to provide exceptional banking, investment, and insurance services to businesses and individuals throughout Texas. Frost is one of the 50 largest U.S. banks by asset size and is a leader in banking customer satisfaction. At Frost, it's about being part of something bigger. If this sounds like you, we encourage you to apply and see what's possible at Frost.
Information Security Analyst - IAM
Information Security Analyst job 171 miles from Abilene
Eikon Consulting Group specializes in Information Technology Consulting and Training Services. The company was founded on the belief that great companies want great talent from industry leading partners utilizing cutting edge technology to save time and money in the hiring process. Eikon Consulting Group provides this service with a unique approach. After the candidates are fully screened and qualified, a Techie-Talk profile is created. Techie-Talk is Eikon's exclusive audio recording capability to give our clients a "Virtual" experience in the interview / hiring process. Techie-Talk is 100% customized to our client's exacting specifications and the audio profile addresses topics that are relevant to the client's project. This allows them to evaluate multiple facets of the candidate, such as communication skills and technical aptitude, long before the interview process begins. See our Services tab for more info on this unique service offering.
Job Description
Bachelor's strongly preferred; consideration given for related technical and/or DoD information security experience as it relates to a degree
· Advanced degree focused on Information Security, Cyber Security, or Information Assurance preferred
· Minimum of five (6) years related IT experience is required, with at least two (2) years focusing on operating and/or implementing Identity and Access Management (IAM) solutions to various use cases such as user provisioning, access governance and identity federation
· DoD 8570 IAM level 1 or higher certification required or must be achieved within one (1) year of hire
· Identity management platform related certifications required or must be achieved within six (6) months of hire
· Experience with implementing IAM solutions with applications using SAML or oAuth required
· Strong analytical and problem solving skills to troubleshoot and resolve IAM issues required
· Strong knowledge and experience of user and access provisioning/deprovisioning workflows
· Serve as a business enabler via development support, clear planning and design documentation for properly-secured, policy-compliant, high-performance IAM integrations
· Experience with cloud and on-premise hybrid architecture preferred
· Experience with Oracle IAM platform and/or multiple IAM product platforms
· Experience integrating multi-factor authentication technologies with IAM solutions preferred
· Demonstrable prior experience leading IAM projects preferred
· Experience with Identity and Access governance and compliance preferred
· CyberArk experience a plus
· Office 365 Identity & Access experience a plus
· Operational Linux/Unix knowledge required
· Knowledge of using Splunk or other SIEM to monitor IAM systems a plus
Qualifications
Information Security, IAM, Oracle IAM.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information Security Analyst job 189 miles from Abilene
Position Responsibilities: - Monitoring and analyzing security event logs - Conduct needed vulnerability scans and internal risk assessments/testing - Provide security training and awareness for employees - Respond to security incidents and data breaches - Identify and investigate potential security incidents and threats - Conduct threat intelligence research and apply it to our security monitoring dashboards - Maintain, automate, and continuously improve security dashboards and alerts - Continuously improving data loss prevention (DLP) techniques, tactics, and procedures
Requirements
* Bachelor's degree in a related field - 5+ years exp in field
Information Security Risk Analyst
Information Security Analyst job 179 miles from Abilene
The Information Security Risk Analyst role is responsible for critical assessment, analysis, and support necessary to maintain the Information and Cyber Security Program.
Conduct comprehensive risk assessments to identify and evaluate potential threats and vulnerabilities to information systems, assets, programs, and practices
Analyze controls for weaknesses in security, business resiliency, data protection, privacy, and compliance frameworks
Leverages quantitative analysis and qualitative narrative to thoroughly document and report all identified risks and gaps to Information Security leadership
Conduct Information and Cyber Security due diligence to support the Third-Party Risk Management program
Support Information Security leadership with facilitation of program management efforts including but not limited to risk register maintenance, issue management, security awareness, vulnerability management, policies, procedures, metrics and reporting
Interface and collaborate with internal stakeholders and external auditors as necessary to support the Information Security Program and other critical business efforts
Perform horizon scanning and stay up to date with regulatory changes, emerging threats, vulnerabilities, security standards and best practices
Participates in and support incident response activities as necessary
Perform other duties as assigned
Required Experience:
Bachelor's degree in cyber security, information technology, business, or finance, or equivalent industry experience. Professional certifications such as ISC2 Certified in Governance Risk & Compliance (CGRC), ISC2 Systems Security Certified Practitioner (SSCP), Comp TIA Security+
2-3 years of Information Security risk management or audit experience. Experience and understanding of regulatory requirements and laws, including but not limited to; GLBA, HIPAA, PCI, GDPR, and TDPSA. Experience with security and control framework including but not limited to; NIST, CIS, CSA, SSAE10 SOC2, and HITRUST
Preferred experience with vulnerability management, security awareness, and GRC systems or platforms. Prior Information/Cyber Security of Information Technology practitioner experience in the financial industry or other highly regulated industry is helpful
Skills:
Exceptional written and verbal communication skills; including ability to translate security and risk to all levels of the business. Strong analytical skills with proven attention to detail. Strong organization and time management skills
Work occasionally requires more than 40 hours per week to perform the essential functions of the position
Lifting in an office setting may be required up to 30lbs.
ANBTX strongly encourages candidates that are fluent in English and Spanish to apply. Jobs that specifically require candidates to be bilingual will be posted as a requirement.
Information Security Analyst
Information Security Analyst job 179 miles from Abilene
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
• Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus
Qualifications
MUST HAVES:
• 2+ years of experience in technical role with notable exposure to security
• Working knowledge of analyzing events from SPLUNK SIEM.
• Ability to work shift work in a 24/7/365 environment.
• Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management
This is a Bulk hiring position for our direct client.
Additional Information
For More Information, Please Contact
Siva Kumar
************
Information Security Analyst
Information Security Analyst job 318 miles from Abilene
Summary The Information Security Analyst I assists safeguarding the bank's sensitive data, systems, and customer information from cyber threats. The Information Security Analyst I will participate in monitoring and responding to security incidents, performing risk assessments, supporting audits and the implementation and management of security policies and controls to ensure compliance with industry regulations. This position requires a proactive problem-solver with an understanding of cybersecurity best practices in a banking environment.
Duties and Responsibilities include the following.
* Security Monitoring & Incident Response: Assist in investigating security incidents, documenting findings, and developing incident response plans to minimize impact and prevent recurrence.
* Risk Assessments: Assist in conducting periodic risk assessments and recommending mitigation strategies to ensure that the bank's information systems are protected against evolving cyber threats.
* Policy & Compliance: Assist in the development and enforcement of security policies, procedures, and controls to meet industry best practices and regulatory requirements (e.g., PCI DSS, GLBA, SOX, FFIEC).
* Threat Intelligence: Stay updated on emerging threats, vulnerabilities, and security trends. Collaborate with other departments to proactively enhance the bank's security posture and strategies.
* Audits: Assist in conducting periodic audits of security controls and response to internal and external audit request as needed. Participate in remediation efforts and track progress as needed.
* Reporting & Documentation: Document security incidents, assessments, and activities. Assist in the creation of regular reports for management on the status of the bank's security posture.
* Security Awareness & Training: Support and participate in security awareness training programs for bank employees to promote safe computing practices and a culture of security awareness.
* Collaboration: Work closely with IT, compliance, and other departments to resolve security issues, implement security controls, and ensure that security measures are embedded into all areas of the bank's operations.
* Other duties and/or projects as assigned.
Supervisory Responsibilities
This job has no supervisory responsibilities.
Competencies - To perform the job successfully, an individual should demonstrate the following competencies:
Analytical and Design - Synthesizes complex or diverse information; Collects and researches data; Gains intuition and experience combined with best practices to advance competencies in data and process evaluation; Follows workflows and procedures; Contributes creative solutions; Demonstrates attention to detail.
Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Works well in group problem solving situations.
Technical Skills - Strives to continuously build knowledge and skills; Shares expertise with others; Solves problems using logic.
Interpersonal Skills/Customer Service - Focuses on resolution to conflict instead of being concerned about the source of the conflict; Maintains confidentiality; Listens to others without interrupting; Responds timely to customer needs; Responds to requests for service and assistance; Meets commitments.
Oral and Written Communication - Speaks clearly and persuasively in positive or negative situations; Listens and gets clarification; Responds well to questions; Writes clearly and informatively; Varies writing style to meet needs; Able to read and interpret written information.
Teamwork - Balances team and individual responsibilities; Exhibits objectivity and openness to others' views; Puts success of team above own interests; Supports everyone's efforts to succeed.
Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness.
Diversity and Ethics - Demonstrates knowledge of EEO policy; Promotes a harassment-free environment; Works with integrity and ethically.
Organizational Support - Follows policies and procedures; Completes administrative tasks correctly and on time; Supports organization's goals and values; Supports affirmative action and respects diversity.
Judgment and Motivation - Displays willingness to make decisions; Exhibits sound and accurate judgment; Supports and explains reasoning for decisions; Includes appropriate people in decision-making process; Makes timely decisions; Demonstrates persistence and overcomes obstacles.
Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently; Develops realistic action plans.
Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Treats others with respect and consideration regardless of their status or position; Accepts responsibility for own actions.
Adaptability, Initiative and Innovation - Adapts to changes in the work environment; Manages competing demands and prioritizes; accordingly, Changes approach or method to best fit the situation; Able to deal with frequent change, delays, or unexpected events; Looks for and takes advantage of opportunities; Asks for and offers help when needed; Meets challenges with resourcefulness; Generates suggestions for improving work.
Attendance/Punctuality and Dependability - Is consistently at work and on time; Follows instructions, responds to management direction; Takes responsibility for own actions; Commits to long hours of work when necessary to reach goals; Completes tasks on time or notifies appropriate person with an alternate plan.
Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Preferred Qualifications
* Technical proficiency in security-related hardware and software; ability to function as a consultant to other IT groups on security matters.
* Knowledge of security controls for servers, workstations, network routers, and firewalls.
* Knowledge of security and internal control frameworks such as: ISO 27001, NIST 800-53, COBIT and COSO.
* Experience with implementation and management of compliance requirements such as PCI and SOX.
* Understanding and familiarity with audit requirements and process.
Education and/or Experience
Bachelor's degree (B. A.) from four-year college or university, preferably in Cybersecurity, Information Technology, Computer Science, or a related field.
* Experience: 1-5 years of experience in information security or related IT role, preferably in a financial services or banking environment
* Certifications (Preferred): CISSP, CISM, CISA, CEH, CompTIA Security+, GSEC, or similar certifications.
Computer Skills
Proficiency in Microsoft Office (Word, Excel, PowerPoint); experience with event monitoring and industry security tools.
Bank Culture/Customer Service Skills
Promotes the Bank's culture, including the support of our Brand promise and Core Values.
Ability and judgment to interact and communicate appropriately with other employees, customers and supervisor. Ability to serve customers, both internal and external, (community/public) in a manner that will reflect superior customer relations and enhance the overall marketing effort of Origin Bank.
Physical Demands While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel and talk or hear. The employee is occasionally required to reach with hands and arms; climb or balance and stoop, kneel, crouch, or crawl. The employee must regularly lift and /or move up to 10 pounds, frequently lift and/or move up to 25 pounds and occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision and ability to adjust focus.
Work Environment The noise level in the work environment is usually moderate.
This reflects management's assignment of essential functions. It does not prescribe or restrict the tasks that may be assigned. Origin Bank shall, in its discretion, modify or adjust the position to meet the Bank's changing needs. This job description is not a contract and may be adjusted as deemed appropriate in the Bank's sole discretion.
Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. Know Your Rights
Remote positions are intended to be filled in states within our footprint, which includes: Alabama, Florida, Louisiana, Mississippi, and Texas. Any exception to this policy requires further regulatory review and approval by management.
Information Security Analyst III
Information Security Analyst job 219 miles from Abilene
It's about taking care of people, our people. Are you known for your ability to think outside the box? Are you never satisfied with good enough? Does solving complex problems and ensuring top-quality standards excite you? If so, being an Information Security Analyst III with Frost could be for you.
At Frost, it's about more than a job. It's about having a flourishing career where you can thrive, both in and out of work. At Frost, we're committed to fostering an environment that reflects our values and encourages team members to be the best they can be. In joining our adaptable, integrity-driven team, you'll become part of Frost's over 150-year legacy of providing unparalleled banking services.
Who you are:
As an Information Security Analyst III, you are our security champion. In this role, you'll keep Frost data and IT Systems secure by analyzing and responding to IT security alerts. You will coordinate applications and enterprise vulnerability and penetration tests. You will also be responsible for performing and monitoring security processes across the organization. You believe in servant leadership and will provide technical expertise to the IT Security team.
What you'll do:
* Investigate and respond to significant cyber security alerts on a rotational 24/7 coverage schedule. Serve as the incident escalation point for other IT Security Analysts and lead incident response efforts
* Effectively communicate while leading incident response efforts, engaging executive and board-level leadership with clear, concise, and strategic updates
* Demonstrate effective presentation skills by clearly articulating security risks, incident impacts, and mitigation strategies to both technical and non-technical stakeholders, ensuring alignment with business objectives
* Analyze security alerts and process outputs including specified logging, intrusion detection, and malware detection reports. Distribute directives and threat advisories to the affected stakeholders
* Manage, maintain, and continuously enhance security platforms and solutions to improve effectiveness, resilience, and alignment with evolving threats and business needs
* Perform and document security processes including compliance monitoring, vulnerability detection, alert investigation, and threat intelligence analysis
* Coordinate and perform application and enterprise vulnerability and penetration testing, analyze the results, and initiate remediation processes
* Lead, coordinate, and execute threat hunting activities and tabletop exercises, providing strategic insights and guidance to enhance the organization's threat detection, response capabilities, and overall security maturity
* Design, configure, test, implement, maintain, and document detection, prevention, and response processes in alignment with regulatory and compliance requirements
* Maintain a current and high level of knowledge of cyber security threats and vulnerabilities, industry and regulatory standards, and market innovations
* Evaluate new security technologies to identify potential business value
* Represent the IT Security department on interdepartmental projects and collaborative efforts
* Always take action using Integrity, Caring, and Excellence to achieve all-win outcomes
What you'll need:
* Bachelor's degree in IT Security, in a related field, or equivalent experience
* 5+ years of experience in IT Operations or Information Security
* Technical expertise in two or more of the following: IDS/IPS, web proxy, SEIM, forensics, automation technologies, vulnerability scanning, configuration monitoring, and/or endpoint detection response
* CISSP or the ability to attain within 6 months
* Excellent written and verbal communication skills
* Proficient in Microsoft computer applications
Additional Preferred Skills:
* A+ certification, Security+ certification, or GSEC certification
Our Benefits:
At Frost, we care about your health, your family, and your future and strive to have our benefits reflect that. This includes:
* Medical, dental, vision, long-term disability, and life insurance
* 401(k) matching
* Generous holiday and paid time off schedule
* Tuition reimbursement
* Extensive health and wellness programs, including our Employee Assistance Program
* Referral bonus program + more!
Since 1868, Frost has dedicated their expertise to provide exceptional banking, investment, and insurance services to businesses and individuals throughout Texas. Frost is one of the 50 largest U.S. banks by asset size and is a leader in banking customer satisfaction. At Frost, it's about being part of something bigger. If this sounds like you, we encourage you to apply and see what's possible at Frost.
Analyst, IT Security
Information Security Analyst job 318 miles from Abilene
Enterprise Products Partners L.P. is one of the largest publicly traded partnerships and a leading North American provider of midstream energy services to producers and consumers of natural gas, NGLs, crude oil, refined products and petrochemicals. Our services include\: natural gas gathering, treating, processing, transportation and storage; NGL transportation, fractionation, storage and import and export terminals; crude oil gathering, transportation, storage and terminals; petrochemical and refined products transportation, storage and terminals; and a marine transportation business that operates primarily on the United States inland and Intracoastal Waterway systems. The partnership's assets include approximately 50,000 miles of pipelines; 260 million barrels of storage capacity for NGLs, crude oil, refined products and petrochemicals; and 14 billion cubic feet of natural gas storage capacity.
Make the most of your talents in a fast-paced environment driven by people who strive for achievement. Enjoy corporate strength, stability, and a rewarding career at a growing industry-leading and diverse operating company with a track record for success. Tap into the professional possibilities of Enterprise Products Company.
The IT Security Analyst will work as part of the IT Security & Compliance team to manage risks to the information assets and systems of the organization by monitoring for, preventing, and responding to cybersecurity threats. They will also work with IT and other departments to implement security controls, promote secure practices, and improve information security processes.
Responsibilities include, but are not limited to:
Security monitoring, triage, and incident identification
Monitor for changes in attack surface and risk related to attack surface
Conducts vulnerability scans and works with IT support to remediate findings
Keep up to date on and research vulnerabilities impacting corporate technologies
Understands the Mitre ATT&CK and D3FEND taxonomies
Perform security incident investigation, response and resolution
Works to improve enterprise-wide security log collection, correlation, and reporting
Works with the Security team to improve and automate processes
Implementing and updating security controls
Adheres to and maintains documentation of processes and procedures
Assist with producing reports to communicate security risk and status to upper management
Stay current on emerging threats and mitigation strategies
Follows threat hunting procedures and incident response procedures
The successful candidate will meet the following qualifications:
College or technical school degree preferred
Security certifications (GIAC, Security+) are preferred
3+ years' experience in a relevant, dedicated information security role
3+ years' experience with network administration, server administration, and/or workstation administration
Active member of one or more security associations (ISSA, ISACA, InfraGard, ISAC/ISAOs, etc.)
The following skills and knowledge are desired:
Vulnerability scanning and remediation
Threat hunting
Log analysis and developing log correlation rules
Endpoint detection and response (EDR)
Intrusion detection
Incident handling
Strong verbal and written communication skills
Good troubleshooting and problem-solving skills
Ability to work in and positively contribute to a team environment
Network Defense and Security Analyst
Information Security Analyst job 219 miles from Abilene
Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI
Employee Type: Regular
Percentage of Travel Required: Up to 10%
Type of Travel: Continental US
* * *
CACI has an exciting and immediate opportunity for a Cybersecurity - Network Defense and Security Analyst to support the USAF Network Operations Security Center (NOSC). This position works on-site at Lackland Air Force Base in San Antonio, Texas. This is a shift work position in a work center providing 24x7x365 support.
Responsibilities
Support real-time monitoring and analysis of IDS/IPS devices and alerts, track trends of authorized and unauthorized activity, and correlate unusual and suspicious network activity across USAFCNET/USCENTCOM networks.
Provide site-specific and service-level intrusion packet level analysis using selected tools and activities related to mission execution.
Perform cyber incident handling and support activities, including but not limited to incident reporting, notification, documentation, and coordination; detection of events; preliminary analysis and identification; preliminary response actions; incident analysis; response and recovery; and post incident analysis IAW applicable policy and directives.
Maintain IDS/IPS devices to ensure they are operating at optimal efficiency, including, but not limited to assisting in the installation, configuration, maintenance, and management of IDS/IPS sensors; assist in the development and documentation of sensor processes and checklists; and provide technical advice and assistance to resolve network issues.
Perform network event correlation and advanced traffic analysis, vulnerability analysis, IDS/IPS sensor maintenance, IDS/IPS database & VPN technical support, network defense training, support Standardization & Evaluation (Stan/Eval) activities, perform operational process tracking and processing; provide systems and exercise planning support, and prepare network defense technical reports.
Provide oral and written briefs, presentations, and professional reports to government senior leaders and decision makers.
Required
DoD Top Secret/SCI Security Clearance
B.S. in related field, and 5 or more years' relevant IT experience; OR 7 or more years' relevant IT experience.
Relevant Experience
Must possess experience and demonstrate an understanding of Microsoft server installation, roles, active directory, storage, performance management, and maintenance.
Minimum Professional Certifications
Certified Ethical Hacker (CEH) certification.
CCNA or CompTIA Network+ CE.
ITIL Foundation within 60 days of start date.
Desired
Extensive knowledge of network firewalls, computer and server log analysis, computer network servers and analysis of their logs; and digital evidence collection, handling, and security.
Extensive knowledge and experience with network packet capture and analysis software such as WireShark (Ethereal) and Snort.
Experience with standard DoD network topology and DMZ boundary protection; DoD/AF incident reporting processes; Familiarity with NSA Threat Operations Center (NTOC) Attack, Sensing & Warning (AS&W) alerts and processing; knowledge and experience processing Information Assurance Vulnerability Alert (IAVA) notices.
What We Can Offer You
We've been named a Best Place to Work by the Washington Post.
Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
We offer competitive benefits and learning and development opportunities.
We are mission-oriented and ever vigilant in aligning our solutions with the nation's highest priorities.
For over 55 years, the principles of CACI's unique, character-based culture have been the driving force behind our success.
______________________________________________________________________________
What You Can Expect
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI takes pride in fostering a diverse and accessible culture where every individual feels supported to chart their own path. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
Learn more about CACI here.
______________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here.
The Proposed Salary Range For This Position Is
$65,000 - $136,500
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
Network Security Analyst
Information Security Analyst job 189 miles from Abilene
Requirement details: Internal job ID:TWK_2002 Network Security Analyst State of TexasAustin, TX 78701 NOTE: Cybersecurity staff are currently primarily working remotely within the Texas state
EXP:10+ years Public Sector (State / Federal / Local Govt.) Client Experience Preferred Local to Texas profiles only.
Preferred Certifications: Certification as a Certified Ethical Hacker (CEH), SANS GIAC Certification, Security+, Certified Cloud Security Professional (CCSP), EC-Council Certified Incident Handler (ECIH), Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), or comparative cybersecurity professional certification.
Job Description:
This position requires the ability to perform moderately complex (journey-level) cybersecurity analysis work, essential for TDLR to fulfill its mission of service to the citizens of Texas. Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
This position also requires analysis of cybersecurity threat indicators and their behaviors, and research and implement new security risk and threat mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches; monitoring agency systems, reporting anomalous activity or malicious traffic, and perform cybersecurity incident detection, analysis, and prevention; assist in administration of security tools; and assisting in conducting vulnerability scans of networks and applications to assess effectiveness and identify weaknesses; assist in identifying and evaluating new cybersecurity technologies to identify and remediate vulnerabilities; and providing input on improving network, server, workstation and application security
SKILLS AND QUALIFICATIONS
Years Required Experience
2 Required Information security analysis work or related IT security work
4 Preferred Graduation from an accredited four-year college or university with major coursework in information technology security, information assurance, computer information systems, computer science, management information systems, or a related field is generally
2 Preferred with a cybersecurity architecture and data flow documentation
2 Preferred with a Vulnerability Management programs
2 Preferred doing web application security scans/assessments
2 Preferred with custom dashboards and/or configurations of SIEM tools
2 Preferred With patching Windows based computers, using WSUS, SCCM or other tools/patch management programs
Global Information Security Customer Enablement Manager
Information Security Analyst job 179 miles from Abilene
Who we are Collaborative. Respectful. A place to dream and do. These are just a few words that describe what life is like at Toyota. As one of the world's most admired brands, Toyota is growing and leading the future of mobility through innovative, high-quality solutions designed to enhance lives and delight those we serve. We're looking for talented team members who want to Dream. Do. Grow. with us.
An important part of the Toyota family is Toyota Financial Services (TFS), the finance and insurance brand for Toyota and Lexus in North America. While TFS is a separate business entity, it is an essential part of this world-changing company- delivering on Toyota's vision to move people beyond what's possible. At TFS, you will help create best-in-class customer experience in an innovative, collaborative environment.
Job Title: Global Information Security Customer Enablement Manager
Location: Plano, TX
Excited to grow your career at Toyota?
We value our talented employees, and whenever possible strive to help one of our associates grow professionally before recruiting new talent to our open positions. If you think the open position you see is right for you, we encourage you to apply!
Our people make all the difference in our success.
An important part of the Toyota family is Toyota Financial Services (TFS), the finance and insurance brand for Toyota and Lexus in North America. While TFS is a separate business entity, it is an essential part of this world-changing company - delivering on Toyota's vision to move people beyond what's possible. At TFS, you will help create best-in-class customer experiences in an innovative, collaborative environment.
To save time applying, Toyota does not offer sponsorship of job applicants for employment-based visas or any other work authorization for this position at this time.
Who we are
Collaborative. Respectful. A place to dream and do. These are just a few words that describe what life is like at Toyota. As one of the world's most admired brands, Toyota is growing and leading the future of mobility through innovative, high-quality solutions designed to enhance lives and delight those we serve. We're looking for diverse, talented team members who want to Dream. Do. Grow. with us.
Position Overview: As the Global Information Security Customer Enablement Manager, you will serve as the primary strategic business partner to Toyota Financial global subsidiaries' Leadership and Information Security teams, with responsibility for building a security operations infrastructure that helps to drive effective and efficient security services engagements with clients & supports best-in-class renewal and expansion. You will work directly with our affiliates' Senior Security Leadership Teams, helping to drive go-to-market strategy and ensure key objectives and priorities are met. You will be responsible for critical components including but not limited to, new security service/ renewal planning, client experience processes & infrastructure, new security services/ renewal reporting, services rate reporting, analysis & intelligence, and productivity analyses.
What you'll be doing
* Partner with the global affiliates and information security product teams to drive effective implementation of security services and expansion, including maintaining regular check-ins with Leadership and ICs to understand how results are tracking against plan; providing insights on trends and areas for improvement, establishing operating rhythms and enabling strategic directives
* Establish and evolve key business processes and cross-functional handoffs to drive efficiency and build for future growth like lifecycle processes, QBRs, forecasting, staffing pipeline, churn risk management, client health, client adoption/consumption
* Prepare regular reporting and presentations on business results and security key trends to help the leadership teams understand how they are tracking to their goals, where there is risk, and where there are successes to be replicated
* Manage and become an expert in all Security KPIs tied to Client Success (ARR, bookings, pipeline, conversion rates, net dollar expansion, etc.) and Services (margin, utilization, rate, time to implement, etc.) responsible for driving accountability to outcomes and cross-functional alignment
* Monitor and analyze business performance trends on a consistent cadence
* Provide meaningful, actionable insights, advice, and recommendations on historic and the future performance to leadership
* Drive core components of the operating rhythm, including the Client Experience
* Implement and maintain business processes to increase data integrity and accuracy
* Ensure consistent definitions, calculations and use of critical metrics
* Drive forecasting cadence to enable predictability and accuracy in quarterly and annual target attainment; ensuring Services and leadership teams understand pipeline and expansion potential; measure and coach on accuracy, account risk indicators and productivity trends
* Build peer support and strong inter-company relationships with other key management and partner with them on various projects and initiatives
* Understand and help guide on the security tool stack that supports the global security functions and ensure accurate use via ongoing training
* Drive cross-functional alignment with key partnered organizations like Tax, Finance & Accounting, Legal and Product to enable successful end-to-end execution of key initiatives
What you bring:
* 5-10 years of experience in Client Success, Customer Experience or consulting acceptable with other applicable experience
* Mature understanding of Information Technology/ Information Security Project/ Program delivery translating them into system and process requirements & history of delivering business impact
* Proven experience in contract and vendor management
* Strong technical proficiency in the use of MS Office including Visio, PowerPoint, Excel and Word and experience. using these tools to analyze data, document workpapers, and present results to executive management.
* Strong written and verbal communication skills, and experience as a strategic business partner
* In-depth knowledge of financial management for medium/ large organizations with proven experience in fiscal year financial planning
* Leadership experience, including managing and mentoring a team of cybersecurity professionals.
* Strong ability to influence and build relationships with LOB stakeholders, technology leadership, internal, and external partners.
* Industry certifications such as CISSP, CISM, or CISA are highly desirable.
What we'll bring
During your interview process, our team will provide detailed information about our industry-leading benefits and career development opportunities. Here are a few highlights:
* A work environment built on teamwork, flexibility, and respect.
* Professional growth and development programs to help advance your career, including tuition reimbursement.
* Team Member Vehicle Purchase Discount.
* Toyota Team Member Lease Vehicle Program (if applicable).
* Comprehensive health care and wellness plans for your entire family.
* Toyota 401(k) Savings Plan with a company match, plus an annual retirement contribution from Toyota regardless of your own contributions.
* Paid holidays and paid time off.
* Referral services for prenatal services, adoption, childcare, schools, and more.
* Tax advantaged Accounts (Health Savings Account, Health Care FSA, Dependent Care FSA) .
* Relocation assistance (if applicable).
Belonging at Toyota
Our success begins and ends with our people. We embrace all perspectives and value unique human experiences. Respect for all is our North Star. Toyota is proud to have 10+ different Business Partnering Groups across 100 different North American chapter locations that support team members' efforts to dream, do and grow without questioning that they belong.
Applicants for our positions are considered without regard to race, ethnicity, national origin, sex, sexual orientation, gender identity or expression, age, disability, religion, military or veteran status, or any other characteristics protected by law.
Have a question, need assistance with your application or do you require any special accommodations? Please send an email to *****************************.
Network Security Analyst
Information Security Analyst job 219 miles from Abilene
Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Network Security Operations Analyst
Information Security Analyst job 202 miles from Abilene
HOURS: Typical hours are Monday through Friday, 8:30am-5:30pm, but availability to work nontraditional or weekend hours as needed is required.
PRIMARY RESPONSIBILITIES
Maintain and support infrastructures in a data center and corporate environments.
Assist in management of network equipment, security equipment, and servers.
Troubleshoot network, firewall, and infrastructure issues, assist Support Engineers in troubleshooting issues.
Analyze logs and alerts from security, network, and server devices.
Work with engineers to deploy equipment, including racking, stacking, and cabling.
Scripting and automating processes using scripting languages
Maintain documentation of procedures and inventory of assets.
Identify processes and capabilities that can be streamlined and automated.
Communicate effectively to help bridge stakeholder and development requirements.
Work directly on production-level environments in a fast-paced, results-oriented organization with a rapid time to market.
Perform other duties as needed
Requirements
QUALIFICATIONS
Experience upgrading and troubleshooting desktop and server operating systems
Experience reviewing logs such as firewall logs, traffic logs, or system logs
Experience with scripting languages such as Python and Bash
Familiarity with network concepts such as subnetting, routing, and switching
Familiarity with security processes and procedures
Familiarity with SNMP, SMTP, DNS, NTP, TLS/SSL, RDP, LDAP
STRONGLY PREFERRED
One or more years of experience in managing firewalls, networks, or servers
CompTIA Network+, Security+
Experience with DevOps and Software Risk Evaluation (SRE) methodologies
Experience with network monitoring software such as Splunk, Nagios, or SolarWinds
Demonstrated track record meeting and exceeding SLA requirements.
Benefits
Health, dental, vision, life, and short/long-term disability insurance
Paid vacation, holidays, and sick leave
Competitive compensation and opportunities for advancement
Retirement plan with employer contribution match
Welcoming, family-style corporate culture uniquely suited to fast-paced, entrepreneurial, and motivated individuals
One of San Antonio's “Best Places to Work” for nine consecutive years
Network Security Analyst with CCIE and Juniper (L2 Support)
Information Security Analyst job 305 miles from Abilene
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information Security Analyst job 257 miles from Abilene
Summary The Information Security Analyst I assists safeguarding the bank's sensitive data, systems, and customer information from cyber threats. The Information Security Analyst I will participate in monitoring and responding to security incidents, performing risk assessments, supporting audits and the implementation and management of security policies and controls to ensure compliance with industry regulations. This position requires a proactive problem-solver with an understanding of cybersecurity best practices in a banking environment.
Duties and Responsibilities include the following.
* Security Monitoring & Incident Response: Assist in investigating security incidents, documenting findings, and developing incident response plans to minimize impact and prevent recurrence.
* Risk Assessments: Assist in conducting periodic risk assessments and recommending mitigation strategies to ensure that the bank's information systems are protected against evolving cyber threats.
* Policy & Compliance: Assist in the development and enforcement of security policies, procedures, and controls to meet industry best practices and regulatory requirements (e.g., PCI DSS, GLBA, SOX, FFIEC).
* Threat Intelligence: Stay updated on emerging threats, vulnerabilities, and security trends. Collaborate with other departments to proactively enhance the bank's security posture and strategies.
* Audits: Assist in conducting periodic audits of security controls and response to internal and external audit request as needed. Participate in remediation efforts and track progress as needed.
* Reporting & Documentation: Document security incidents, assessments, and activities. Assist in the creation of regular reports for management on the status of the bank's security posture.
* Security Awareness & Training: Support and participate in security awareness training programs for bank employees to promote safe computing practices and a culture of security awareness.
* Collaboration: Work closely with IT, compliance, and other departments to resolve security issues, implement security controls, and ensure that security measures are embedded into all areas of the bank's operations.
* Other duties and/or projects as assigned.
Supervisory Responsibilities
This job has no supervisory responsibilities.
Competencies - To perform the job successfully, an individual should demonstrate the following competencies:
Analytical and Design - Synthesizes complex or diverse information; Collects and researches data; Gains intuition and experience combined with best practices to advance competencies in data and process evaluation; Follows workflows and procedures; Contributes creative solutions; Demonstrates attention to detail.
Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Works well in group problem solving situations.
Technical Skills - Strives to continuously build knowledge and skills; Shares expertise with others; Solves problems using logic.
Interpersonal Skills/Customer Service - Focuses on resolution to conflict instead of being concerned about the source of the conflict; Maintains confidentiality; Listens to others without interrupting; Responds timely to customer needs; Responds to requests for service and assistance; Meets commitments.
Oral and Written Communication - Speaks clearly and persuasively in positive or negative situations; Listens and gets clarification; Responds well to questions; Writes clearly and informatively; Varies writing style to meet needs; Able to read and interpret written information.
Teamwork - Balances team and individual responsibilities; Exhibits objectivity and openness to others' views; Puts success of team above own interests; Supports everyone's efforts to succeed.
Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness.
Diversity and Ethics - Demonstrates knowledge of EEO policy; Promotes a harassment-free environment; Works with integrity and ethically.
Organizational Support - Follows policies and procedures; Completes administrative tasks correctly and on time; Supports organization's goals and values; Supports affirmative action and respects diversity.
Judgment and Motivation - Displays willingness to make decisions; Exhibits sound and accurate judgment; Supports and explains reasoning for decisions; Includes appropriate people in decision-making process; Makes timely decisions; Demonstrates persistence and overcomes obstacles.
Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently; Develops realistic action plans.
Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Treats others with respect and consideration regardless of their status or position; Accepts responsibility for own actions.
Adaptability, Initiative and Innovation - Adapts to changes in the work environment; Manages competing demands and prioritizes; accordingly, Changes approach or method to best fit the situation; Able to deal with frequent change, delays, or unexpected events; Looks for and takes advantage of opportunities; Asks for and offers help when needed; Meets challenges with resourcefulness; Generates suggestions for improving work.
Attendance/Punctuality and Dependability - Is consistently at work and on time; Follows instructions, responds to management direction; Takes responsibility for own actions; Commits to long hours of work when necessary to reach goals; Completes tasks on time or notifies appropriate person with an alternate plan.
Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Preferred Qualifications
* Technical proficiency in security-related hardware and software; ability to function as a consultant to other IT groups on security matters.
* Knowledge of security controls for servers, workstations, network routers, and firewalls.
* Knowledge of security and internal control frameworks such as: ISO 27001, NIST 800-53, COBIT and COSO.
* Experience with implementation and management of compliance requirements such as PCI and SOX.
* Understanding and familiarity with audit requirements and process.
Education and/or Experience
Bachelor's degree (B. A.) from four-year college or university, preferably in Cybersecurity, Information Technology, Computer Science, or a related field.
* Experience: 1-5 years of experience in information security or related IT role, preferably in a financial services or banking environment
* Certifications (Preferred): CISSP, CISM, CISA, CEH, CompTIA Security+, GSEC, or similar certifications.
Computer Skills
Proficiency in Microsoft Office (Word, Excel, PowerPoint); experience with event monitoring and industry security tools.
Bank Culture/Customer Service Skills
Promotes the Bank's culture, including the support of our Brand promise and Core Values.
Ability and judgment to interact and communicate appropriately with other employees, customers and supervisor. Ability to serve customers, both internal and external, (community/public) in a manner that will reflect superior customer relations and enhance the overall marketing effort of Origin Bank.
Physical Demands While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel and talk or hear. The employee is occasionally required to reach with hands and arms; climb or balance and stoop, kneel, crouch, or crawl. The employee must regularly lift and /or move up to 10 pounds, frequently lift and/or move up to 25 pounds and occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision and ability to adjust focus.
Work Environment The noise level in the work environment is usually moderate.
This reflects management's assignment of essential functions. It does not prescribe or restrict the tasks that may be assigned. Origin Bank shall, in its discretion, modify or adjust the position to meet the Bank's changing needs. This job description is not a contract and may be adjusted as deemed appropriate in the Bank's sole discretion.
Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. Know Your Rights
Remote positions are intended to be filled in states within our footprint, which includes: Alabama, Florida, Louisiana, Mississippi, and Texas. Any exception to this policy requires further regulatory review and approval by management.
Intrusion Analyst 3
Information Security Analyst job in Texas
Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Prime Time Consulting provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government.
Intrusion Analyst 3
We are actively searching for Intrusion Analysts, located in Texas, to support our team. We have varying levels of Intrusion Analyst roles, depending on years of experience and education.
Job Description
Responsible for analyzing target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected and computer network defense resources. Analyze metadata collected for communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from analysis.
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). Develop and implement mitigation strategies. Have a network and/or host-based focus.
The Level 3 Intrusion Analyst shall possess the following capabilities:
Experience with network analysis, network anomaly detection, IOCs, and Miter Attack framework.
Ability to analyze data to discover malicious or unauthorized activity collected from various sources.
Knowledge of agency specific tools and methodologies.
Strong critical thinking and collaboration skills.
Qualifications
Demonstrated experience must be in malware analysis.
Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
CISSP, CEH, SEC+, NET+, GIAC GREM and/or CREA Certification is required OR completion of one or more of the Reverse Engineer/ Intrusion Analyst Courses (SANS FOR610, GCIH, GIAC, GCIA, SANS FOR710, SANS SEC501, SANS SEC504, SANS FOR508, SANS SEC503, NCS-CYBER1000, NCS-CYBER3000, NCS, CYBER2000, NCS- Reverse Engineering Malware, NCS- CYBER1500) plus 2 years of demonstrated experience using reverse engineering tools such as IDA or IDA Pro, x64dgb, 011yDbg, Immunity Debugger, FireEye AX, and/or Ghidra.
Associate's degree plus 10 years of relevant experience or Bachelor's Degree plus 8 years of relevant experience or Master's degree plus 6 years of relevant experience or Doctoral degree plus 4 years of relevant experience
Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
Position requires active Security Clearance with appropriate Polygraph
Company Perks
200 hours of PTO annually
6% 401k Contribution
Competitive Health Care Options
Short Term/Long Term/Life Insurance
Annual Training Budget
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, sex, age, national origin, disability, Veteran status, or any other category protected by federal, state, or local laws.
PI253468869
Network Security Operations Analyst
Information Security Analyst job 202 miles from Abilene
Job Description
HOURS: Typical hours are Monday through Friday, 8:30am-5:30pm, but availability to work nontraditional or weekend hours as needed is required.
PRIMARY RESPONSIBILITIES
Maintain and support infrastructures in a data center and corporate environments.
Assist in management of network equipment, security equipment, and servers.
Troubleshoot network, firewall, and infrastructure issues, assist Support Engineers in troubleshooting issues.
Analyze logs and alerts from security, network, and server devices.
Work with engineers to deploy equipment, including racking, stacking, and cabling.
Scripting and automating processes using scripting languages
Maintain documentation of procedures and inventory of assets.
Identify processes and capabilities that can be streamlined and automated.
Communicate effectively to help bridge stakeholder and development requirements.
Work directly on production-level environments in a fast-paced, results-oriented organization with a rapid time to market.
Perform other duties as needed
Requirements
QUALIFICATIONS
Experience upgrading and troubleshooting desktop and server operating systems
Experience reviewing logs such as firewall logs, traffic logs, or system logs
Experience with scripting languages such as Python and Bash
Familiarity with network concepts such as subnetting, routing, and switching
Familiarity with security processes and procedures
Familiarity with SNMP, SMTP, DNS, NTP, TLS/SSL, RDP, LDAP
STRONGLY PREFERRED
One or more years of experience in managing firewalls, networks, or servers
CompTIA Network+, Security+
Experience with DevOps and Software Risk Evaluation (SRE) methodologies
Experience with network monitoring software such as Splunk, Nagios, or SolarWinds
Demonstrated track record meeting and exceeding SLA requirements.
Benefits
Health, dental, vision, life, and short/long-term disability insurance
Paid vacation, holidays, and sick leave
Competitive compensation and opportunities for advancement
Retirement plan with employer contribution match
Welcoming, family-style corporate culture uniquely suited to fast-paced, entrepreneurial, and motivated individuals
One of San Antonio’s “Best Places to Work” for nine consecutive years
Network Security Analyst with CCIE and Juniper (L2 Support)
Information Security Analyst job 305 miles from Abilene
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.