Security Analyst with Active Directory, SIEM and EDR skills - 100% onsite
Information security analyst job in Arlington, TX
3 month contract to hire
Rate: $55-60/hr
Salary: $100-120k/yr
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
· Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
· Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
· DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
· Active Directory Sites and Services
o Management of sites and subnets
· Active Directory Domains and Trusts
o Management of domain trust configuration
· Group Policy Management
o Troubleshooting and cleanup of GPOs
· Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
· Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
· Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
· Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
· Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
· Ability to participate in a weekly call rotation
· IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
operational
· On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
· Mentoring and Training
o .Responsible for the mentoring of Security Administrators
· Ability to travel overnight
Qualifications
Education and/or Experience
· High school diploma or general education degree (GED)
· One to four years' experience in an IT related field
· Knowledge of IT Security Operations and Forensic Operations
· Experience with computer networks
· Experience with project management and delegation
· Business communication and collaboration skills
· Documentation skills
· Ability to work well within a team, and work alone to accomplish tasks independently
· Ability to interpret research into solutions to actual problems
· Customer Service skills
· Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
· Proficiency with MS Office and email
Information Security Analyst - IAM
Information security analyst job in Dallas, TX
Eikon Consulting Group specializes in Information Technology Consulting and Training Services. The company was founded on the belief that great companies want great talent from industry leading partners utilizing cutting edge technology to save time and money in the hiring process. Eikon Consulting Group provides this service with a unique approach. After the candidates are fully screened and qualified, a Techie-Talk profile is created. Techie-Talk is Eikon's exclusive audio recording capability to give our clients a "Virtual" experience in the interview / hiring process. Techie-Talk is 100% customized to our client's exacting specifications and the audio profile addresses topics that are relevant to the client's project. This allows them to evaluate multiple facets of the candidate, such as communication skills and technical aptitude, long before the interview process begins. See our Services tab for more info on this unique service offering.
Job Description
Bachelor's strongly preferred; consideration given for related technical and/or DoD information security experience as it relates to a degree
· Advanced degree focused on Information Security, Cyber Security, or Information Assurance preferred
· Minimum of five (6) years related IT experience is required, with at least two (2) years focusing on operating and/or implementing Identity and Access Management (IAM) solutions to various use cases such as user provisioning, access governance and identity federation
· DoD 8570 IAM level 1 or higher certification required or must be achieved within one (1) year of hire
· Identity management platform related certifications required or must be achieved within six (6) months of hire
· Experience with implementing IAM solutions with applications using SAML or oAuth required
· Strong analytical and problem solving skills to troubleshoot and resolve IAM issues required
· Strong knowledge and experience of user and access provisioning/deprovisioning workflows
· Serve as a business enabler via development support, clear planning and design documentation for properly-secured, policy-compliant, high-performance IAM integrations
· Experience with cloud and on-premise hybrid architecture preferred
· Experience with Oracle IAM platform and/or multiple IAM product platforms
· Experience integrating multi-factor authentication technologies with IAM solutions preferred
· Demonstrable prior experience leading IAM projects preferred
· Experience with Identity and Access governance and compliance preferred
· CyberArk experience a plus
· Office 365 Identity & Access experience a plus
· Operational Linux/Unix knowledge required
· Knowledge of using Splunk or other SIEM to monitor IAM systems a plus
Qualifications
Information Security, IAM, Oracle IAM.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information security analyst job in Irving, TX
Mid-Senior career position responsible for supporting defense of information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction via support, maintenance and enhancement of our client's Oracle application.
Qualifications
Minimum of three years of hands-on experience implementing or maintaining Oracle EBS & GRC security controls, rules, responsibility design and administration
Oracle EBS security user and role administration duties
CISA, CRISC or CGEIT, or equivalent certification preferred.
Functional knowledge of Oracle EBS and GRC and Oracle Cloud
Strong understanding of current and developing information security administration practices and technologies
Strong knowledge of role-based access management controls and practices
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information security analyst job in Plano, TX
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
• Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus
Qualifications
MUST HAVES:
• 2+ years of experience in technical role with notable exposure to security
• Working knowledge of analyzing events from SPLUNK SIEM.
• Ability to work shift work in a 24/7/365 environment.
• Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management
This is a Bulk hiring position for our direct client.
Additional Information
For More Information, Please Contact
Siva Kumar
************
Information Security Analyst 2
Information security analyst job in San Antonio, TX
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Auto-ApplyNetwork Security - Cisco ASA Checkpoint
Information security analyst job in Plano, TX
Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint
Type: Contract
We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments.
Primary Technical Skills
SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat.
Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection.
Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies.
Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules.
Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback.
Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis.
High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments.
Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing.
Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows.
User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance.
Secondary Technical Skills
SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution.
Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP.
Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks.
SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel.
Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement.
DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection.
Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies.
Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning.
Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls.
Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation.
Required Experience
8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations.
Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement.
Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation.
Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking.
Experience in incident response, forensics, and policy rollback in production SSE environments.
Preferred Qualifications
Experience with hybrid cloud security models and multi-cloud segmentation strategies.
Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs).
Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS.
Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning.
Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration.
Nice to Have
Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA)
AWS/Azure Security Specialty
CISSP or CCSP
Network Security Analyst
Information security analyst job in Austin, TX
Support senior cybersecurity staff in evaluating cybersecurity risks across commercial real estate (CRE) environments. Responsibilities include assisting with network security assessments, reviewing access controls, identifying common misconfigurations, running vulnerability scans, documenting networks/systems, and preparing clear reports. Scope spans both IT and OT (building systems such as BMS/BAS, HVAC, access control, CCTV).
Key Responsibilities
Perform asset discovery and initial scans to identify hosts, services, and firmware versions (e.g., Nmap).
Review firewalls, VPNs, and endpoint security to identify misconfigurations and vulnerabilities
Evaluate switch/router configurations for proper segmentation
Document current-state diagrams and asset inventories
Assess BMS/BAS, IoT, and physical security systems for cyber risk with minimal disruption to operations.
Identify common gaps (weak/default credentials, unpatched systems, outdated TLS, flat networks, exposed management interfaces, insecure vendor remote access).
Support remediation by coordinating with IT teams, vendors, and property managers; verify fixes and retest critical findings.
Prepare and maintain assessment artifacts: asset lists, risk-rated findings, evidence, compliance checklists, and client-ready reports.
Track emerging threats and advisories relevant to smart buildings/IoT and CRE environments; summarize impact for the team.
Qualifications
Associate's or Bachelor's in Cybersecurity/IT (or 2+ years equivalent hands-on experience).
Familiarity with core security technologies: Firewalls (e.g., Fortinet, Palo Alto), IAM/MFA (e.g., Entra ID/Azure AD), and EDR (e.g., SentinelOne).
Intermediate networking: TCP/UDP, routing basics, Layer-3 switches, VPNs (IPsec/SSL), VLANs, ACLs, NAT, DHCP/DNS, Wi-Fi/WPA3.
Working knowledge of Windows client/server; basic Linux familiarity.
Strong documentation and communication skills; ability to translate technical findings into clear business impact.
Nice to Have
Exposure to vulnerability management tooling and concepts.
OT/IoT awareness: BACnet/Modbus basics, safety-first testing on live control networks, maintenance-window/change-control etiquette.
Firewalls and platforms: Palo Alto, Fortinet, Check Point; switch stacks (Cisco Catalyst/Meraki, UniFi).
Identity, privileged access, and remote access hygiene
Endpoint and device management
Scripting/automation
Ticketing and knowledge tools (ServiceNow/Jira/Confluence); diagramming (Visio/draw.io).
Familiarity with frameworks and benchmarks: NIST CSF 2.0, CIS Controls
Travel: Regular on-site visits to local properties (50%) with occasional out-of-area travel (5-10%)
Benefits
Medical, dental, and vision insurance
Life insurance
Long-term disability
Paid vacation
Paid holidays
Simple IRA (401K equivalent) for eligible employees
Stocked snack bar
Company-sponsored outings
Fitness center onsite
Network Security Analyst
Information security analyst job in San Antonio, TX
Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyCyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)
Information security analyst job in San Antonio, TX
Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff. Work Schedule 7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department
Essential Job Functions
* Leads analysis and development of the integration, testing, operations, and maintenance of system security.
* Leads assessments of systems and networks and identifies deviations.
* Maintains access control and collection gaps.
* Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards.
* Prepares and executes system tests to evaluate optimization.
* Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response.
* Executes and manages a Security Awareness Training Program and provides data for reports.
* Leads security "tiger team" in the prosecution of vectors, hackers, and various threats.
* Assist superiors in the production of the Alamo Region Security Operation Center products.
* Performs related duties and fulfills responsibilities as required.
Job Requirements
* Bachelor's degree from an accredited college or university.
* Four (4) years of relevant technical, cyber security, and business work experience.
* CompTIA Security+.
* GIAC: GPEN or GWAPT.
* Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
* Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations.
* Experience leading agile efforts.
* Experience in coaching and mentoring team members.
* Scrum Master, Agile Certifications.
Applicant Information
* Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university.
* Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted.
* Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application.
* If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents. may be attached to the application for consideration in advance.
Knowledge, Skills, and Abilities
* Knowledge of 7 NICE Framework Workforce Categories.
* Knowledge of business operations, systems requirements, and IT processes and technologies.
* Knowledge of information and data analysis and reporting.
* Knowledge of Cyber Security system design, programming principles, processes, and tools.
* Knowledge of strategic planning and change management.
* Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI.
* Skill in interpersonal communications and analytical thinking.
* Skill in technical writing.
* Ability to perform all the essential functions of the position, with or without accommodations.
* Ability to work in an office environment.
Information Security Architect Manager
Information security analyst job in Texas
Company Details
Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible.
Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “
What's Next
” in our industry and beyond.
With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions.
Berkley Technology Services: Right Team, Right Technology, Simple and Secure.
Responsibilities
The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC. This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley Technology Services' technological assets and services.
Spearhead the architectural design, deployment, and management of cutting-edge security solutions, including but not limited to SIEM, EDR, PAM, Data Access Governance, Identity Governance, Cloud Access Security Brokers, and WAFs.
Architect and sustain the security infrastructure, ensuring seamless integration with existing technology ecosystems.
Craft and execute architectural strategies for bolstering vulnerability management, security automation, and the safeguarding of infrastructure.
Guide the formulation and continuous refinement of security policies and procedures, with a spotlight on architectural best practices.
Cultivate an environment of innovation within the team, promoting continual learning and professional advancement.
Function as a principal consultant and subject matter authority on information security architecture, offering pivotal guidance to internal teams and key stakeholders.
Develop and maintain roadmaps for critical security infrastructure components, aligning them with the strategic goals of the organization.
Collaborate with fellow Information Security leaders to forge a unified and robust Information Security Framework and Strategy.
Perform regular technology evaluations, risk assessments, and devise appropriate remediation strategies.
Lead and nurture a team of security architects and engineers in a fast-paced, global setting.
Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary.
Qualifications
Demonstrated expertise in Information Security Architecture, with practical experience in the design and management of a broad spectrum of security technologies.
Exceptional leadership and communication capabilities, adept at guiding global, interdisciplinary teams.
Deep familiarity with contemporary cybersecurity trends and a commitment to remaining at the cutting edge of technology.
Desirable certifications include CISSP, CISM, CEH, or other relevant qualifications.
Proficiency in cloud security architecture and solutions, with experience in AWS, Azure, or Google Cloud platforms.
Expertise in security frameworks such as NIST, ISO 27001, and CIS.
Strong analytical and problem-solving skills, capable of making informed decisions in complex scenarios.
Ability to foster relationships and collaborate effectively with various internal and external stakeholders.
Commitment to ethical conduct and a deep understanding of regulatory compliance requirements relevant to the insurance and financial sectors.
Bachelor's or Master's degree in Computer Science, Information Security, or a related discipline, or equivalent experience.
Behavioral Core Competencies
Flexibility
Customer Service Oriented & Operational Effectiveness
Personal Ownership
Quick Decision Making
Team Builder
Transformational Leadership
The Company is an equal employment opportunity employer.
Not ready to apply? Connect with us for general consideration.
Auto-ApplyManager, Information Security
Information security analyst job in Dallas, TX
At Bluebeam, we empower people to advance the way the world is built. We create smart software solutions that make construction sites more efficient, connected, and safe, and improve the lives of design and construction professionals everywhere. The Information Security Manager leads a team of security engineers in key functional areas, including vulnerability management, application security, incident detection and response, and security awareness.
The person in this role leads the team in maturing and defining processes, developing metrics and reporting on security risk, and adhering to SOC 2 and ISO 27001 compliance. This role requires a combination of technical acuity and strong interpersonal skills to effectively build cross-functional relationships and trust with teams like ITS, DevOps, and Engineering.
The role is Hybrid to our Dallas office.
About the Role
* Leads the security engineering team in projects and operations
* Manages penetration testing and vulnerability management programs
* Works cross-functionally to implement and improve information security-related processes
* Partners with Product and Engineering teams to improve security in the software development lifecycle
* Participates in security incident response
* Collaborates with Privacy and GRC teams to implement compliant processes
About You
* People management experience in Information Security
* Strong knowledge of information security domains including vulnerability management, identity and access management, and endpoint protection
* Experience in application security or software development
* Familiarity with AWS
* Strong project management and hands on implementation skills
* Experience working with security frameworks such as NIST CSF, CIS, and SOC 2
Bonus Points:
* Security-related certifications (e.g. CISSP, CISM, etc.)
What we offer :
* People-focused, entrepreneurial culture with the backing of a stable, global, corporate entity - Nemetschek
* Competitive compensation and benefits package
* Work-life balance fostered through a culture of diversity, inclusion, and appreciation of individual lifestyle needs
* Opportunity for continuous professional development through things like Pluralsight, conferences, and certification programs
About Bluebeam
The construction industry is adopting new technology at a feverish pace. Tablets and cell phones are replacing paper blueprints, drones are surveying jobsites in 3D, and cloud collaboration is changing the way teams work together. Bluebeam plays a crucial role in this transformation. The key to our success is a customer-focused approach to product development: we work with the industry to create solutions for the industry. Today, over 3 million people throughout the world use Bluebeam. In the US, we're a critical partner for the majority of top AEC firms, and rapidly expanding our presence globally, with offices in Sweden, Germany, and the UK.
Come design and build your future with us!
Bluebeam is proud to be an equal-opportunity workplace. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
The base pay offered will depend upon qualifications and other operational considerations. Base pay is one part of Bluebeam's Total Rewards program, which seeks to compensate and recognize employees for their work. Most sales positions are eligible for commission under the terms of an applicable commission plan, while most non-sales positions are eligible for a bonus under the terms of an applicable bonus plan. Additionally, Bluebeam provides best-in-class benefits, with 100% employee-covered health and welfare benefits and paid time off. Bluebeam is a growing company with many opportunities. If this role and/or pay range are not an exact fit, we still encourage you to apply.
The base pay range for this position is: $153,800 - $192,300
#Bluebeam #LI-Hybrid #LI-SR
Nearest Major Market: Dallas
Nearest Secondary Market: Fort Worth
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Compliance Analyst
Information security analyst job in Baytown, TX
Starting Salary Range is $71,905.60 - $75,573. The initial salary offer is commensurate with education and related work experience. The Information Security Compliance Analyst is the designated administrator of the Lee College Information Security Program TAC 202.
This position provides assistance to the Chief Information Officer in the operations of the Lee College Information Security Program, as well as oversight and implementation of system-wide information security strategies and solutions. Specific areas include IT policy, continuity of IT operations, information security risk assessment, information security operations review, and security life cycle for information systems.
Please Note: This position offers a hybrid work arrangement, blending onsite presence with remote flexibility.
* Develop, recommend, and establish policies, procedures, and practices as necessary to protect Lee College information resources against unauthorized or accidental modification, destruction, or disclosure.
* Design, coordinate and execute audit process, monitoring and procedures to assess and measure company Governance, risks, compliance with its security policies and procedures. Monitor advancements in information privacy laws to ensure organizational adaptation and compliance.
* Identify and implement proactive and reactive technical measures to detect vulnerabilities and to defend against external and internal security threats.
* Plan, implement and overseeing risk-related programs as per TAC 202 and other industry related frameworks & compliances. Creating and coordinating proper reporting channels for compliance issues. Developing compliance communications. Coordinating and scheduling required compliance training for employees.
* Provide consulting and technical support services to owners, custodians, and users in defining and deploying cost-effective security controls and protections.
* Ensures College functions in a legal and ethical manner while meeting its business goals. Responsible for developing Risk & compliance programs, reviewing company policies, and advising management on possible risks as per TAC202 state program and other best practices.
* Establish, maintain, and institutionalize security incident response procedures to ensure that security events are thoroughly investigated, documented, and reported; that damage is minimized, that risks are mitigated, and that remedial actions are taken to prevent recurrence.
* Investigate or direct Governance, Risk and compliance security issues, assess product, vulnerabilities, compliance, or operational risks and develop risk management strategies.
* Establish and publicize a security awareness program to achieve and maintain a security-conscious user community.
* Document, maintain, and obtain ongoing support for all aspects of the information security program.
* Monitor the effectiveness of strategies, activities, measures, and controls designed to protect the College information resources.
* Assure executive management's awareness of legal and regulatory changes that might impact the College information security and privacy policies and practices.
* Serve as Lee College internal and external point of contact for information security matters.
* Report frequently (at least annually) on the status and effectiveness of the information security program as directed by the Chief Information Officer (see TAC §202.73(a)).
* Have authority for information security for the entire institution (see TAC §202.71(a)(2)).
* Develop and recommend policies and establish procedures and practices, in cooperation with the information-owners and custodians, necessary to ensure the security of information and information resources against unauthorized or accidental modification, destruction, or disclosure.
* Coordinate the review of the data security requirements, specifications, and, if applicable, third-party risk assessment of any new computer applications or services that receive, maintain, and/or share confidential data.
* Verify that security requirements are identified, and risk mitigation plans are developed and contractually agreed to and obligated prior to the purchase of information technology hardware, software, and systems development services for any new high impact computer applications or computer applications that receive, maintain, and/or share confidential data.
* Serve as liaison with assigned Lee College educational centers for the purpose of monitoring information security program effectiveness and compliance with program requirements.
Perform other duties as assigned.
* Bachelor's (or higher) degree in a related field
* Five (5) years of experience designing, implementing, auditing, and/or managing information resources, information security, or risk management projects, operations, and/or programs
* Experience in the implementation of governance, risk, and compliance strategies preferred
* Experience working in a higher education setting preferred
* Experience in Texas State government preferred
* Must be able to work evenings and weekends as required
Network Security Audit
Information security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyAnalyst, Cyber Security
Information security analyst job in Houston, TX
The Cyber Security Analyst, under the direction of the Director of Cyber Security & Compliance, assists in developing, implementing, and enforcing IT infrastructure security policies, standards, guidelines and technologies. Ensures these controls effectively safeguard Information Systems against accidental or unauthorized modification, destruction, or disclosure.
ESSENTIAL FUNCTIONS
Assist with the development, implementation and maintenance of a comprehensive Information Security Program.
Assist in the development of a website for the Security Office and be responsible for maintaining the site with up-to-date content.
Coordinate and maintain security-related policies, procedures, security standards and best practices.
Contribute to the development of Security Risk Assessments and conducts risk assessments as needed.
Participate in vulnerability assessments, security evaluations and reviews.
Research and stay abreast of new vulnerabilities and exploit that may compromise the Institution.
Evaluate risk and works with inter-departmental personnel to address vulnerabilities.
Advise Departments on regulatory requirements, institutional policies, and security best practices.
Contribute to inter-departmental and cross-functional working groups.
Assist to remediate audit and assessment findings.
Assist in the development of Business Continuity and Disaster Recovery Plans.
Manage security projects and technology implementations.
Meet project deadlines.
Develop and maintain documentation for all assigned projects.
Contribute to the evaluation, implementation and management of security solutions and processes.
Provide security guidance and training to personnel.
Recommend and implement necessary technologies and processes needed to protect the Institution.
Work with the Director of Administrative and IT Security, and other technical/security staff; contributes to the development of project plans and budget proposals to address current needs and potential security issues.
Perform other duties, tasks and assignments as required.
QUALIFICATIONS
Education & Experience
* Bachelor's degree in Computer Science or a related field required
* 8 years directly-related work experience may be substituted in lieu of degree
* 5 years' experience with progressively-increasing responsibility in related subject matter
* Experience in security aspects of multiple platforms, operating systems, software, communications and network protocols
* Experience in a community college environment preferred
Licensing & Certification
* Valid Texas Driver License
Special Skills
* MS Office Programs
* Knowledge of Information Management Systems
* Knowledge of data security, access control systems, encryption and information protection methodologies and concepts
* Able to communicate technical issues to various representatives
Competencies
* Delivering High Quality Work
* Accepting Responsibility
* Serving Customers
* Supporting Organizational Goals
* Driving Continuous Improvement
* Acting with Integrity
* Thinking Critically
* Managing Change
* Communicating Effectively
Working Conditions
General Office. Must be able to perform all job requirements with or without reasonable accommodations; remain in a stationary position during shift; move items weighing up to 25 pounds; position self to operate job equipment; apply established protocols in a timely manner. Must access, input and retrieve information from technology devices; communicate with others to accomplish job requirements. May be required to work after hours to include weekends and holidays.
SECURITY SENSITIVE:
This job class may contain positions that are security sensitive and thereby subject to the provisions of Texas Education Code § 51.215
The Organization
Houston Community College (HCC) is an open-admission, public institution of higher education offering a high-quality, affordable education for academic advancement, workforce training, career development and lifelong learning to prepare individuals in our diverse communities for life and work in a global and technological society. We're proud to say that 98 percent of our graduates step into a job in their field of study immediately upon graduation. One of the largest community colleges in the nation, HCC has served the Greater Houston area for over four decades. Accredited by the Southern Association of Colleges and Schools, and the Schools Commission on Colleges, we offer 300+ associate degree and certificate programs to 75,000+ students across 13 Centers of Excellence and online each semester. We are proud to be No.1 among all community colleges in the nation in providing associate degrees to minorities and No.1 in educating international students, with 10.4 percent of our student population from outside the USA. Our vision is to become the Employer of Choice in support of our mission for Student Success by attracting, retaining and motivating the best employees.
The Team
Play a central role at HCC as you keep our everyday operations running like clockwork. You'll get the chance to make things happen and work closely with inspiring leaders across different parts of the institution. Whether your role is supportive, administrative, financial or something else, you'll be part of a dynamic team that not only provides HCC students with cutting-edge academic and career tools, it also takes care of its people.
Location
Houston is a city with limitless possibilities:
* Fourth-largest city in the U.S. and home to 54 Fortune 500 companies, second only to New York City's 55.
* 145 languages are spoken here.
* Overall after-taxes living costs are 5.6 percent below the average for all 308 urban areas recently surveyed.
* Houston is a major-league sports town, and don't forget the annual Houston Livestock Show & Rodeo.
* The weather is great! Mild winters ensure that outdoor activities can be enjoyed year-round.
* World-renowned medical care. The Houston metro area has long been known for its first-rate health care system, with many Houston area hospitals consistently ranking among the nation's top institutions.
* With over 150 museums and cultural institutions in the Greater Houston area, museums are a large part of Houston's cultural scene.
* Houston is the Culture & Culinary Capital of Texas with more than 7,500 restaurants and eating establishments covering 60+ cuisines.
If this sounds like the role for you and you're ready to join an amazing team, please apply right away.
EEO Statement
Houston Community College does not discriminate on the bases of race, color, religion, sex, gender identity and expression, national origin, age, disability, sexual orientation or veteran's status. The following person has been designated to handle inquiries regarding the non-discrimination policies:
* David Cross, Director EEO/Compliance, Title IX Coordinator
* Office of Institutional Equity
* PO Box 667517
* Houston, TX 77266
* ************ or *****************************
HCC values its employees and their contributions, promotes opportunities for their professional growth and development, and provides a positive working and learning environment that encourages diversity, innovation and creativity, and inclusion.
Individuals with disabilities, who require special accommodations to interview, should contact **************.
Easy ApplyIT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-ApplySecurity Systems Analyst
Information security analyst job in Plano, TX
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Description
• Deploy and maintain a full suite of endpoint security products.
• Responsible for ensuring high level of systems security compliance.
• Maintain pertinent site location details to ensure proper incident management ticket routing.
• Perform incident triage and handling by determining scope, urgency and potential impact
• Provide support for vulnerability assessments tools across multiple vendors.
• Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists.
• Maintain and expand related information security metrics.
Qualifications
• 5+ years supporting workstation and server operating systems.
• 1 year incident response and malware removal experience
• 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc.
• Basic knowledge of network and perimeter security methodologies and tools.
Additional Information
Looking only for W2, No C2C ( Referral and H1B Transfer will work )
Information Security Analyst 2
Information security analyst job in San Antonio, TX
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension.
Job Responsibilities:
* Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
* Develop, complete, and process System Categorization Document and System Security Plans
* Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
* Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
* Process and submit Plans of Action and Milestones (POA&Ms)
* Ensure DISA STIGs/SRGs are implemented and enforced
* Perform Risk Analysis and Vulnerability Assessments
* Perform annual security reviews in accordance with FISMA reporting
* Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
* An active Secret Security Clearance is required
* Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
* 2+ years of experience in support of cybersecurity for the purposes of RMF
* Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
* Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
* Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
* Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
* Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
* Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
* Experience with code languages and frameworks (Java, C+, Apex, etc.)
* End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Cyber Security Analyst III - Alamo Regional Security Operations Center (ARSOC)
Information security analyst job in San Antonio, TX
Under general direction, is responsible for leading the Cyber Security Program processes and systems security assessment programs. Oversees the investigation, analysis, and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff.
Work Location
Alamo Regional Security Operations Center (ARSOC) - 638 Davy Crockett, San Antonio, TX 78226
Work Schedule
7:45 a.m. - 4:30 p.m., Monday - Friday; onsite (case by case remoting possible with manager's consent)
Essential Job Functions
* Leads the Cyber Security Program and the Systems Security Risk Assessment Program processes, which includes the investigation, analysis, and development of the integration, testing, operations, and maintenance of systems security.
* Manages the Vulnerability Assessment Program by analyzing and scanning enterprise systems and mitigating and resolving vulnerability gaps, while ensuring timely patching of COSA systems.
* Guides solution options and decision making based on evaluations and audits of IT project, program, environment, or its individual components to determine compliance with published standards.
* Maintains COSA cyber security missions and goals by overseeing threat hunting and cyber security activities and assessments, and developing plans, measures, and metrics of performance effectiveness.
* Oversees customer support relating to cyber security products and systems.
* Assesses, leads, and mentors subordinate Cyber Security Analysts in their duties and professional development.
* Serves as primary point of contact for the collaborative efforts and products in service of various organizations in the cyber defense of the Alamo Region Security Operations Center.
* Sets standards for data and data collection and gathers data to support recommendations to address problems with appropriate contingency plans.
* Evaluates system designs and identifies system weaknesses and vulnerabilities.
* Performs related duties and fulfills responsibilities as required.
Job Requirements
* Bachelor's degree from an accredited college or university.
* Seven (7) years of relevant technical, cyber security, and business work experience.
* CompTIA Security+.
* GIAC: GPEN, or GWAPT, or Certified Ethical Hacker.
* Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
* Experience leading agile efforts.
* Experience in coaching and mentoring team members.
* Scrum Master, Agile, and Lean Six Sigma Certifications.
* Certified Information Systems Security Professional.
* PCI: ISA, QSA
Applicant Information
* Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university.
* Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted.
* Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application.
* If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents may be attached to the application for consideration in advance.
Knowledge, Skills, and Abilities
* Knowledge of 7 NICE Framework Workforce Categories.
* Knowledge of business operations, systems requirements and IT processes and technologies.
* Knowledge of information and data analysis and reporting.
* Knowledge of system design and programming principles.
* Knowledge of processes, tools, and Cyber Security frameworks.
* Knowledge of strategic planning and change management.
* Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI.
* Skill in interpersonal communications and analytical thinking.
* Skill in technical writing.
* Skill in coordinating work projects.
* Ability to perform all the essential functions of the position, with or without accommodations.
* Ability to work in an office environment.
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.