Post job

Information security analyst jobs in Bryan, TX

- 782 jobs
All
Information Security Analyst
Network Security Analyst
Cyber Security Analyst
Information Security Manager
Senior Information Security Engineer
Information Security Director
Security Architect
  • Cyber Security Analyst

    The Jupiter Group, Inc. 3.9company rating

    Information security analyst job in Houston, TX

    SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats. ESSENTIAL DUTIES AND RESPONSIBILITIES: Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including: Identifying cyber threat tactics and methods Identifying and correcting gaps in the company's cybersecurity posture Testing information systems for vulnerabilities Documenting and escalating incidents Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts Identifying and analyzing anomalies in network traffic or log data Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches Responding to urgent cybersecurity events and incidents Reviewing events and incidents to understand root causes Monitoring reputation for hostile content directed towards organizational or partner interests Recommend procedures and/or changes to procedures necessary for good cyber hygiene Improve the overall cybersecurity posture of the organization's systems Determine the operational and safety impacts of cybersecurity lapses Prepare threat and target briefings and situational updates Monitor threat activities and prepare threat activity reports Manage and report on adversarial activities EDUCATION AND REQUIRED EXPERIENCE: A degree in business or technology is preferred (associate's or bachelors) 3-5 years of experience in IT security Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred Basic scripting (Python, PowerShell, Bash) Experience with vulnerability management Experience with network packet analysis Experience with log analysis and log management Experience with Cloud Security Management interfaces Experience with enterprise authentication systems, such as directory services or identity management platforms Experience with Incident handling and response preferred Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes Working knowledge of computer networking protocols including how traffic flows within a network Working knowledge of cybersecurity laws and regulations Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting Ability to prioritize security requests according to urgency and established criteria Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats General understanding of security frameworks (NIST, MITRE Attack) preferred Familiarity with the variations, similarities, and differences between IT and OT network environments Experience working on project teams and project management is preferred Intermediate understanding of Threat Intelligence research and methodologies Familiarity with adversarial TTPs SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS: Demonstrate excellent communication (written, verbal and listening) and interpersonal skills Superior organizational skills and attention to detail Must possess a proven ability to deliver high-quality customer service Ability to triage and prioritize security related data quickly Ability to respond to work after hours and weekends as needed PHYSICAL DEMANDS: Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above. WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
    $77k-107k yearly est. 1d ago
  • Bank Information Security Governance Senior

    USAA 4.7company rating

    Information security analyst job in Plano, TX

    Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a dedicated Bank Information Security Governance Senior. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position. What you'll do: Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards. Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank. Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies. Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives. Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices. Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments. Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices. Mentors junior members of the IS governance team, providing guidance and support in their professional development. Enhances, and maintains awareness of the risk governance framework and its elements (RCSA). Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks. Prepares metrics reporting and participates in the metrics refresh process. Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline. Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures. What you have: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree. 6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC Experience working on and implementing IT and/or IS policies, standards, and procedures. Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements. A strong understanding of regulatory and compliance requirements applicable to the organization. Ability to interpret complex IT/IS environments and detect early warning signals. Experience in identifying potential failure points and simulating risk scenarios. Proficiency in using data to identify trends, anomalies, and emerging risks. Understanding of cloud, cybersecurity, and digital transformation risks. Ability to articulate risk insights and influence stakeholders to take preventive actions. Familiarity with GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience with data-driven analysis using AI tools and collaborating to drive process innovation Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision. Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization. Compensation range: The salary range for this position is: $114,080-$218,030. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on USAAjobs.com. Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $114.1k-218k yearly Auto-Apply 1d ago
  • Director Information Security

    Celestica 4.5company rating

    Information security analyst job in Richardson, TX

    We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program. Detailed Description Performs tasks such as, but not limited to, the following: Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards. Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations. Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle. Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape. Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies. Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks. Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches. Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices. Typical Experience Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role. Proven track record of successfully implementing a data classification program across an enterprise. Direct experience with the procurement and deployment of DSPM and DRM technologies. Skills & Knowledge: Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery. Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001. Excellent project management skills and the ability to lead cross-functional teams. Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences. Certifications (Preferred): Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Privacy Professional (CIPP) Typical Education Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience. A Master's degree is a plus. Educational requirements may vary by geography. Physical Demands Duties of this position are performed in a normal office environment. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required. Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law. This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines. COMPANY OVERVIEW: Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services. This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
    $100k-124k yearly est. 3d ago
  • Cyber Security Architect

    Mastech Digital 4.7company rating

    Information security analyst job in Dallas, TX

    Privileged Access Management (PAM) Architect Westlake, TX Responsibilities: 10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors. Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management. Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders. Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable. They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault) Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience. They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
    $94k-151k yearly est. 4d ago
  • Information Security Risk Analyst (GRC)

    External Candidates Only

    Information security analyst job in Terrell, TX

    The Information Security Risk Analyst role is responsible for critical assessment, analysis, and support necessary to maintain the Information and Cyber Security Program. Conduct comprehensive risk assessments to identify and evaluate potential threats and vulnerabilities to information systems, assets, programs, and practices Analyze controls for weaknesses in security, business resiliency, data protection, privacy, and compliance frameworks Leverages quantitative analysis and qualitative narrative to thoroughly document and report all identified risks and gaps to Information Security leadership Conduct Information and Cyber Security due diligence to support the Third-Party Risk Management program Support Information Security leadership with facilitation of program management efforts including but not limited to risk register maintenance, issue management, security awareness, vulnerability management, policies, procedures, metrics and reporting Interface and collaborate with internal stakeholders and external auditors as necessary to support the Information Security Program and other critical business efforts Perform horizon scanning and stay up to date with regulatory changes, emerging threats, vulnerabilities, security standards and best practices Participates in and support incident response activities as necessary Perform other duties as assigned Required Experience: Bachelor's degree in cyber security, information technology, business, or finance, or equivalent industry experience. Professional certifications such as ISC2 Certified in Governance Risk & Compliance (CGRC), ISC2 Systems Security Certified Practitioner (SSCP), Comp TIA Security+ 2-3 years of Information Security risk management or audit experience. Experience and understanding of regulatory requirements and laws, including but not limited to; GLBA, HIPAA, PCI, GDPR, and TDPSA. Experience with security and control framework including but not limited to; NIST, CIS, CSA, SSAE10 SOC2, and HITRUST Preferred experience with vulnerability management, security awareness, and GRC systems or platforms. Prior Information/Cyber Security of Information Technology practitioner experience in the financial industry or other highly regulated industry is helpful Skills: Exceptional written and verbal communication skills; including ability to translate security and risk to all levels of the business. Strong analytical skills with proven attention to detail. Strong organization and time management skills Work occasionally requires more than 40 hours per week to perform the essential functions of the position Lifting in an office setting may be required up to 30lbs. ANBTX strongly encourages candidates that are fluent in English and Spanish to apply. Jobs that specifically require candidates to be bilingual will be posted as a requirement.
    $74k-107k yearly est. 55d ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Plano, TX

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Description • Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus Qualifications MUST HAVES: • 2+ years of experience in technical role with notable exposure to security • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment. • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management This is a Bulk hiring position for our direct client. Additional Information For More Information, Please Contact Siva Kumar ************
    $90k-121k yearly est. 11h ago
  • Information Security Specialist IV (IA Log Analyzer)

    Kiakahi

    Information security analyst job in Killeen, TX

    Information Security Specialist IV Location: Fort Hood, Texas (Killeen) Job Summary Kiakahi, LLC has an immediate opening for an Information Security Specialist to join our rapidly growing team. The Information Security Specialist performs under general direction and uses current information security technology disciplines and practices to ensure the confidentiality, integrity and availability of Government information assets in accordance with established standards and procedures. Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensures compliance throughout the organization; Provides Risk Management Framework, circuit/system accreditation and certification policy services; Participates in the development or modification of the computer environment IA security program plans and requirements; Develops procedures to ensure system users are aware of their IA responsibilities before granting access to DoD information systems; Recognizes possible security violations and takes appropriate action to report the incident, as required; Ensures IA security requirements are appropriately identified in computer environment operation procedures; and collects and maintains data needed to meet system IA reporting requirements. Responsibilities (Not listed in order of importance; other duties may be assigned) and must be able to perform the following with minimal guidance: Provide oversight for the Computer Network Defense-Service Provider (CNDSP) Work with system owners to close IAVMs/ICVMs and open Plan of Action and Milestones (POA&Ms) in a rapid fashion, in accordance with DoD instructions/directives. Review all POA&MS with the Program Manager on at least a quarterly basis and update the POA&Ms accordingly. Provide Defense in Depth principles and technology in security engineering designs and implementation Analyze existing and future systems, reviewing security architectures, and developing engineering solutions that integrate information security requirements to proactively manage information protection Apply security risk assessment methodology to system development, including assessing and auditing network penetration testing, antivirus deployment, risk analysis Conduct Computer Incident Response Team (CIRT) activities, including forensic analysis Engineer and deploy network defense countermeasures such as anti-virus, anti-spam, and intrusion detection and prevention system solutions Analyze IA security events, including threat model development and resulting security risk analysis of systems Review and assess information security events and logs via sophisticated security information/event manager Plan, implement, and manage a Defense In Depth for the total network and/or enclaves within the network to include such items as: scanning, remediation, host and network intrusion detection/prevention, firewalls, proxy servers, web cache, virus programs, vulnerability scanning, content filtering, remote dial in protection, Host Based Security Services, Directory Services, and Certification and Accreditation, DoD Instruction 5200.40, accreditation guidance and advice IAW AR 25-2 and IA Best Business Practices (BBPs). Plan, respond, investigate, and report undisclosed classified incident remediation. Assess and mitigate system security threats/risks throughout the program life cycle Validate system security requirements definition and analysis and review/approve System Security Plans for enterprise-wide architectures Maintain Agency public key infrastructure system Implement security designs in hardware, software, data and procedures Provide support for the Department of Defense (DoD) Public Key Infrastructure (PKI) service. Responsible for requesting, receiving, installation, and accountability of system (server) PKI certificates and providing technical support for PKI. Provide Certification and Accreditation, as well as provide Automated Information System Accreditation support Provide Security Risk Assessment. Perform risk analysis of resources, controls, vulnerabilities, impact of losing systems' capabilities and threats to the mission objective; provide analysis to facilitate decisions to implement security countermeasures or mitigate risk; implement countermeasures; periodically review program. Recognize possible threats and review evaluations for compliance and non-compliance. Responsibilities Requirements To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill and ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Bachelor's Degree in Computer Science, Cybersecurity, Computer Engineering, or related discipline preferred 5-7 years of experience performing Information Assurance functions and using RMF IT security controls and policies preferred Must possess and maintain an IT-I level certification IAW AR 25-2 and IAT-II certification IAW DoD 8570.01-M Abilities Ability to organize, prioritize and meet deadlines Capable of conveying complex information in a simplistic manner Strong critical thinking and problem-solving skills Strong self-starter requiring minimal supervision Able to take proactive measures to prevent problems rather than reactive by nature Strong verbal and written communication to effectively express concepts, plans, and proposals Security Clearance Position requires an active DoD security clearance. Must be a US citizen. Physical Requirements Work may involve sitting or standing for extended periods of time. Position may require typing and reading from a computer screen. Must have sufficient mobility, including but not limited to bending, reaching, and kneeling to complete daily duties in a timely and efficient manner. May include lifting weight up to thirty (30) pounds as necessary. A valid driver's license with a clean driving record may be required Occasional use of company vehicle while on work site Benefits Medical, dental, vision, disability, and life insurance Flexible Spending Accounts 401(k) PTO Tuition reimbursement Paid federal holidays Paid Parental Leave Company Headquartered in San Diego, CA, Kiakahi, LLC is a Native Hawaiian Organization (NHO) owned SBA Small Disadvantaged Business specializing in global information technology and offering professional solutions in IT Design & Installation, Cybersecurity Engineering & Support, Application Integration & Development, Software & Hardware Engineering, Network & Systems Management, Information Systems Security, and Business Management Services. Leveraging over 30 years of providing IT services to the federal & commercial market with projects located around the world, our team possesses innovative expertise in the development of a wide range of technology solutions. Kiakahi, LLC is an equal opportunity employer. Our service commitment is to be - "Your Supreme Partner for Success." Kiakahi LLC reserves the right to change or modify job duties and assignments at any time. The above job description is not all encompassing. Position's functions and qualifications may vary depending on business needs. Kiakahi LLC is an equal opportunity employer and does not discriminate against applicants based on race, color, creed, religion, medical condition, legally protected genetic information, national origin, sex (including pregnancy, childbirth or related medical condition), sexual orientation, gender identity and expression, age, disability, or Vietnam era, or other eligible veteran status or legally protected characteristics. Posted Salary Range USD $75,000.00 - USD $80,000.00 /Yr.
    $75k-80k yearly Auto-Apply 17d ago
  • Information Security Analyst 2

    Cdo Technologies, Inc. 4.5company rating

    Information security analyst job in San Antonio, TX

    Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service. Position Summary: This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers. Job Responsibilities: Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO) Develop, complete, and process System Categorization Document and System Security Plans Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS) Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families Process and submit Plans of Action and Milestones (POA&Ms) Ensure DISA STIGs/SRGs are implemented and enforced Perform Risk Analysis and Vulnerability Assessments Perform annual security reviews in accordance with FISMA reporting Review PPS, HW/SW listings, NSS checklists (all A&A artifacts) Minimum Requirements: An active Secret Security Clearance is required Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE 2+ years of experience in support of cybersecurity for the purposes of RMF Experience developing and sustaining RMF A&A packages Preferred Qualifications & Experience: Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs) Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc. Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs) Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc. Experience with code languages and frameworks (Java, C+, Apex, etc.) End-to-end experience with attaining system ATOs What can a CDO employee expect? At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave. CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
    $67k-93k yearly est. Auto-Apply 29d ago
  • Network Security Analyst

    Sigma Information Group

    Information security analyst job in Austin, TX

    Support senior cybersecurity staff in evaluating cybersecurity risks across commercial real estate (CRE) environments. Responsibilities include assisting with network security assessments, reviewing access controls, identifying common misconfigurations, running vulnerability scans, documenting networks/systems, and preparing clear reports. Scope spans both IT and OT (building systems such as BMS/BAS, HVAC, access control, CCTV). Key Responsibilities Perform asset discovery and initial scans to identify hosts, services, and firmware versions (e.g., Nmap). Review firewalls, VPNs, and endpoint security to identify misconfigurations and vulnerabilities Evaluate switch/router configurations for proper segmentation Document current-state diagrams and asset inventories Assess BMS/BAS, IoT, and physical security systems for cyber risk with minimal disruption to operations. Identify common gaps (weak/default credentials, unpatched systems, outdated TLS, flat networks, exposed management interfaces, insecure vendor remote access). Support remediation by coordinating with IT teams, vendors, and property managers; verify fixes and retest critical findings. Prepare and maintain assessment artifacts: asset lists, risk-rated findings, evidence, compliance checklists, and client-ready reports. Track emerging threats and advisories relevant to smart buildings/IoT and CRE environments; summarize impact for the team. Qualifications Associate's or Bachelor's in Cybersecurity/IT (or 2+ years equivalent hands-on experience). Familiarity with core security technologies: Firewalls (e.g., Fortinet, Palo Alto), IAM/MFA (e.g., Entra ID/Azure AD), and EDR (e.g., SentinelOne). Intermediate networking: TCP/UDP, routing basics, Layer-3 switches, VPNs (IPsec/SSL), VLANs, ACLs, NAT, DHCP/DNS, Wi-Fi/WPA3. Working knowledge of Windows client/server; basic Linux familiarity. Strong documentation and communication skills; ability to translate technical findings into clear business impact. Nice to Have Exposure to vulnerability management tooling and concepts. OT/IoT awareness: BACnet/Modbus basics, safety-first testing on live control networks, maintenance-window/change-control etiquette. Firewalls and platforms: Palo Alto, Fortinet, Check Point; switch stacks (Cisco Catalyst/Meraki, UniFi). Identity, privileged access, and remote access hygiene Endpoint and device management Scripting/automation Ticketing and knowledge tools (ServiceNow/Jira/Confluence); diagramming (Visio/draw.io). Familiarity with frameworks and benchmarks: NIST CSF 2.0, CIS Controls Travel: Regular on-site visits to local properties (50%) with occasional out-of-area travel (5-10%) Benefits Medical, dental, and vision insurance Life insurance Long-term disability Paid vacation Paid holidays Simple IRA (401K equivalent) for eligible employees Stocked snack bar Company-sponsored outings Fitness center onsite
    $67k-91k yearly est. 60d+ ago
  • Network Security Analyst

    Cymertek

    Information security analyst job in San Antonio, TX

    Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $67k-91k yearly est. Easy Apply 60d+ ago
  • Information Security Architect Manager

    Berkley 4.3company rating

    Information security analyst job in Texas

    Company Details Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible. Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “ What's Next ” in our industry and beyond. With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions. Berkley Technology Services: Right Team, Right Technology, Simple and Secure. Responsibilities The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC. This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley Technology Services' technological assets and services. Spearhead the architectural design, deployment, and management of cutting-edge security solutions, including but not limited to SIEM, EDR, PAM, Data Access Governance, Identity Governance, Cloud Access Security Brokers, and WAFs. Architect and sustain the security infrastructure, ensuring seamless integration with existing technology ecosystems. Craft and execute architectural strategies for bolstering vulnerability management, security automation, and the safeguarding of infrastructure. Guide the formulation and continuous refinement of security policies and procedures, with a spotlight on architectural best practices. Cultivate an environment of innovation within the team, promoting continual learning and professional advancement. Function as a principal consultant and subject matter authority on information security architecture, offering pivotal guidance to internal teams and key stakeholders. Develop and maintain roadmaps for critical security infrastructure components, aligning them with the strategic goals of the organization. Collaborate with fellow Information Security leaders to forge a unified and robust Information Security Framework and Strategy. Perform regular technology evaluations, risk assessments, and devise appropriate remediation strategies. Lead and nurture a team of security architects and engineers in a fast-paced, global setting. Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary. Qualifications Demonstrated expertise in Information Security Architecture, with practical experience in the design and management of a broad spectrum of security technologies. Exceptional leadership and communication capabilities, adept at guiding global, interdisciplinary teams. Deep familiarity with contemporary cybersecurity trends and a commitment to remaining at the cutting edge of technology. Desirable certifications include CISSP, CISM, CEH, or other relevant qualifications. Proficiency in cloud security architecture and solutions, with experience in AWS, Azure, or Google Cloud platforms. Expertise in security frameworks such as NIST, ISO 27001, and CIS. Strong analytical and problem-solving skills, capable of making informed decisions in complex scenarios. Ability to foster relationships and collaborate effectively with various internal and external stakeholders. Commitment to ethical conduct and a deep understanding of regulatory compliance requirements relevant to the insurance and financial sectors. Bachelor's or Master's degree in Computer Science, Information Security, or a related discipline, or equivalent experience. Behavioral Core Competencies Flexibility Customer Service Oriented & Operational Effectiveness Personal Ownership Quick Decision Making Team Builder Transformational Leadership The Company is an equal employment opportunity employer. Not ready to apply? Connect with us for general consideration.
    $107k-138k yearly est. Auto-Apply 24d ago
  • Cyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)

    City of San Antonio, Tx 4.4company rating

    Information security analyst job in San Antonio, TX

    Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff. Work Schedule 7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department Essential Job Functions * Leads analysis and development of the integration, testing, operations, and maintenance of system security. * Leads assessments of systems and networks and identifies deviations. * Maintains access control and collection gaps. * Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards. * Prepares and executes system tests to evaluate optimization. * Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response. * Executes and manages a Security Awareness Training Program and provides data for reports. * Leads security "tiger team" in the prosecution of vectors, hackers, and various threats. * Assist superiors in the production of the Alamo Region Security Operation Center products. * Performs related duties and fulfills responsibilities as required. Job Requirements * Bachelor's degree from an accredited college or university. * Four (4) years of relevant technical, cyber security, and business work experience. * CompTIA Security+. * GIAC: GPEN or GWAPT. * Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions. Preferred Qualifications * Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations. * Experience leading agile efforts. * Experience in coaching and mentoring team members. * Scrum Master, Agile Certifications. Applicant Information * Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university. * Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted. * Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application. * If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents. may be attached to the application for consideration in advance. Knowledge, Skills, and Abilities * Knowledge of 7 NICE Framework Workforce Categories. * Knowledge of business operations, systems requirements, and IT processes and technologies. * Knowledge of information and data analysis and reporting. * Knowledge of Cyber Security system design, programming principles, processes, and tools. * Knowledge of strategic planning and change management. * Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI. * Skill in interpersonal communications and analytical thinking. * Skill in technical writing. * Ability to perform all the essential functions of the position, with or without accommodations. * Ability to work in an office environment.
    $59k-76k yearly est. 15d ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Information security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 60d+ ago
  • Manager, Information Security

    Bluebeam 4.2company rating

    Information security analyst job in Dallas, TX

    At Bluebeam, we empower people to advance the way the world is built. We create smart software solutions that make construction sites more efficient, connected, and safe, and improve the lives of design and construction professionals everywhere. The Information Security Manager leads a team of security engineers in key functional areas, including vulnerability management, application security, incident detection and response, and security awareness. The person in this role leads the team in maturing and defining processes, developing metrics and reporting on security risk, and adhering to SOC 2 and ISO 27001 compliance. This role requires a combination of technical acuity and strong interpersonal skills to effectively build cross-functional relationships and trust with teams like ITS, DevOps, and Engineering. The role is Hybrid to our Dallas office. About the Role * Leads the security engineering team in projects and operations * Manages penetration testing and vulnerability management programs * Works cross-functionally to implement and improve information security-related processes * Partners with Product and Engineering teams to improve security in the software development lifecycle * Participates in security incident response * Collaborates with Privacy and GRC teams to implement compliant processes About You * People management experience in Information Security * Strong knowledge of information security domains including vulnerability management, identity and access management, and endpoint protection * Experience in application security or software development * Familiarity with AWS * Strong project management and hands on implementation skills * Experience working with security frameworks such as NIST CSF, CIS, and SOC 2 Bonus Points: * Security-related certifications (e.g. CISSP, CISM, etc.) What we offer : * People-focused, entrepreneurial culture with the backing of a stable, global, corporate entity - Nemetschek * Competitive compensation and benefits package * Work-life balance fostered through a culture of diversity, inclusion, and appreciation of individual lifestyle needs * Opportunity for continuous professional development through things like Pluralsight, conferences, and certification programs About Bluebeam The construction industry is adopting new technology at a feverish pace. Tablets and cell phones are replacing paper blueprints, drones are surveying jobsites in 3D, and cloud collaboration is changing the way teams work together. Bluebeam plays a crucial role in this transformation. The key to our success is a customer-focused approach to product development: we work with the industry to create solutions for the industry. Today, over 3 million people throughout the world use Bluebeam. In the US, we're a critical partner for the majority of top AEC firms, and rapidly expanding our presence globally, with offices in Sweden, Germany, and the UK. Come design and build your future with us! Bluebeam is proud to be an equal-opportunity workplace. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status. The base pay offered will depend upon qualifications and other operational considerations. Base pay is one part of Bluebeam's Total Rewards program, which seeks to compensate and recognize employees for their work. Most sales positions are eligible for commission under the terms of an applicable commission plan, while most non-sales positions are eligible for a bonus under the terms of an applicable bonus plan. Additionally, Bluebeam provides best-in-class benefits, with 100% employee-covered health and welfare benefits and paid time off. Bluebeam is a growing company with many opportunities. If this role and/or pay range are not an exact fit, we still encourage you to apply. The base pay range for this position is: $153,800 - $192,300 Nearest Major Market: Dallas Nearest Secondary Market: Fort Worth
    $153.8k-192.3k yearly 29d ago
  • Network Security Audit

    Stem Xpert

    Information security analyst job in Irving, TX

    Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services. We strongly believe: " If something cannot be measured, it cannot be managed. " TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core. We are an Equal Employment Opportunity Employer M/F/V/D Recognitions: 2015 -America's Fastest Growing Company by Inc.com 2015- SPARK FastTrack Award from Ann Arbor SPARK 2015 -Honoree of Diversity Focused Company by Corp! Magazine 2014- America's Fastest Growing Company by Inc.com 2014- Michigan 50 Companies to Watch 2014 - DiSciTech Award in Technology by Corp! Magazine 2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine 2014- SPARK FastTrack Award from Ann Arbor SPARK Specialties: Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration Position details: Senior Systems Engineer - Network Security Audit Location: Irving TX Duration: 6+ months Job Description: Current CCNP, CCNA, CISSP or equivalent - Experience in auditing network security compliance - 8+ years' experience with IIS - 8 + years' experience in Windows System Administration and Active Directory - Experience in network design, operational support, hands-on implementation and configuration of network infrastructure - Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms - Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing Additional Information Regards, Swati swati(dot)********************** ************
    $67k-90k yearly est. Easy Apply 60d+ ago
  • IT Network / Security Analyst

    Txo Partners Gp LLC

    Information security analyst job in Fort Worth, TX

    The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape. Duties and Responsibilities: Network Operations & Monitoring Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components. Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats. Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations. Travel as required (up to 25%) to support field locations. Incident Response & Troubleshooting Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation). Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience. Participate in on-call rotations for critical incident response. Network Security Administration Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement. Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data. Oversee security patching and firmware upgrades across network infrastructure. Vulnerability & Compliance Management Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses. Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations. Assist with periodic audits, reporting findings, and driving corrective actions. Threat Intelligence & Reporting Stay up to date on evolving attack vectors, especially those targeting enterprise networks. Leverage threat intelligence to proactively adjust network defenses. Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture. Collaboration & Training Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations. Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting. Knowledge, skills, and abilities: Technical Knowledge Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures. Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus). Familiarity with security technologies such as SIEM (Splunk, ELK) a plus. Hands-on experience with enterprise network firewalls and network equipment. Experience with enterprise endpoint protection. Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access. Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations. Skills Proficiency in troubleshooting complex network and security issues in enterprise environments. Strong analytical mindset with the ability to distinguish between performance-related issues and security threats. Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences. Effective multitasking and prioritization in 24/7 operations environments. Abilities Ability to balance proactive network performance management with rapid cyber threat response. Commitment to continuous learning in both network operations and cybersecurity trends. Adaptability to shifting operational demands and evolving attack landscapes. Strong teamwork skills with the discretion to handle sensitive information responsibly. Education and Experience Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred. 3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred. Relevant certifications highly desirable, such as: Network-focused: CCNA, CCNP, CompTIA Network+ Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH) Equal Opportunity Employer Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information. Edit job description
    $67k-90k yearly est. Auto-Apply 39d ago
  • Bank Information Security Governance Senior

    USAA 4.7company rating

    Information security analyst job in San Antonio, TX

    Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a dedicated Bank Information Security Governance Senior. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position. What you'll do: Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards. Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank. Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies. Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives. Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices. Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments. Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices. Mentors junior members of the IS governance team, providing guidance and support in their professional development. Enhances, and maintains awareness of the risk governance framework and its elements (RCSA). Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks. Prepares metrics reporting and participates in the metrics refresh process. Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline. Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures. What you have: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree. 6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC Experience working on and implementing IT and/or IS policies, standards, and procedures. Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements. A strong understanding of regulatory and compliance requirements applicable to the organization. Ability to interpret complex IT/IS environments and detect early warning signals. Experience in identifying potential failure points and simulating risk scenarios. Proficiency in using data to identify trends, anomalies, and emerging risks. Understanding of cloud, cybersecurity, and digital transformation risks. Ability to articulate risk insights and influence stakeholders to take preventive actions. Familiarity with GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience with data-driven analysis using AI tools and collaborating to drive process innovation Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision. Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization. Compensation range: The salary range for this position is: $114,080-$218,030. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on USAAjobs.com. Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $114.1k-218k yearly Auto-Apply 1d ago
  • Security Systems Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Plano, TX

    Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost. Job Description • Deploy and maintain a full suite of endpoint security products. • Responsible for ensuring high level of systems security compliance. • Maintain pertinent site location details to ensure proper incident management ticket routing. • Perform incident triage and handling by determining scope, urgency and potential impact • Provide support for vulnerability assessments tools across multiple vendors. • Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists. • Maintain and expand related information security metrics. Qualifications • 5+ years supporting workstation and server operating systems. • 1 year incident response and malware removal experience • 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc. • Basic knowledge of network and perimeter security methodologies and tools. Additional Information Looking only for W2, No C2C ( Referral and H1B Transfer will work )
    $90k-121k yearly est. 11h ago
  • Information Security Analyst 2

    CDO Technologies, Inc. 4.5company rating

    Information security analyst job in San Antonio, TX

    Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service. Position Summary: This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers. Job Responsibilities: * Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO) * Develop, complete, and process System Categorization Document and System Security Plans * Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS) * Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families * Process and submit Plans of Action and Milestones (POA&Ms) * Ensure DISA STIGs/SRGs are implemented and enforced * Perform Risk Analysis and Vulnerability Assessments * Perform annual security reviews in accordance with FISMA reporting * Review PPS, HW/SW listings, NSS checklists (all A&A artifacts) Minimum Requirements: * An active Secret Security Clearance is required * Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE * 2+ years of experience in support of cybersecurity for the purposes of RMF * Experience developing and sustaining RMF A&A packages Preferred Qualifications & Experience: * Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs) * Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc. * Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs) * Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments * Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc. * Experience with code languages and frameworks (Java, C+, Apex, etc.) * End-to-end experience with attaining system ATOs What can a CDO employee expect? At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave. CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
    $67k-93k yearly est. 27d ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Information security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 10h ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Bryan, TX?

The average information security analyst in Bryan, TX earns between $63,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Bryan, TX

$90,000
Job type you want
Full Time
Part Time
Internship
Temporary