Post job

Information security analyst jobs in College Station, TX

- 793 jobs
All
Information Security Analyst
Network Security Analyst
Security Engineer
Security Architect
Cyber Security Engineer
Information Technology Analyst
Senior Information Security Analyst
Senior Information Security Engineer
Information Security Officer
Cyber Security Analyst
Information Security Director
Securities Research Analyst
  • Cyber Security Analyst

    The Jupiter Group, Inc. 3.9company rating

    Information security analyst job in Houston, TX

    SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats. ESSENTIAL DUTIES AND RESPONSIBILITIES: Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including: Identifying cyber threat tactics and methods Identifying and correcting gaps in the company's cybersecurity posture Testing information systems for vulnerabilities Documenting and escalating incidents Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts Identifying and analyzing anomalies in network traffic or log data Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches Responding to urgent cybersecurity events and incidents Reviewing events and incidents to understand root causes Monitoring reputation for hostile content directed towards organizational or partner interests Recommend procedures and/or changes to procedures necessary for good cyber hygiene Improve the overall cybersecurity posture of the organization's systems Determine the operational and safety impacts of cybersecurity lapses Prepare threat and target briefings and situational updates Monitor threat activities and prepare threat activity reports Manage and report on adversarial activities EDUCATION AND REQUIRED EXPERIENCE: A degree in business or technology is preferred (associate's or bachelors) 3-5 years of experience in IT security Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred Basic scripting (Python, PowerShell, Bash) Experience with vulnerability management Experience with network packet analysis Experience with log analysis and log management Experience with Cloud Security Management interfaces Experience with enterprise authentication systems, such as directory services or identity management platforms Experience with Incident handling and response preferred Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes Working knowledge of computer networking protocols including how traffic flows within a network Working knowledge of cybersecurity laws and regulations Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting Ability to prioritize security requests according to urgency and established criteria Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats General understanding of security frameworks (NIST, MITRE Attack) preferred Familiarity with the variations, similarities, and differences between IT and OT network environments Experience working on project teams and project management is preferred Intermediate understanding of Threat Intelligence research and methodologies Familiarity with adversarial TTPs SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS: Demonstrate excellent communication (written, verbal and listening) and interpersonal skills Superior organizational skills and attention to detail Must possess a proven ability to deliver high-quality customer service Ability to triage and prioritize security related data quickly Ability to respond to work after hours and weekends as needed PHYSICAL DEMANDS: Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above. WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
    $77k-107k yearly est. 1d ago
  • Cyber Security Engineer

    Energy Hire

    Information security analyst job in Midland, TX

    One of our client partners is seeking a Cyber Security Engineer who will will play a critical role in designing, implementing, and maintaining our security infrastructure, as well as developing and enforcing security policies and procedures. Title: Cyber Security Engineer Location: Midland, TX (This position requires onsite presence. Must be willing to relocate to Midland, TX. Applicants not willing to relocate will not be considered.) Our client is not seeking to sponsor at this time. NO C2C! General Responsibilities Develop and maintain security policies, procedures, and standards to ensure confidentiality, integrity, and availability of company data. Design and implement security solutions, including firewalls, intrusion detection/prevention systems, and other security tools. Conduct threat analysis and vulnerability assessments to identify and mitigate potential security risks. Lead incident response efforts, including containment, eradication, and recovery. Monitor security systems and logs to detect and respond to security incidents. Collaborate with other IT teams to ensure security is integrated into all aspects of the infrastructure. Research and evaluate new security technologies and solutions. Stay up to date on the latest security threats and vulnerabilities and provide security awareness training to employees. Minimum Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ years of experience in cybersecurity engineering or a related role. Experience with security policy and procedure development. Proven ability to design and implement security solutions. Strong understanding of threat analysis and mitigation techniques, including incident response. Familiarity with industry standards such as NIST CSF and ISO 27001 Technical expertise in one or more of the following security tools and technologies: Firewall Management, Web Application Firewall (WAF), Endpoint Detection and Response (EDR), Data Loss Prevention (DLP), Cloud Security (e.g., AWS, Azure, GCP), Security Information and Event Management (SIEM), Identity and Access Management (IAM), Privileged Access Management (PAM). Excellent communication and interpersonal skills. Strong analytical and problem-solving skills. Preferred Qualifications Related cybersecurity work experience in OT/Industrial Controls Systems (SCADA) environments. Relevant certifications such as CISSP, Security+, or equivalent experience.
    $83k-114k yearly est. 23h ago
  • Director Information Security

    Celestica 4.5company rating

    Information security analyst job in Richardson, TX

    We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program. Detailed Description Performs tasks such as, but not limited to, the following: Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards. Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations. Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle. Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape. Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies. Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks. Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches. Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices. Typical Experience Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role. Proven track record of successfully implementing a data classification program across an enterprise. Direct experience with the procurement and deployment of DSPM and DRM technologies. Skills & Knowledge: Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery. Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001. Excellent project management skills and the ability to lead cross-functional teams. Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences. Certifications (Preferred): Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Privacy Professional (CIPP) Typical Education Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience. A Master's degree is a plus. Educational requirements may vary by geography. Physical Demands Duties of this position are performed in a normal office environment. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required. Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law. This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines. COMPANY OVERVIEW: Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services. This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
    $100k-124k yearly est. 3d ago
  • Cyber Security Architect

    Mastech Digital 4.7company rating

    Information security analyst job in Dallas, TX

    Privileged Access Management (PAM) Architect Westlake, TX Responsibilities: 10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors. Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management. Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders. Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable. They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault) Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience. They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
    $94k-151k yearly est. 4d ago
  • Chief Information and Security Officer

    Bridgework Partners

    Information security analyst job in Dallas, TX

    Chief Information Security Officer Chief Information Security Officer The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position. Required Knowledge, Skills, and Abilities Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies. Must also demonstrate strong written communication skills. Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals. Must possess strong problem-solving skills to effectively influence decision-making in key negotiations. Ability to perform hands-on, operational work when necessary. Ability to maintain the security or integrity of the critical infrastructure of the institution. Qualifications Minimum Qualifications Bachelor's degree and additional education in Information Security. Prior managerial experience in Information Technology and service context. Professional IT security management certification (e.g., CISSP, CISM). 10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability. Experience running a security program in a complex environment. Strong understanding of security protocols and operations. Knowledge of current IT risks and experience implementing security solutions. Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP. EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization. Bilingual or multilingual preferred. ***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.*** Key Responsibilities IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction. IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats. Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework). Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response. Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts. Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies. Training: Develop and implement security training for faculty and staff. Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches. Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations. Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience. Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response. Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies. Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention. Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year. The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance. Physical Requirements Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
    $102k-154k yearly est. 1d ago
  • IT Analyst ERP

    Inceed 4.1company rating

    Information security analyst job in Houston, TX

    IT Analyst ERP Compensation: $120,000 - $140,000 annually, depending on experience Inceed has partnered with a great company to help find a skilled IT Analyst ERP to join their team! Are you ready to make a significant impact in the energy sector? This is your chance to join a dynamic team where your expertise in Quorum applications will drive innovation and operational excellence. This role was created to enhance the efficiency and accuracy of the company's revenue and land systems. As an IT Analyst ERP, you'll be the go-to expert, bridging the gap between technology and business needs. Join now and be part of a team that values continuous improvement and proactive problem-solving. Key Responsibilities & Duties: Support Quorum ERP business users across various departments Troubleshoot and resolve operational issues in Quorum Develop technical relationships to explain concepts in business terms Participate in change management for Quorum ERP applications Monitor and create automated jobs and data transformations in Quorum Translate business requirements into technology solutions Prepare updates and document Quorum ERP processes Required Qualifications & Experience: 3+ years of IT support for Quorum applications Bachelor's Degree in Computer Science or related field Proficiency in user security configuration and administration in Quorum Hands-on experience with SQL, Spotfire, and Power BI Solid understanding of oil & gas upstream business processes Nice to Have Skills & Experience: 5 years of progressive IT experience with Quorum applications Experience with Spotfire is a plus Perks & Benefits: This opportunity includes a comprehensive and competitive benefits package-details will be shared during later stages of the hiring process. If you are interested in learning more about the IT Analyst ERP opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law. #INDHOU
    $120k-140k yearly 3d ago
  • Cyber Security Engineer

    Motion Recruitment 4.5company rating

    Information security analyst job in Dallas, TX

    Hiring: Cybersecurity Engineer Duration: 12 months contract About the Role We are seeking an experienced Lead Cybersecurity Engineer to join our dynamic team and drive secure-by-design principles across our cloud and application environments. In this role, you will collaborate closely with development teams to identify, assess, and remediate security vulnerabilities, ensuring robust protection across our AWS and Azure ecosystems. Key Responsibilities Lead Security by Design and integrate security throughout the SDLC. Perform security defect management - analyze, validate, and consult on issues found via tools like CodeQL, Rapid7, penetration tests, and bug bounty programs. Provide engineering consulting to developers, architects, and product teams on secure design and implementation best practices. Manage tool enablement and monitoring for automated vulnerability detection tools (CodeQL, Rapid7, etc.). Coordinate security testing and onboarding, including penetration testing and assurance assessments. Technical Skills Required: Application Security (OWASP, CWE/CVE, SANS 25) Enterprise Security Architecture, Threat Modeling, and Risk Analysis SDLC, DevSecOps, and API Security Cloud Security (AWS, Azure) SCA / SAST / DAST tools Hands-on development experience in Java, Python, .NET, or JavaScript Automation and scripting for security processes Security certifications preferred (CISSP, CCSP, GWAPT, GWEB, AWS Certified Security, etc.) Preferred: Web Services Security CSSLP, GISCP, or other advanced security certifications Experience integrating security technologies in enterprise environments #Cybersecurity #AWS #DevOps #Python #SDLC #IaC #SAST #DAST #CISSP #CCSP
    $84k-116k yearly est. 1d ago
  • Red Team Cyber Security Engineer

    Interex Group

    Information security analyst job in Dallas, TX

    One of our key clients within the financial industry is looking for a Red Team Cyber Security Engineer for a full-time position. This position will be 2 days on-site in Chicago or Dallas and 3 days remote. Please note, only US citizens or Green-card holders are eligible for this position. Job Description: Perform cloud assessments, web application penetration testing and mobile application testing Carry out reviews of security, network, applications, and cloud environments Plan/Design security activities with automation as the primary driver to align with the security strategy Ensure alignment of security controls, supporting services and related policies with regulations and industry-standard best practices Assist management with the improvement of policy/procedure to support Cloud Security Engineering Participate in developing a security roadmap, adopt security best practices, and implement new ideas and innovations according to the industry trends Experience required: Penetration Testing experience within Network, Application, Web Application or Mobile Applications Experience cloud environments (AWS, Azure, IaaS/PaaS/SaaS). Good applicable knowledge of policy and procedure development, systems analysis, Information Assurance (IA) policy, vulnerability management, and risk management Good understanding of regulatory standards including CSF, NIST, PCI, SSAE 16, SAS 70, HIPPA, FIPS 199, COBIT 5 and others as needed. Strong experience with custom scripting (python, PowerShell, bash, etc.) and process automation. Strong experience with database security testing (MSSQL, DB2, MySQL, etc.). Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nmap, Qualys etc. Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls. Experience with using ServiceNow is a plus. We look forward to receiving your application!
    $81k-110k yearly est. 3d ago
  • Senior Information Security Analyst

    The Intersect Group 4.2company rating

    Information security analyst job in Plano, TX

    The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities. Responsibilities: Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines. Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective. Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS). Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives. Translate complex information and documentation into clear and simple concepts for end-users. Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture. Stay informed about the latest cybersecurity threats, trends, and best practices. Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses. Benchmark policies against industry standards and best practices. Develop and implement governance frameworks for cybersecurity policy management. Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls. Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats. Lead and support internal and external audits and assessments of cybersecurity policies and practices. Ensure identified audit and assessment findings and actions are tracked to closure. Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicate policy requirements and updates to relevant stakeholders. Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans. Requirements: Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred). Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field. Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust). Proficiency with data analysis and reporting tools (e.g., Excel, Power BI). Relevant certifications such as CISM and/or CISA (highly desirable). Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS). Understanding of risk management concepts, control frameworks, and compliance auditing. Ability to provide consultation and recommendations to management. Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
    $86k-114k yearly est. 2d ago
  • Cyber Security Architect

    Arkadia Search Recruiting

    Information security analyst job in Arlington, TX

    Our client is growing a highly trusted Cybersecurity function with executive level support and the freedom to implement advanced solutions. This team plays a critical role in protecting company systems and data, minimizing risk, and staying ahead of evolving threats. If you're looking to escape repetitive security work and focus on strategy, architecture, and innovation…this is your opportunity. You'll be part of a growing cybersecurity architecture team with visibility across every part of the business, from financial services and data platforms to HR systems and customer facing applications. What You'll Be Doing Partner with application, platform, and network teams to embed security directly into design and delivery. Review IaC, APIs, and cloud architectures; identify risks and define secure patterns that teams can actually build against. Architect guardrails across application, cloud, and network layers-secure SDLC, WAF/CDN, and multi-cloud landing zones. Translate complex technical risks into clear, actionable recommendations for engineers and business stakeholders. Drive adoption of cloud-native controls (AWS/Azure) and logging/detection improvements that make security measurable. Collaborate with peers across Cyber, Engineering, and DevOps to strengthen patterns and scale secure delivery. What You Bring to the Table ~10+ years in IT or cybersecurity, including 3-5 years focused on AppSec or Cloud Security architecture/design. Recent hands-on experience with one or more: Terraform/CloudFormation, WAF/CDN tuning, detection engineering, or cloud-native controls. Deep understanding of application security principles, service-to-service auth, and threat modeling. Solid networking fundamentals (DNS, routing, hybrid connectivity, L7/WAF). Clear, structured communicator able to hold your own with delivery and product teams. Experience working in or with highly regulated environments (financial services a plus). Preferred Certification Certifications such as CISSP, AWS Security Specialty, or CCSK. Exposure to SIEM/SOAR tooling (Sentinel, Splunk, GuardDuty, XSOAR). Familiarity with identity modernization (SSO, OIDC, PAM) and data protection (KMS, key rotation). What You Can Expect Join a builder first culture that values practical solutions over PowerPoints. Work as part of a high-visibility architecture team influencing systems across the enterprise-data, finance, HCM, and customer facing platforms. Career progression along an individual contributor track Hybrid flexibility (3 days on site in Irving). Comprehensive benefits from day one-401(k), medical, 12 weeks paid parental leave, and strong professional development support.
    $98k-147k yearly est. 1d ago
  • Lead Salesforce Security Engineer

    Rapport Talents, a Primo Talents Company

    Information security analyst job in Plano, TX

    We are seeking a Salesforce Security Engineering Lead to strengthen the security posture of our automotive client's multi-org Salesforce ecosystem. This is a high-impact leadership role responsible for driving enterprise-wide security hardening, defining standards, leading vulnerability response efforts, and architecting secure solutions across data, apps, integrations, and identity. You will partner with cybersecurity, cloud, and Salesforce engineering teams across multiple business units to ensure the platform meets the highest levels of security, compliance, and operational excellence. Key Responsibilities: Lead enterprise-wide Salesforce security hardening initiatives across multiple BUs. Own, maintain, and evolve Salesforce security guidelines, checklists, and standards. Build strong stakeholder relationships and influence technical direction with authority. Conduct regular audits and challenge application teams on adherence to security best practices. Architect and implement security controls across authentication/authorization, data access, encryption, sharing/roles, API security, and secure development patterns. Utilize Salesforce Shield, Event Monitoring, Security Health Check, and Security Center to drive improvements. Lead rapid vulnerability remediation using war-room coordination and cross-functional alignment. Develop SIEM integration strategies with Microsoft Sentinel for real-time monitoring and automated responses. Implement protections against Data Loader abuse, bulk extraction threats, and social engineering risks. Evaluate and lead security POCs with vendors including Salesforce Security Center, Varonis, and others. Support secure development with Apex security patterns, SOQL injection prevention, and secure coding practices. Apply cloud engineering knowledge (AWS/Azure/GCP), distributed systems principles, and API security best practices. Automate processes using Python, Bash, or similar scripting languages. Communicate complex security concepts clearly to executives and technical teams. Qualifications 5+ years of hands-on Salesforce experience with deep platform/security architecture expertise. Expert knowledge of Salesforce Shield, Event Monitoring, and platform security tools. Experience leading security initiatives across multiple teams or business units. Strong scripting/automation skills (Python, Bash, etc.). Strong understanding of cloud engineering, distributed systems, and API security. Exceptional communication and leadership presence.
    $80k-110k yearly est. 1d ago
  • Security Engineer-ONLY W2(No C2C)

    VSIT LLC

    Information security analyst job in Plano, TX

    We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities. Key Responsibilities Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool. Deploy and configure Flex ID to enable passwordless, frictionless identity experiences. Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications. Ensure robust identity and access management (IAM) implementations using industry best practices. Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows. Monitor, troubleshoot, and optimize identity workflows for performance and security. Document technical solutions and provide knowledge transfer to internal teams. Required Qualifications ✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform. ✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification. ✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration. ✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively. ✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc. ✅ Strong communication and documentation skills. Preferred Qualifications Experience integrating identity services with CI/CD pipelines or DevOps environments. Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA). Background in cybersecurity, software engineering, or cloud architecture.
    $80k-110k yearly est. 2d ago
  • Security Engineer, Corporate Security

    Eden Prescott 4.2company rating

    Information security analyst job in Dallas, TX

    About the Role Eden Prescott is partnering with one of our top AI security clients, a fast-growing company that's seen significant momentum over the past year, to help them hire a Security Engineer focused on Corporate security. This is a hands-on opportunity to build and scale the foundational systems that protect an AI-driven infrastructure from evolving threats. You'll work closely with engineering, IT, and compliance teams to ensure deep visibility across environments, strengthen detection capabilities, and automate key workflows that keep the company secure as it scales. What You'll Do Partner with engineering and infrastructure teams to design and build pipelines for collecting and correlating security telemetry. Develop and maintain scalable, high-performance monitoring and detection infrastructure. Create detection strategies to identify anomalous or malicious activity and ensure critical systems remain protected. Triage, investigate, and resolve security alerts and incidents, driving them to closure with minimal business impact. Collaborate with engineering to eliminate recurring issues and continuously refine detection rules. Stay ahead of emerging threats and continuously evolve detection and response capabilities. Contribute to the strategy, risk management, and automation roadmap for security operations. Work with compliance and audit teams to maintain certifications and ensure alignment with security frameworks. Implement pragmatic, business-driven controls across multi-cloud environments. What You'll Bring 5+ years of experience in security engineering Must have EDR, Identity (MFA, PAM, phishing-resistant authentication methods), Azure governance (policies), and CWPP/CSPM. Strong track record building and scaling SOC operations in cloud-native environments. Hands-on experience with SIEM/SOAR tools (e.g., Splunk, Microsoft Sentinel, Trellix) and telemetry instrumentation. Familiarity with CNAPP solutions (e.g., Wiz, Orca, Defender, Singularity) across multi-cloud ecosystems. Fluency in scripting languages such as Python, PowerShell, or JavaScript. Automation experience with Azure Functions, Logic Apps, AWS Lambda, or Runbooks. Expertise in IAM analysis, anomaly detection, and real-time threat response across cloud environments. Strong communication, decision-making, and collaboration skills in a distributed team setting. Ability to prioritize and execute in a dynamic, high-growth environment. Bonus: familiarity with DevOps practices and experience in AWS, GCP, or Azure deployments.
    $89k-123k yearly est. 1d ago
  • Cloud Security Engineer - SRE

    Intelliswift-An LTTS Company

    Information security analyst job in Frisco, TX

    Job Posting Title: Cloud Security Engineer - SRE We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation. Technical Skills • Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling. • Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations. • Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure. • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions. • Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift). • Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs. • Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs. • Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI. • A strong understanding of HashiCorp Vault and Terraform will make you stand out. 2. Problem-Solving and Troubleshooting • Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews. • Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error. • Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications. 3. Collaboration and Communication • Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams. • Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports. • Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences. 4. Reliability and Scalability • Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability. • Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands. • Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime. 5. Security and Compliance • Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices. • Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry. Minimum Job Qualifications: • Bachelor degree in business or equivalent work experience • 10 years of previous program leadership and/or relevant consulting experience • Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle • 5+ years' experience in driving large scale data center consolidation efforts • Minimum 5 years' experience with matrix management of cross-functional processes and teams • Proficient with Project Management tools
    $80k-109k yearly est. 4d ago
  • Sr. Security Researcher - Red Team

    Corebridge Financial

    Information security analyst job in Houston, TX

    About The Role The Sr. Security Researcher is responsible for leading and executing offensive security assessments (red teaming) against the organization's systems and networks. This role will leverage advanced penetration testing, social engineering, and other offensive security techniques to identify and exploit vulnerabilities, simulate real-world threats, and enhance the organization's overall security posture. Responsibilities Lead and execute red team engagements: Develop and execute comprehensive red team assessments, including reconnaissance, vulnerability scanning, exploitation, and post-exploitation activities. Lead and mentor junior red team members, providing guidance, training, and hands-on experience. Develop and maintain red team methodologies, tools, and infrastructure. Conduct threat modeling and risk assessments to identify potential attack vectors and prioritize targets. Develop and execute social engineering campaigns, including phishing, vishing, and physical penetration tests. Vulnerability research and exploitation: Stay abreast of the latest threat intelligence, vulnerabilities, and exploits. Research and develop new exploitation techniques and tools. Conduct in-depth analysis of vulnerabilities and their potential impact. Reporting and communication: Prepare detailed and concise reports documenting red team findings, including technical details, impact assessments, and remediation recommendations. Effectively communicate findings to technical and non-technical audiences, including senior management. Present findings and recommendations at security forums and conferences (optional). Security awareness and training: Develop and deliver security awareness training programs to employees on topics such as social engineering, phishing, and secure coding practices. Conduct security awareness campaigns to raise employee awareness of security threats and best practices. Collaboration: Collaborate with other security teams (e.g., blue team, incident response) to improve overall security posture. Work with development teams to identify and remediate security vulnerabilities in applications and systems. Build and maintain relationships with external security researchers and the cybersecurity community. Skills and Qualifications Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). 5+ years of experience in cybersecurity, with 3+ years of hands-on experience in penetration testing, red teaming. Understanding of blended attacks. Proven experience leading and mentoring junior security professionals. Strong understanding of networking, systems administration, and programming concepts. Expertise in penetration testing methodologies and tools (e.g., Cobalt Strike, Outflank, Sliver, PowerShell Empire, Metasploit, Kali Linux, Nmap). Proficiency in scripting languages (e.g., Python, Ruby, PowerShell). Strong understanding of network protocols (e.g., TCP/IP, HTTP, DNS). Experience with vulnerability scanners, intrusion detection systems, and firewalls. Experience with cloud security (e.g., AWS, Azure, GCP) is a plus. Relevant security certifications (e.g., RTO I, RTO II, OSCP, OSCE, GPEN, CRTP) are highly desired. Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Ability to work independently and as part of a team. Strong attention to detail and accuracy. Ability to adapt to new technologies and challenges. Project Management.
    $81k-119k yearly est. 4d ago
  • IT Network / Security Analyst

    TXO Partners 3.9company rating

    Information security analyst job in Fort Worth, TX

    The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape. Duties and Responsibilities: Network Operations & Monitoring Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components. Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats. Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations. Travel as required (up to 25%) to support field locations. Incident Response & Troubleshooting Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation). Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience. Participate in on-call rotations for critical incident response. Network Security Administration Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement. Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data. Oversee security patching and firmware upgrades across network infrastructure. Vulnerability & Compliance Management Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses. Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations. Assist with periodic audits, reporting findings, and driving corrective actions. Threat Intelligence & Reporting Stay up to date on evolving attack vectors, especially those targeting enterprise networks. Leverage threat intelligence to proactively adjust network defenses. Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture. Collaboration & Training Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations. Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting. Knowledge, skills, and abilities: Technical Knowledge Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures. Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus). Familiarity with security technologies such as SIEM (Splunk, ELK) a plus. Hands-on experience with enterprise network firewalls and network equipment. Experience with enterprise endpoint protection. Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access. Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations. Skills Proficiency in troubleshooting complex network and security issues in enterprise environments. Strong analytical mindset with the ability to distinguish between performance-related issues and security threats. Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences. Effective multitasking and prioritization in 24/7 operations environments. Abilities Ability to balance proactive network performance management with rapid cyber threat response. Commitment to continuous learning in both network operations and cybersecurity trends. Adaptability to shifting operational demands and evolving attack landscapes. Strong teamwork skills with the discretion to handle sensitive information responsibly. Education and Experience Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred. 3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred. Relevant certifications highly desirable, such as: Network-focused: CCNA, CCNP, CompTIA Network+ Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH) Equal Opportunity Employer Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
    $64k-90k yearly est. 4d ago
  • Senior Information Security Engineer

    Compunnel Inc. 4.4company rating

    Information security analyst job in Irving, TX

    We are seeking an experienced Senior Vulnerability Management Engineer to support the organization's vulnerability management program and strengthen our overall security posture. The successful candidate will be responsible for configuring the platforms and identifying, assessing, prioritizing and coordinating the remediation of security vulnerabilities across our enterprise infrastructure. Expertise with vulnerability management platforms - such as Nucleus Security, Rapid7 InsightVM, Microsoft Defender, SentinelOne, ServiceNow, BitSight, or similar solutions is essential. This role requires collaboration with cross-functional teams to effectively reduce risk exposure. Qualifications: Vulnerability Management Experience: Minimum of five years' experience managing vulnerabilities within complex IT environments (cloud, on-premises, hybrid). Comprehensive knowledge of operating systems (Windows, Linux, Unix), networking protocols, cloud platforms (AWS, Azure, GCP). Familiarity with web application vulnerabilities (OWASP Top 10) and application security testing. Proficiency with Security Tools: Advanced expertise in leading vulnerability management and security platforms, such as Nucleus Security, Rapid7 InsightVM, Microsoft Defender for Endpoint, ServiceNow, BitSight, or equivalent. Executive Reporting: Ability to prepare and deliver clear, actionable reports for executive audiences, translating technical findings into business risks and impacts. Compliance & Risk Management: Strong understanding of regulatory frameworks and experience implementing controls to meet compliance requirements. Process Improvement & Automation: Demonstrated skill in designing, optimizing, and implementing automated workflows for vulnerability tracking, reporting, and remediation. Analytical Thinking: Exceptional attention to detail, with a track record of leveraging data analysis to drive security decisions and process improvements. Communication & Collaboration: Excellent verbal and written communication skills; ability to engage stakeholders at all levels and facilitate training or awareness initiatives as needed. Preferred Skills: Cloud Security Expertise: Familiarity with cloud security best practices and emerging threats. Project Management: Experience managing complex security projects, including tool migrations, integrations, and process enhancements. Certifications: Relevant industry certifications (e.g., CompTIA Security+, CISSP, CISM, or equivalent) are desirable. Regex (Regular Expressions): Experience using Regex for building automation rules, data parsing, and workflow customization within vulnerability management platforms. SQL: Basic understanding of SQL for querying, analyzing, and manipulating data as part of reporting or automation tasks. Purdue Network Model: Familiarity with the Purdue Enterprise Reference Architecture (PERA) or Purdue Model for Industrial Control System (ICS) network segmentation and security. Problem-Solving: Creative approach to addressing complex security challenges. Attention to Detail: Precise identification and documentation of security vulnerabilities. Security Operations: Active participation in incident response activities during exploitation events and coordination with threat intelligence teams to monitor emerging vulnerabilities and threats. Continuous Learning: Commitment to staying current with evolving threat landscapes and security technologies.
    $85k-110k yearly est. 1d ago
  • Network Security Analyst

    Cymertek

    Information security analyst job in San Antonio, TX

    Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $67k-91k yearly est. Easy Apply 60d+ ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Information security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 13h ago
  • Network Security Audit

    Stem Xpert

    Information security analyst job in Irving, TX

    Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services. We strongly believe: " If something cannot be measured, it cannot be managed. " TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core. We are an Equal Employment Opportunity Employer M/F/V/D Recognitions: 2015 -America's Fastest Growing Company by Inc.com 2015- SPARK FastTrack Award from Ann Arbor SPARK 2015 -Honoree of Diversity Focused Company by Corp! Magazine 2014- America's Fastest Growing Company by Inc.com 2014- Michigan 50 Companies to Watch 2014 - DiSciTech Award in Technology by Corp! Magazine 2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine 2014- SPARK FastTrack Award from Ann Arbor SPARK Specialties: Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration Position details: Senior Systems Engineer - Network Security Audit Location: Irving TX Duration: 6+ months Job Description: Current CCNP, CCNA, CISSP or equivalent - Experience in auditing network security compliance - 8+ years' experience with IIS - 8 + years' experience in Windows System Administration and Active Directory - Experience in network design, operational support, hands-on implementation and configuration of network infrastructure - Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms - Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing Additional Information Regards, Swati swati(dot)********************** ************
    $67k-90k yearly est. Easy Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in College Station, TX?

The average information security analyst in College Station, TX earns between $63,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in College Station, TX

$90,000
Job type you want
Full Time
Part Time
Internship
Temporary