Cyber Security Analyst
Information security analyst job in Houston, TX
We are looking for a Cyber Security Analyst to join our global security team. This role will suit a technically capable individual with experience in security operations who is looking to broaden their exposure across security monitoring, engineering, and incident response within a dynamic environment.
The role provides hands-on involvement in triaging and investigating security alerts, acting as an escalation point for the outsourced Security Operations Centre (SOC), supporting major incident response activities. The successful candidate will work closely with infrastructure and network teams to manage and optimise endpoint, email, identity, and vulnerability management platforms, while contributing to continuous improvement of the organisation's security posture.
This role offers the opportunity to evaluate and transition between security tools, maintain policy continuity and develop a broad, practical skillset across enterprise cyber security functions.
Business Overview
Established in 1783, ED&F Man is an employee-owned agricultural commodities merchant with 2,800 people in 43 countries and annual revenue in excess of $8bn. We trade sugar, coffee, molasses, animal feed and fish oils. Corporate responsibility is ingrained in our culture. We are passionate about sustainable production, take care to limit the environmental impact of our operations and actively support the communities in which we work.
Key Accountabilities
Act as the escalation point for the outsourced SOC, receiving and triaging alerts that require deeper investigation.
Conduct thorough investigations to produce high-quality, actionable insights for incident resolution.
Participate actively in major security incidents, contributing to containment, eradication and recovery efforts
Document incident timelines and contribute to post-incident reviews and lessons learned.
Respond to detections, triage alerts and update SOC tickets with investigation findings
Maintain and update policies in line with vendor best practice and internal Change Advisory Board protocols.
Monitor agent health, audit version compliance and remediate orphaned or non-compliant clients.
Attend monthly vendor meetings to review support cases and incorporate best practice guidance.
Design and refine SOC playbooks and response actions, evaluating new security technologies through structured proof-of-concept trials and creating scoring matrices to compare vendors.
Manage block and safe listings to maintain email hygiene, troubleshooting false positives and tune detection rules.
Perform email investigations as required in response to phishing or BEC attempts, producing monthly vulnerability reports and prioritising remediation efforts based on risk.
Work with infrastructure and application teams to test patches and drive vulnerability counts down.
Attend monthly TAM meetings to review support cases and best practices.
Maintain agility to substitute security products as business requirements evolve, ensuring policy continuity throughout transitions.
Skills and Experience:
5+ years' experience in a Cyber Security Analyst or similar role, with strong incident response and major incident handling expertise.
Hands-on experience with EDR (alert triage, policy management, sensor deployment), preferably CrowdStrike Falcon.
Experience developing SOC playbooks, response actions, and running proof-of-concept evaluations and vendor comparisons.
Confident, proactive communicator able to engage senior stakeholders, clearly explain complex security issues, and recommend actions.
Collaborative and approachable, building trust with technical peers and supporting service desk and front-line teams.
Calm, effective, and resilient under pressure, particularly during security incidents in a front-facing role.
Formal qualifications not essential; proven hands-on experience and delivery record valued.
Technical Capabilities:
Experience with SIEM platforms (e.g. Rapid7), Email Security and Data Security/DLP solutions (e.g. Varonis).
Strong knowledge of Entra ID security features including Conditional Access and PIM, plus familiarity with PAM tools including BeyondTrust, Osirium and Okta.
Solid networking fundamentals (TCP/IP, DNS, firewalls, proxies, SSL/TLS) and vulnerability management experience (Qualys/Rapid7 preferred).
Cloud security experience across Azure and/or AWS.
Scripting skills in Python and/or AutoIT for automation and tooling.
Desirable certifications include CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and relevant vendor certifications (e.g., CrowdStrike, Qualys, Palo Alto).
We recognise that talent comes in many forms, and we value potential just as much as experience. If this role excites you but you don't meet every requirement, we still encourage you to apply.
Our Offer
We provide a fast-paced, stimulating and truly global environment, which will stretch your abilities and channel your talents. We also offer competitive salary and benefits combined with outstanding career development opportunities in one of the global leaders in soft commodity trading.
Our Values
Respect, Integrity, Meritocracy, Client Focus, Entrepreneurship
Our values define who we are. They are the fundamental beliefs that determine our actions and guide our behaviour. They influence the way we communicate and collaborate, and define the way we engage with our clients, partners, and communities. Our values are underpinned by a set of essential behaviours, which form part of our performance management approach. Delivering on our objectives is very much about ‘what' we do, but these essential behaviours also provide a guide and measure for ‘how' we do things. Our performance essentials are Take Initiative, Self‐Management, Deliver Results and Collaboration.
Our Commitment
We are committed to creating and sustaining an inclusive and diverse work environment where all employees are treated with dignity and respect. We are committed to promoting equal opportunities in employment and are focussed on actively building and developing diverse teams. All qualified applicants will receive equal treatment without regard to race, colour, sex, gender, age, religion or belief, ethnic or national origin, marital or civil partner status, physical or mental disability, military or veteran status, sexual orientation, gender reassignment (identity, gender expression), genetic information or any characteristic protected by local law.
We are willing to make any reasonable adjustments throughout our recruitment process.
To apply you must have the right to work for the provided location.
Cyber Security Analyst
Information security analyst job in Houston, TX
Cybersecurity Analyst (FTE, Onsite Houston)
Our client is an Oil & Gas Security professional to support day-to-day security operations, tool deployment, and infrastructure improvements.
Contract-to-hire: 6 months contract, converting to FTE after this period.
Responsibilities:
Deploy, configure, and enhance cybersecurity tools.
Support operations across firewalls, EDR, PAM, vulnerability management.
Collaborate across departments to enhance security posture.
Requirements:
Familiarity with tools like CrowdStrike, CyberArk, Rapid7, Zscaler, Security Onion.
Hands-on knowledge of firewalls, network security, endpoint protection.
SANS/GIAC certs preferred
Please apply with an up-to-date resume
Cyber Security Analyst
Information security analyst job in Houston, TX
Cybersecurity Analyst - Level II / Senior (Deployment & Engineering Focus)
Houston, TX
Contract to Hire
Sector: Oil & Gas
We're hiring a seasoned, hands-on Cybersecurity Analyst (Level II or Senior) to drive the build-out and continuous improvement of our security tooling ecosystem. This is primarily an engineering and deployment role-not a SOC or pure incident-response position. You'll own the implementation, optimization, and maturation of critical security controls across the enterprise.
What You'll Own
Lead the deployment, configuration, tuning, and upgrade of core cybersecurity technologies
Particular emphasis on Privileged Access Management (PAM) and Endpoint Detection & Response (EDR) platforms (experience here is highly valued)
Identify gaps, propose solutions, and execute security infrastructure enhancements at a rapid pace
Automate repetitive tasks, build integrations, and streamline processes wherever possible
Partner with other security engineers, infrastructure teams, and application owners to embed security into the environment
Provide occasional tier-3 escalation support for incidents when needed (not primary duty)
What You Bring
Proven track record deploying and managing enterprise security tools in real-world environments
Deep hands-on experience with PAM and/or EDR solutions strongly preferred (e.g., CyberArk, BeyondTrust, Delinea, CrowdStrike, SentinelOne, Microsoft Defender, Carbon Black, etc.)
Strong automation mindset-scripting (Python, PowerShell, Bash) and infrastructure-as-code experience is a big plus
Ability to operate independently, prioritize ruthlessly, and deliver results in a fast-moving environment
Adaptable and eager to work across a wide variety of security technologies
SANS GIAC certifications (GSEC, GCIA, GNFA, GCIH, GMON, etc.) strongly preferred
Degree not required-demonstrated capability is what matters
If you live for building and hardening security controls, move fast, hate manual work, and want to see your deployments protect the enterprise in real time, we want to talk to you.
Application Security Analyst
Information security analyst job in Plano, TX
Application Security Analyst Duration: 12 months Interview process: 1st round virtual & 2nd round onsite Job Description: Client is looking for:
Client is seeking a skilled and proactive Application Security Analyst to integrate security practices into client's DevOps processes.
The ideal candidate will work closely with development and operations team to ensure secure software delivery pipelines, automate security controls, and foster a culture of shift left in the organization.
Candidate will be doing:
Design, implement, and maintain secure CI/CD pipelines.
Integrate security tools (SAST, DAST, SCA, etc.) into development workflows.
Collaborate with development and operations teams to remediate vulnerabilities.
Automate security testing and compliance checks.
Monitor and respond to security incidents in cloud and container environments.
Develop and enforce security policies, standards, and procedures.
Stay current with emerging security threats and DevSecOps best practices.
Requirements:
Qualifications/ What candidate bring (Must Haves) - Highlight Top 3 to 5 skills:
Bachelor's degree in Computer Science, Cybersecurity, or related field.
3 plus years of experience in DevOps, Security Engineering, or related roles.
2 to 3 years of security experience. Overall, 6 years
Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
Development knowledge on Java, Python, .Net, etc
Experience with security tools (e.g., Veracode, GHAS, Orca).
Proficiency in scripting languages (e.g., Python, Bash).
Familiarity with containerization and orchestration (Docker, Kubernetes).
Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Understanding of secure coding practices and application security principles.
Knowledge of Infrastructure as Code (Terraform, Ansible).
About PTR Global: PTR Global is a leading provider of information technology and workforce solutions. PTR Global has become one of the largest providers in its industry, with over 5000 professionals providing services across the U.S. and Canada. For more information visit *****************
At PTR Global, we understand the importance of your privacy and security. We NEVER ASK job applicants to:
Pay any fee to be considered for, submitted to, or selected for any opportunity.
Purchase any product, service, or gift cards from us or for us as part of an application, interview, or selection process.
Provide sensitive financial information such as credit card numbers or banking information. Successfully placed or hired candidates would only be asked for banking details after accepting an offer from us during our official onboarding processes as part of payroll setup.
Pay Range: $75- $80/hr. W2
The specific compensation for this position will be determined by several factors, including the scope, complexity, and location of the role, as well as the cost of labor in the market; the skills, education, training, credentials, and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits, including medical, dental, vision, and 401K contributions, as well as PTO, sick leave, and other benefits mandated by applicable state or localities where you reside or work.
If you receive a suspicious message, email, or phone call claiming to be from PTR Global, do not respond or click on any links. Instead, contact us directly at ***************. To report any concerns, please email us at *******************
Data Security Analyst
Information security analyst job in Austin, TX
Hi All,
*** Greetings from My3tech ***
Role: Data Security Analyst 2
Duration: 6+ Months
Minimum Qualifications
Years
Skills / Experience
3 Experience in a GRC, cybersecurity, or compliance role
3 Hands-on experience with GRC platforms (Diligent preferred)
Strong understanding of NIST CSF 2.0, HIPAA, and state-level frameworks (Texas Cybersecurity Framework)
Experience designing workflows and notifications within GRC tools
Excellent communication and stakeholder engagement skills
Preferred Qualifications
Years
Skills / Experience
Familiarity with risk management methodologies
Certifications such as CISA, CRISC, CISSP, or CGRC
Security Analyst
Information security analyst job in Arlington, TX
Title: Security Analyst
Employment Type: Contract to Hire
Duration: 3 months to Hire
Onsite: yes, Monday-Friday
Must be Authorized to work in the USA: No sponsorship
Must Have: Strong AD background.
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
Active Directory Sites and Services
o Management of sites and subnets
Active Directory Domains and Trusts
o Management of domain trust configuration
Group Policy Management
o Troubleshooting and cleanup of GPOs
Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
Ability to participate in a weekly call rotation
IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
Mentoring and Training
o .Responsible for the mentoring of Security Administrators
Ability to travel overnight
Qualifications
High school diploma or general education degree (GED)
One to four years' experience in an IT related field
knowledge of IT Security Operations and Forensic Operations
Experience with computer networks
Experience with project management and delegation
Business communication and collaboration skills
Documentation skills
Ability to work well within a team, and work alone to accomplish tasks independently
Ability to interpret research into solutions to actual problems
Customer Service skills
Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
Proficiency with MS Office and email
Preferred Qualifications
Bachelor's Degree in Cyber Security discipline preferred
Physical Security/Information Assurance Specialist
Information security analyst job in San Antonio, TX
Come make your mark with Watermark!
🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.
🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do.
💲 COMPETITIVE BENEFITS PACKAGE to address our employees' physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first!
Physical Security/Information Assurance Specialist
Watermark is seeking an experienced Physical Security/Information Assurance Specialist. The ideal candidate is passionate about security, demonstrates strong integrity and ethics, and excels in communication and attention to detail. This position provides physical security (PS) and information assurance (IA) support for collateral, SCI and SAP systems in accordance with JSIG and other DoD and national guidance for facilities with internal networks and guest systems.
In this role you will….
Responsible to the Chief of Security for ensuring compliance with DCID and JSIG physical security and IA requirements and maintaining accreditation documentation
Conduct or manage physical and technical security (TEMPEST/TSCM) actions and procedures
Conduct preconstruction reviews and makes recommendations for compliance with guidance for construction, expansion and modifications of facilities
Assist the Information Assurance Manager with implementation of the information assurance program
Author, review and maintain Certification and Accreditation documentation
Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility
Enforce physical security controls of electronic devices and prohibited items; conduct entry/exit inspections
Identify IA and physical security vulnerabilities and ensure JAFAN 6/9 compliance
Conduct periodic IA & PS self-inspections and implement corrective actions
Review, track and conduct IA new user and refresher training
Implement local media control policies and procedures
Additional duties as assigned
Experience Requirements:
5-7 years related experience
Security Fundamentals Professional Certification (SFPC) counts towards 1 years of experience
Special Program Security Certification (SPSC) counts towards 1 years of experience
Maximum equivalent experience for SPED Certifications is no more than 3 years
Education Requirements:
Bachelor's degree in a related area OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certification Requirements:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 1 within 6 months of the date of hire
Security Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other requirements:
Reports to a physical location which occasionally requires the ability to traverse between buildings
May require sedentary work at least 50% of the time
Ability to manage stress with a high degree of maturity/professionalism
Demonstrated critical thinking and leadership skills and the ability to work well with others
Effective verbal and written communication skills
Watermark provides salary ranges with job postings in states where it is legally required; any other salary ranges associated with our postings are third party estimates and may not be an accurate reflection of Watermark's total compensation package. Multiple considerations are taken into account when determining the final salary/hourly rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor Categories. Central to Watermark's employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.
Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws.
Chief Information and Security Officer
Information security analyst job in Dallas, TX
Chief Information Security Officer
Chief Information Security Officer
The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position.
Required Knowledge, Skills, and Abilities
Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies.
Must also demonstrate strong written communication skills.
Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.
Must possess strong problem-solving skills to effectively influence decision-making in key negotiations.
Ability to perform hands-on, operational work when necessary.
Ability to maintain the security or integrity of the critical infrastructure of the institution.
Qualifications
Minimum Qualifications
Bachelor's degree and additional education in Information Security.
Prior managerial experience in Information Technology and service context.
Professional IT security management certification (e.g., CISSP, CISM).
10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability.
Experience running a security program in a complex environment.
Strong understanding of security protocols and operations.
Knowledge of current IT risks and experience implementing security solutions.
Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP.
EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization.
Bilingual or multilingual preferred.
***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.***
Key Responsibilities
IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction.
IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats.
Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework).
Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response.
Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts.
Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies.
Training: Develop and implement security training for faculty and staff.
Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches.
Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations.
Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience.
Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response.
Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies.
Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention.
Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year.
The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance.
Physical Requirements
Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
Network Security Analyst
Information security analyst job in Austin, TX
Work involves assisting in supervision and service delivery control of the TxDOT Cybersecurity Operations tools team comprising of seven (8) staff augmentation contractors. Employee will ensure real-time data, metrics, and correlated incident input to the CSOC Incident Response Team. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment.
DUTIES
Employee will assist in supervising and managing the TxDOT Cybersecurity Operations Tools Team; will work under the management of the TXDOT Cybersecurity Officer; will be responsible for administration, maintenance, and resilience of Cybersecurity tools; real-time data, metrics, and correlated incident input to the CSOC Manager for use in daily monitoring and incident response; and support of daily operations and incident response activities. Employee will provide tooling input for end of month and annual reporting requirements as dictated by TxDOT. As appropriate, Employee will provide recommendations for improvements in daily operations, resilience, and Cybersecurity operational maturity. Employee will be responsible for planning and management of tooling deployment and operating\managing the security tool sets. Employee will be responsible for assisting in managing ongoing agency cybersecurity programs (e.g. Tabletop exercises).
Team members will provide services in the following areas:
• Custom Managed Scanning Services
• Custom Managed Endpoint Protection
• Managed CISCO Secure Network Analytics Service
• Security Information and Event Management (SIEM) administration
Years Skills/Experience
8 years' Technical Team Management experience
8 years' Deployment and configuration of Network Security monitoring and incident response tools (EDR, Scanners, SIEM, Netflow, etc)
8 years' Administration of Network Security monitoring and incident response tools (EDR, Scanners, SIEM, Netflow, etc)
8 years' Participation and experience in intrusion detection and incident response activities
8 years' Effective, professional business communication and reporting
Years Skills/Experience
8 years' Experience with the CISCO security suite of tools
8 years' Experience with Microsoft EDR tools
8 years' Experience with Microsoft Sentinel
8 years' Experience with the Tenable suite of tools
Business Information Security Officer (BISO) Fortune 100 company Direct Hire
Information security analyst job in Houston, TX
About the Role
We are seeking a highly strategic and business-minded Business Information Security Officer (BISO) to serve as the primary liaison between our enterprise security organization and key business units. As a Fortune 100 company operating at global scale, we manage complex distribution and supply chain environments that require world-class security, risk governance, and operational excellence.
The BISO will help shape and execute a unified security strategy that aligns with business objectives, ensures regulatory compliance, and strengthens our cyber resilience across a diverse technology and operational footprint.
Key Responsibilities
Strategic Security Leadership
Act as the trusted security advisor to senior business leadership, translating technical risks into clear business impacts.
Drive alignment between corporate security strategy and business-unit initiatives, ensuring security enables-not hinders-innovation and growth.
Represent business needs within enterprise cybersecurity governance forums.
Risk Management & Compliance
Identify, assess, and prioritize cybersecurity risks across business units, including emerging threats to distribution operations, supply chain systems, and large-scale logistics platforms.
Ensure compliance with internal policies, industry standards, and regulatory frameworks (e.g., NIST CSF, ISO 27001, SOX, PCI, data privacy regulations).
Oversee remediation plans and ensure timely closure of audit and assessment findings.
Program & Policy Execution
Support implementation of enterprise-wide security programs (IAM, data protection, vulnerability management, cloud security, OT/ICS security, incident response).
Champion best practices for secure architecture, application development, and third-party vendor management.
Coordinate with IT, OT, and business operations teams to drive adoption of security controls across complex distributed environments.
Incident Response & Business Continuity
Liaise between business leadership and Cyber Incident Response teams during major incidents or disruptions.
Ensure business units are prepared with effective response plans, communication protocols, and recovery strategies.
Stakeholder Engagement & Education
Build strong partnerships with executives, technology leaders, and operational teams.
Deliver targeted security awareness and training for business units.
Communicate risk posture and security metrics to leadership through dashboards, reports, and briefings.
Qualifications
Required
8+ years of experience in cybersecurity, risk management, or information security leadership roles.
Proven experience supporting large-scale, distributed enterprise environments (preferably in supply chain, logistics, distribution, or retail).
Strong understanding of cybersecurity frameworks, governance, and risk methodologies.
Ability to interact with C-suite executives, translate complex technical issues into business language, and influence decision-making.
Experience coordinating cross-functional initiatives in complex, highly regulated organizations.
Preferred
Experience within a Fortune 100 or Fortune 500 corporate environment.
Background working with OT/ICS, distribution center technologies, or supply-chain automation systems.
Relevant certifications: CISSP, CISM, CRISC, CISA, CGEIT, or similar.
Bachelor's degree in Cybersecurity, Information Systems, Business, or related field; Master's degree a plus.
Competencies
Executive communication and presentation skills
Strategic thinking with strong business acumen
Ability to drive change across matrixed organizations
Strong analytical, risk evaluation, and problem-solving capabilities
Collaborative leadership with a focus on partnership and enablement
Why Join Us?
Influence security strategy at a world-class, Fortune 100 distribution leader
High-visibility role with direct impact on enterprise risk posture
Opportunity to shape security across cutting-edge logistics, cloud, data, and automation platforms
Competitive compensation, comprehensive benefits, and career growth at a global scale
Red Team Cyber Security Engineer
Information security analyst job in Dallas, TX
One of our key clients within the financial industry is looking for a Red Team Cyber Security Engineer for a full-time position.
This position will be 2 days on-site in Chicago or Dallas and 3 days remote. Please note, only US citizens or Green-card holders are eligible for this position.
Job Description:
Perform cloud assessments, web application penetration testing and mobile application testing
Carry out reviews of security, network, applications, and cloud environments
Plan/Design security activities with automation as the primary driver to align with the security strategy
Ensure alignment of security controls, supporting services and related policies with regulations and industry-standard best practices
Assist management with the improvement of policy/procedure to support Cloud Security Engineering
Participate in developing a security roadmap, adopt security best practices, and implement new ideas and innovations according to the industry trends
Experience required:
Penetration Testing experience within Network, Application, Web Application or Mobile Applications
Experience cloud environments (AWS, Azure, IaaS/PaaS/SaaS).
Good applicable knowledge of policy and procedure development, systems analysis, Information Assurance (IA) policy, vulnerability management, and risk management
Good understanding of regulatory standards including CSF, NIST, PCI, SSAE 16, SAS 70, HIPPA, FIPS 199, COBIT 5 and others as needed.
Strong experience with custom scripting (python, PowerShell, bash, etc.) and process automation.
Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nmap, Qualys etc.
Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.
Experience with using ServiceNow is a plus.
We look forward to receiving your application!
Cyber Security Engineer
Information security analyst job in Dallas, TX
• DevSecOps' expertise in building and supporting security solutions for Windows, Linux, above mentioned platforms, including services such as Enterprise Vulnerability Management, data protection, privacy and compliance, network protection.
• Building and deploying security solutions using technologies such as Docker, Kubernetes, and GIT Hub.
• Experience in low code environments such as Appian and Microsoft Power Platforms is mandatory.
• Experience with Alteryx ETL and Workflow Designer platform is plus.
• Experience with Identity and Access, Endpoint, Vulnerability management and other cybersecurity automation workflows.
• Experience writing Automation scripts in Python and deploying them leveraging APIs.
• Experience with AI enabled automation workflows.
• Experience with Agile methodology and Atlassian tools including JIRA and Confluence.
• Communicating with various audiences, including business leaders, engineers, clients, and team members, with excellent ability to convey information that is relevant
to the audience.
• Written communication for excellent documentation and reporting.
• Outstanding teamwork across multidiscipline plan-build-run teams.
• Applying your understanding and expertise with systems automation platforms and technologies.
• Automating security controls, data, and processes to provide metrics and operational support.
• Employing cloud-based APIs when suitable to integrate and orchestrate across various systems in the automation workflow.
• Developing and delivering solutions using Agile methodology.
“Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
Senior Information Security Analyst
Information security analyst job in Plano, TX
The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective.
Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives.
Translate complex information and documentation into clear and simple concepts for end-users.
Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture.
Stay informed about the latest cybersecurity threats, trends, and best practices.
Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmark policies against industry standards and best practices.
Develop and implement governance frameworks for cybersecurity policy management.
Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls.
Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Lead and support internal and external audits and assessments of cybersecurity policies and practices.
Ensure identified audit and assessment findings and actions are tracked to closure.
Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities.
Communicate policy requirements and updates to relevant stakeholders.
Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans.
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred).
Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency with data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA (highly desirable).
Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Understanding of risk management concepts, control frameworks, and compliance auditing.
Ability to provide consultation and recommendations to management.
Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
IT Application Analyst (Finance)
Information security analyst job in Plano, TX
The Finance Application Analyst plans, implements, and enhances finance systems with a primary focus on SAP FICO. Partnering with internal stakeholders and vendors, this role translates business requirements into functional specifications, configures SAP solutions, and supports end users through training and change management. The analyst also ensures system reliability, performance, and security through proactive monitoring and best practice governance.
General Job Duties and Responsibilities:
Finance System Planning & Implementation: Lead/participate in roadmap, fit gap, and deployment activities; coordinate with internal teams and vendors for on time delivery.
Solution Design & Configuration: Configure and enhance GL, AP, AR, AA, Cost/Profit Center accounting, and related integrations per current design and business requirements.
Requirements & Specifications: Elicit and analyze business needs; create functional specs (incl. integrations, reports, forms, and controls); collaborate with developers on build, test, and release.
Testing & Cutover: Define test scenarios/scripts, support UAT, manage defect triage, and assist with data migration and cutover planning.
Support & Training: Provide tier2/3 support, knowledge articles, and end-user training for new implementations or changes.
Reliability, Performance & Security: Monitor jobs/interfaces, data integrity, and access controls; partner with IT security/compliance on audit readiness and best practices (e.g., SOX related controls where applicable).
Documentation & Governance: Maintain configuration documentation, process flows, and change logs; follow change management procedures and SDLC standards.
Cross Functional Collaboration: Work with Finance, Accounting, Procurement, and IT to optimize processes and resolve issues; align deliverables with close cycles and reporting deadlines.
Continuous Improvement: Identify automation and analytics opportunities (e.g., Fiori, workflow, dashboards) to improve accuracy, cycle time, and user experience.
Other duties as assigned.
Supervisory Responsibilities:
This job has no supervisory responsibilities
Qualifications:
Bachelor's degree in Computer Science, Information Technology, or related field preferred, or equivalent work experience in SAP FICO implementation.
Minimum 5 years of relevant hands-on SAP FICO implementation (design, configuration, testing, deployment, and support) experience, preferably in a eMobility, consumer electronics, or powersports.
Strong understanding of core finance processes: chart of accounts, invoicing, payments, vendor management, period close, and compliance.
Ability to manage multiple assignments in a fast-paced environment; strong troubleshooting and stakeholder communication.
Experience with SAP S/4HANA (Fiori), CO‑PA, tax and bank integrations, and IDoc/Interface troubleshooting is highly preferred.
Exposure to adjacent SAP modules (MM/SD) and basic ABAP debugging for issue isolation is a plus.
Experience with SOX controls, security/role design, and audit support is a plus.
Familiarity with project tools (e.g., JIRA/Azure DevOps) and process mapping (e.g., Visio/BPMN) is a plus.
Bilingual in English and Mandarin is a plus.
Physical Demands:
This role is primarily office-based and involves prolonged periods of computer work, frequent virtual meetings, and regular collaboration across departments and vendors. Occasional off-hours support may be required during cutovers, month end activities, or critical releases. Light lifting of laptops or documents (up to 25 pounds) and occasional travel for workshops or go lives may be necessary. Specific vision abilities required for this job include close vision, color vision, and the ability to adjust focus.
EEO Statement:
Segway Inc. is committed to providing Equal Opportunity in Employment to all applicants and employees regardless of race, color, religion, gender, age, national origin, military status, veteran status, handicap, physical or mental disability, sexual orientation, gender identity, genetic information, or any other characteristic protected by law.
Senior Security Engineer - Privileged Access Management
Information security analyst job in Dallas, TX
Glocomms is partnered with an integral financial services corporation seeking a Security Engineer focused on Privileged Access & Automation to design and maintain secure authentication, authorization, and secrets management systems across on-prem and cloud environments. This role focuses on privileged access management, security architecture, and automation, leveraging AI-based capabilities to ensure operational integrity and compliance.
Responsibilities
Implement and manage privileged access systems (CyberArk, HashiCorp Vault) and secrets lifecycle management.
Design and support authentication/authorization frameworks (Active Directory, oAuth 2.0, OIDC, AWS IAM, PKI, certificates).
Maintain operational integrity through patching, version control, upgrades, troubleshooting, and break-fixes.
Apply security as code principles using Terraform, Ansible, Jenkins pipelines, and CI/CD deployments.
Develop automation scripts in Go, Bash, Python, PowerShell for secure integrations.
Integrate AI-based security capabilities for detection, remediation, and automated workflows.
Collaborate cross-functionally with engineering, cloud, and compliance teams; participate in 24x7 operational support.
Qualifications
5+ years in security engineering, architecture, or operations within complex environments.
Hands-on experience with CyberArk, HashiCorp Vault, PKI, and privileged access methodologies.
Strong knowledge of Active Directory, Kerberos, LDAPS, oAuth 2.0, OIDC, and AWS IAM.
Familiarity with Kubernetes security, HSMs, and cloud ecosystems.
Proficiency in Go, Bash, Python, PowerShell; experience with Terraform, Ansible, Jenkins.
Understanding of security architecture principles, confidentiality, integrity, availability, and compliance frameworks.
Exposure to AI-enabled security tools and automation strategies preferred.
This is a hybrid role requiring 3 days per week onsite in Dallas, TX. Candidates must be fully authorized to work in the United States. Unfortunately, visa sponsorship is not available for this role.
Applications must include candidate's full name (first and last) and contact information in order to be considered.
Security Engineer-ONLY W2(No C2C)
Information security analyst job in Plano, TX
We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities.
Key Responsibilities
Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool.
Deploy and configure Flex ID to enable passwordless, frictionless identity experiences.
Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications.
Ensure robust identity and access management (IAM) implementations using industry best practices.
Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows.
Monitor, troubleshoot, and optimize identity workflows for performance and security.
Document technical solutions and provide knowledge transfer to internal teams.
Required Qualifications
✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform.
✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification.
✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration.
✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively.
✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc.
✅ Strong communication and documentation skills.
Preferred Qualifications
Experience integrating identity services with CI/CD pipelines or DevOps environments.
Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA).
Background in cybersecurity, software engineering, or cloud architecture.
Cloud Security Engineer - SRE
Information security analyst job in Frisco, TX
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
IT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Cloud Security Engineer
Information security analyst job in Dallas, TX
An exciting opportunity for an experienced Cloud Security Engineer to join a global SaaS company, in a hyper growth stage. This is a crucial customer-facing role where you will be instrumental in designing, implementing, and securing complex cloud environments for clients across Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Services (AWS).
Key Responsibilities:
Cloud Security Operations
Perform penetration testing activities
Network Security Expertise
Firewall & WAF Management
SaaS Security Best Practice
SIEM Integration & Optimization
Customer Engagement & Presentation
Requirements:
8+ years of cybersecurity experience
4+ years cloud security engineering
Strong expertise with Google Cloud Platform (GCP)
Strong practical experience with Microsoft Azure and AWS
Expertise in SaaS applications
Demonstrable experience with firewall management and WAFs
Hands-on experience with SIEM platforms
CISSP Certified
Principal IT Governance Analyst
Information security analyst job in Coppell, TX
***We are unable to sponsor for this permanent full-time W2 role***
is bonus eligible***
Prestigious Financial Company is currently seeking a Principal IT Governance Analyst. Candidate will be responsible for the development, implementation and oversight of programs within IT. Ensures the overall effectiveness and adherence to the governance framework and ongoing evaluation of IT's internal control environment.
Responsibilities:
Partner cross-functionally to analyze control data and drive continuous improvement in IT delivery processes and control frameworks
Develop sophisticated dashboards and analytical reports that demonstrate control adherence and highlight strategic improvement opportunities
Spearhead the development of key performance indicators (KPIs), key risk indicators (KRIs), and advanced metrics to empower IT leadership decision-making
Design and implement standardized communication templates and executive-level presentation materials that effectively convey complex technical information
Create comprehensive reports for senior and executive management that drive informed decision-making and strategic planning
Serve as a trusted advisor to stakeholders on control-related matters, providing clear guidance and recommendations
Lead multifaceted projects involving multiple systems, ensuring alignment with governance frameworks and regulatory requirements
Perform comprehensive gap analyses between existing controls and regulatory requirements, mapping processes to industry standards
Establish and maintain continuous monitoring frameworks to ensure ongoing compliance and control effectiveness
Provide subject matter expertise across various IT process domains
Collaborate closely with compliance and internal audit teams to ensure alignment of IT controls with regulatory expectations
Support remediation activities for identified findings, working with key IT stakeholders to implement effective solutions
Serve as a governance liaison during regulatory examinations and audit engagements
Identify and recommend emerging technologies and tools that enhance efficiency, quality, and security across IT systems
Anticipate emerging risks and proactively develop mitigation strategies
Lead special IT projects as needed to address organizational priorities
Apply strategic thinking to complex technical challenges, supporting teams in developing innovative solutions
Perform other duties as assigned that align with organizational objectives and department needs
Qualifications:
[Required] Strong analytical and data reporting skills
[Required] Ability to work across multiple levels of management
[Required] Able to succeed in fast-paced environment with frequent changes
[Required] Comfortable communicating with both technical and non-technical audiences
[Required] Takes the initiative to research, learn and deliver; anticipates the play
[Required] Humble, collaborative, and focused on making sure the entire team succeeds
[Required] Excellent oral and written communication skills
[Required] Working knowledge and experience of IT control frameworks and industry standards such as ITIL, COBIT, NIST Cybersecurity Framework (CSF), or similar industry-accepted standards and the principles embedded within them
[Required] Excel
[Required] PowerPoint
[Required] Dashboard reporting tools (e.g. Tableau and JIRA)
[Preferred] Experience with Security and DevOps tools
[Preferred] Integrated GRC management solutions such as Archer
Education and/or Experience:
[Required] BS degree in Computer Science, similar technical field, or equivalent practical experience
[Required] 10+ years of work experience
[Preferred] Work experience in the capital markets or information technology industry