Director Information Security
Information security analyst job in Richardson, TX
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Chief Information and Security Officer
Information security analyst job in Dallas, TX
Chief Information Security Officer
Chief Information Security Officer
The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position.
Required Knowledge, Skills, and Abilities
Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies.
Must also demonstrate strong written communication skills.
Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.
Must possess strong problem-solving skills to effectively influence decision-making in key negotiations.
Ability to perform hands-on, operational work when necessary.
Ability to maintain the security or integrity of the critical infrastructure of the institution.
Qualifications
Minimum Qualifications
Bachelor's degree and additional education in Information Security.
Prior managerial experience in Information Technology and service context.
Professional IT security management certification (e.g., CISSP, CISM).
10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability.
Experience running a security program in a complex environment.
Strong understanding of security protocols and operations.
Knowledge of current IT risks and experience implementing security solutions.
Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP.
EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization.
Bilingual or multilingual preferred.
***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.***
Key Responsibilities
IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction.
IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats.
Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework).
Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response.
Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts.
Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies.
Training: Develop and implement security training for faculty and staff.
Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches.
Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations.
Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience.
Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response.
Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies.
Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention.
Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year.
The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance.
Physical Requirements
Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
Cyber Security Engineer
Information security analyst job in Dallas, TX
Hiring: Cybersecurity Engineer
Duration: 12 months contract
About the Role
We are seeking an experienced Lead Cybersecurity Engineer to join our dynamic team and drive secure-by-design principles across our cloud and application environments. In this role, you will collaborate closely with development teams to identify, assess, and remediate security vulnerabilities, ensuring robust protection across our AWS and Azure ecosystems.
Key Responsibilities
Lead Security by Design and integrate security throughout the SDLC.
Perform security defect management - analyze, validate, and consult on issues found via tools like CodeQL, Rapid7, penetration tests, and bug bounty programs.
Provide engineering consulting to developers, architects, and product teams on secure design and implementation best practices.
Manage tool enablement and monitoring for automated vulnerability detection tools (CodeQL, Rapid7, etc.).
Coordinate security testing and onboarding, including penetration testing and assurance assessments.
Technical Skills
Required:
Application Security (OWASP, CWE/CVE, SANS 25)
Enterprise Security Architecture, Threat Modeling, and Risk Analysis
SDLC, DevSecOps, and API Security
Cloud Security (AWS, Azure)
SCA / SAST / DAST tools
Hands-on development experience in Java, Python, .NET, or JavaScript
Automation and scripting for security processes
Security certifications preferred (CISSP, CCSP, GWAPT, GWEB, AWS Certified Security, etc.)
Preferred:
Web Services Security
CSSLP, GISCP, or other advanced security certifications
Experience integrating security technologies in enterprise environments
#Cybersecurity #AWS #DevOps #Python #SDLC #IaC #SAST #DAST #CISSP #CCSP
Red Team Cyber Security Engineer
Information security analyst job in Dallas, TX
One of our key clients within the financial industry is looking for a Red Team Cyber Security Engineer for a full-time position.
This position will be 2 days on-site in Chicago or Dallas and 3 days remote. Please note, only US citizens or Green-card holders are eligible for this position.
Job Description:
Perform cloud assessments, web application penetration testing and mobile application testing
Carry out reviews of security, network, applications, and cloud environments
Plan/Design security activities with automation as the primary driver to align with the security strategy
Ensure alignment of security controls, supporting services and related policies with regulations and industry-standard best practices
Assist management with the improvement of policy/procedure to support Cloud Security Engineering
Participate in developing a security roadmap, adopt security best practices, and implement new ideas and innovations according to the industry trends
Experience required:
Penetration Testing experience within Network, Application, Web Application or Mobile Applications
Experience cloud environments (AWS, Azure, IaaS/PaaS/SaaS).
Good applicable knowledge of policy and procedure development, systems analysis, Information Assurance (IA) policy, vulnerability management, and risk management
Good understanding of regulatory standards including CSF, NIST, PCI, SSAE 16, SAS 70, HIPPA, FIPS 199, COBIT 5 and others as needed.
Strong experience with custom scripting (python, PowerShell, bash, etc.) and process automation.
Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nmap, Qualys etc.
Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.
Experience with using ServiceNow is a plus.
We look forward to receiving your application!
Senior Information Security Analyst
Information security analyst job in Plano, TX
The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective.
Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives.
Translate complex information and documentation into clear and simple concepts for end-users.
Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture.
Stay informed about the latest cybersecurity threats, trends, and best practices.
Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmark policies against industry standards and best practices.
Develop and implement governance frameworks for cybersecurity policy management.
Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls.
Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Lead and support internal and external audits and assessments of cybersecurity policies and practices.
Ensure identified audit and assessment findings and actions are tracked to closure.
Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities.
Communicate policy requirements and updates to relevant stakeholders.
Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans.
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred).
Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency with data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA (highly desirable).
Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS).
Understanding of risk management concepts, control frameworks, and compliance auditing.
Ability to provide consultation and recommendations to management.
Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
Cyber Security Architect
Information security analyst job in Dallas, TX
Privileged Access Management (PAM) Architect
Westlake, TX
Responsibilities:
10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors.
Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred.
Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise.
Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk.
Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR.
Expertise with build vs. buy solution options.
Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management.
Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization
Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable.
They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault)
Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience.
They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
Cyber Security Architect
Information security analyst job in Arlington, TX
Our client is growing a highly trusted Cybersecurity function with executive level support and the freedom to implement advanced solutions. This team plays a critical role in protecting company systems and data, minimizing risk, and staying ahead of evolving threats. If you're looking to escape repetitive security work and focus on strategy, architecture, and innovation…this is your opportunity.
You'll be part of a growing cybersecurity architecture team with visibility across every part of the business, from financial services and data platforms to HR systems and customer facing applications.
What You'll Be Doing
Partner with application, platform, and network teams to embed security directly into design and delivery.
Review IaC, APIs, and cloud architectures; identify risks and define secure patterns that teams can actually build against.
Architect guardrails across application, cloud, and network layers-secure SDLC, WAF/CDN, and multi-cloud landing zones.
Translate complex technical risks into clear, actionable recommendations for engineers and business stakeholders.
Drive adoption of cloud-native controls (AWS/Azure) and logging/detection improvements that make security measurable.
Collaborate with peers across Cyber, Engineering, and DevOps to strengthen patterns and scale secure delivery.
What You Bring to the Table
~10+ years in IT or cybersecurity, including 3-5 years focused on AppSec or Cloud Security architecture/design.
Recent hands-on experience with one or more: Terraform/CloudFormation, WAF/CDN tuning, detection engineering, or cloud-native controls.
Deep understanding of application security principles, service-to-service auth, and threat modeling.
Solid networking fundamentals (DNS, routing, hybrid connectivity, L7/WAF).
Clear, structured communicator able to hold your own with delivery and product teams.
Experience working in or with highly regulated environments (financial services a plus).
Preferred Certification
Certifications such as CISSP, AWS Security Specialty, or CCSK.
Exposure to SIEM/SOAR tooling (Sentinel, Splunk, GuardDuty, XSOAR).
Familiarity with identity modernization (SSO, OIDC, PAM) and data protection (KMS, key rotation).
What You Can Expect
Join a builder first culture that values practical solutions over PowerPoints.
Work as part of a high-visibility architecture team influencing systems across the enterprise-data, finance, HCM, and customer facing platforms.
Career progression along an individual contributor track
Hybrid flexibility (3 days on site in Irving).
Comprehensive benefits from day one-401(k), medical, 12 weeks paid parental leave, and strong professional development support.
IT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Security Engineer, Corporate Security
Information security analyst job in Dallas, TX
About the Role
Eden Prescott is partnering with one of our top AI security clients, a fast-growing company that's seen significant momentum over the past year, to help them hire a Security Engineer focused on Corporate security.
This is a hands-on opportunity to build and scale the foundational systems that protect an AI-driven infrastructure from evolving threats. You'll work closely with engineering, IT, and compliance teams to ensure deep visibility across environments, strengthen detection capabilities, and automate key workflows that keep the company secure as it scales.
What You'll Do
Partner with engineering and infrastructure teams to design and build pipelines for collecting and correlating security telemetry.
Develop and maintain scalable, high-performance monitoring and detection infrastructure.
Create detection strategies to identify anomalous or malicious activity and ensure critical systems remain protected.
Triage, investigate, and resolve security alerts and incidents, driving them to closure with minimal business impact.
Collaborate with engineering to eliminate recurring issues and continuously refine detection rules.
Stay ahead of emerging threats and continuously evolve detection and response capabilities.
Contribute to the strategy, risk management, and automation roadmap for security operations.
Work with compliance and audit teams to maintain certifications and ensure alignment with security frameworks.
Implement pragmatic, business-driven controls across multi-cloud environments.
What You'll Bring
5+ years of experience in security engineering
Must have EDR, Identity (MFA, PAM, phishing-resistant authentication methods), Azure governance (policies), and CWPP/CSPM.
Strong track record building and scaling SOC operations in cloud-native environments.
Hands-on experience with SIEM/SOAR tools (e.g., Splunk, Microsoft Sentinel, Trellix) and telemetry instrumentation.
Familiarity with CNAPP solutions (e.g., Wiz, Orca, Defender, Singularity) across multi-cloud ecosystems.
Fluency in scripting languages such as Python, PowerShell, or JavaScript.
Automation experience with Azure Functions, Logic Apps, AWS Lambda, or Runbooks.
Expertise in IAM analysis, anomaly detection, and real-time threat response across cloud environments.
Strong communication, decision-making, and collaboration skills in a distributed team setting.
Ability to prioritize and execute in a dynamic, high-growth environment.
Bonus: familiarity with DevOps practices and experience in AWS, GCP, or Azure deployments.
Lead Salesforce Security Engineer
Information security analyst job in Plano, TX
We are seeking a Salesforce Security Engineering Lead to strengthen the security posture of our automotive client's multi-org Salesforce ecosystem. This is a high-impact leadership role responsible for driving enterprise-wide security hardening, defining standards, leading vulnerability response efforts, and architecting secure solutions across data, apps, integrations, and identity.
You will partner with cybersecurity, cloud, and Salesforce engineering teams across multiple business units to ensure the platform meets the highest levels of security, compliance, and operational excellence.
Key Responsibilities:
Lead enterprise-wide Salesforce security hardening initiatives across multiple BUs.
Own, maintain, and evolve Salesforce security guidelines, checklists, and standards.
Build strong stakeholder relationships and influence technical direction with authority.
Conduct regular audits and challenge application teams on adherence to security best practices.
Architect and implement security controls across authentication/authorization, data access, encryption, sharing/roles, API security, and secure development patterns.
Utilize Salesforce Shield, Event Monitoring, Security Health Check, and Security Center to drive improvements.
Lead rapid vulnerability remediation using war-room coordination and cross-functional alignment.
Develop SIEM integration strategies with Microsoft Sentinel for real-time monitoring and automated responses.
Implement protections against Data Loader abuse, bulk extraction threats, and social engineering risks.
Evaluate and lead security POCs with vendors including Salesforce Security Center, Varonis, and others.
Support secure development with Apex security patterns, SOQL injection prevention, and secure coding practices.
Apply cloud engineering knowledge (AWS/Azure/GCP), distributed systems principles, and API security best practices.
Automate processes using Python, Bash, or similar scripting languages.
Communicate complex security concepts clearly to executives and technical teams.
Qualifications
5+ years of hands-on Salesforce experience with deep platform/security architecture expertise.
Expert knowledge of Salesforce Shield, Event Monitoring, and platform security tools.
Experience leading security initiatives across multiple teams or business units.
Strong scripting/automation skills (Python, Bash, etc.).
Strong understanding of cloud engineering, distributed systems, and API security.
Exceptional communication and leadership presence.
Security Engineer-ONLY W2(No C2C)
Information security analyst job in Plano, TX
We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities.
Key Responsibilities
Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool.
Deploy and configure Flex ID to enable passwordless, frictionless identity experiences.
Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications.
Ensure robust identity and access management (IAM) implementations using industry best practices.
Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows.
Monitor, troubleshoot, and optimize identity workflows for performance and security.
Document technical solutions and provide knowledge transfer to internal teams.
Required Qualifications
✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform.
✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification.
✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration.
✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively.
✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc.
✅ Strong communication and documentation skills.
Preferred Qualifications
Experience integrating identity services with CI/CD pipelines or DevOps environments.
Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA).
Background in cybersecurity, software engineering, or cloud architecture.
Cloud Security Engineer - SRE
Information security analyst job in Frisco, TX
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Senior Information Security Engineer
Information security analyst job in Irving, TX
We are seeking an experienced Senior Vulnerability Management Engineer to support the organization's vulnerability management program and strengthen our overall security posture. The successful candidate will be responsible for configuring the platforms and identifying, assessing, prioritizing and coordinating the remediation of security vulnerabilities across our enterprise infrastructure. Expertise with vulnerability management platforms - such as Nucleus Security, Rapid7 InsightVM, Microsoft Defender, SentinelOne, ServiceNow, BitSight, or similar solutions is essential. This role requires collaboration with cross-functional teams to effectively reduce risk exposure.
Qualifications:
Vulnerability Management Experience: Minimum of five years' experience managing vulnerabilities within complex IT environments (cloud, on-premises, hybrid). Comprehensive knowledge of operating systems (Windows, Linux, Unix), networking protocols, cloud platforms (AWS, Azure, GCP). Familiarity with web application vulnerabilities (OWASP Top 10) and application security testing.
Proficiency with Security Tools: Advanced expertise in leading vulnerability management and security platforms, such as Nucleus Security, Rapid7 InsightVM, Microsoft Defender for Endpoint, ServiceNow, BitSight, or equivalent.
Executive Reporting: Ability to prepare and deliver clear, actionable reports for executive audiences, translating technical findings into business risks and impacts.
Compliance & Risk Management: Strong understanding of regulatory frameworks and experience implementing controls to meet compliance requirements.
Process Improvement & Automation: Demonstrated skill in designing, optimizing, and implementing automated workflows for vulnerability tracking, reporting, and remediation.
Analytical Thinking: Exceptional attention to detail, with a track record of leveraging data analysis to drive security decisions and process improvements.
Communication & Collaboration: Excellent verbal and written communication skills; ability to engage stakeholders at all levels and facilitate training or awareness initiatives as needed.
Preferred Skills:
Cloud Security Expertise: Familiarity with cloud security best practices and emerging threats.
Project Management: Experience managing complex security projects, including tool migrations, integrations, and process enhancements.
Certifications: Relevant industry certifications (e.g., CompTIA Security+, CISSP, CISM, or equivalent) are desirable.
Regex (Regular Expressions): Experience using Regex for building automation rules, data parsing, and workflow customization within vulnerability management platforms.
SQL: Basic understanding of SQL for querying, analyzing, and manipulating data as part of reporting or automation tasks.
Purdue Network Model: Familiarity with the Purdue Enterprise Reference Architecture (PERA) or Purdue Model for Industrial Control System (ICS) network segmentation and security.
Problem-Solving: Creative approach to addressing complex security challenges.
Attention to Detail: Precise identification and documentation of security vulnerabilities.
Security Operations: Active participation in incident response activities during exploitation events and coordination with threat intelligence teams to monitor emerging vulnerabilities and threats.
Continuous Learning: Commitment to staying current with evolving threat landscapes and security technologies.
Information Security Analyst
Information security analyst job in Irving, TX
Mid-Senior career position responsible for supporting defense of information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction via support, maintenance and enhancement of our client's Oracle application.
Qualifications
Minimum of three years of hands-on experience implementing or maintaining Oracle EBS & GRC security controls, rules, responsibility design and administration
Oracle EBS security user and role administration duties
CISA, CRISC or CGEIT, or equivalent certification preferred.
Functional knowledge of Oracle EBS and GRC and Oracle Cloud
Strong understanding of current and developing information security administration practices and technologies
Strong knowledge of role-based access management controls and practices
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst - IAM
Information security analyst job in Dallas, TX
Eikon Consulting Group specializes in Information Technology Consulting and Training Services. The company was founded on the belief that great companies want great talent from industry leading partners utilizing cutting edge technology to save time and money in the hiring process. Eikon Consulting Group provides this service with a unique approach. After the candidates are fully screened and qualified, a Techie-Talk profile is created. Techie-Talk is Eikon's exclusive audio recording capability to give our clients a "Virtual" experience in the interview / hiring process. Techie-Talk is 100% customized to our client's exacting specifications and the audio profile addresses topics that are relevant to the client's project. This allows them to evaluate multiple facets of the candidate, such as communication skills and technical aptitude, long before the interview process begins. See our Services tab for more info on this unique service offering.
Job Description
Bachelor's strongly preferred; consideration given for related technical and/or DoD information security experience as it relates to a degree
· Advanced degree focused on Information Security, Cyber Security, or Information Assurance preferred
· Minimum of five (6) years related IT experience is required, with at least two (2) years focusing on operating and/or implementing Identity and Access Management (IAM) solutions to various use cases such as user provisioning, access governance and identity federation
· DoD 8570 IAM level 1 or higher certification required or must be achieved within one (1) year of hire
· Identity management platform related certifications required or must be achieved within six (6) months of hire
· Experience with implementing IAM solutions with applications using SAML or oAuth required
· Strong analytical and problem solving skills to troubleshoot and resolve IAM issues required
· Strong knowledge and experience of user and access provisioning/deprovisioning workflows
· Serve as a business enabler via development support, clear planning and design documentation for properly-secured, policy-compliant, high-performance IAM integrations
· Experience with cloud and on-premise hybrid architecture preferred
· Experience with Oracle IAM platform and/or multiple IAM product platforms
· Experience integrating multi-factor authentication technologies with IAM solutions preferred
· Demonstrable prior experience leading IAM projects preferred
· Experience with Identity and Access governance and compliance preferred
· CyberArk experience a plus
· Office 365 Identity & Access experience a plus
· Operational Linux/Unix knowledge required
· Knowledge of using Splunk or other SIEM to monitor IAM systems a plus
Qualifications
Information Security, IAM, Oracle IAM.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information security analyst job in Plano, TX
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
• Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus
Qualifications
MUST HAVES:
• 2+ years of experience in technical role with notable exposure to security
• Working knowledge of analyzing events from SPLUNK SIEM.
• Ability to work shift work in a 24/7/365 environment.
• Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management
This is a Bulk hiring position for our direct client.
Additional Information
For More Information, Please Contact
Siva Kumar
************
Network Security Audit
Information security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyInformation Security Architect Manager
Information security analyst job in Irving, TX
Company Details
Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible.
Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “
What's Next
” in our industry and beyond.
With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions.
Berkley Technology Services: Right Team, Right Technology, Simple and Secure.
Responsibilities
The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC. This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley Technology Services' technological assets and services.
Spearhead the architectural design, deployment, and management of cutting-edge security solutions, including but not limited to SIEM, EDR, PAM, Data Access Governance, Identity Governance, Cloud Access Security Brokers, and WAFs.
Architect and sustain the security infrastructure, ensuring seamless integration with existing technology ecosystems.
Craft and execute architectural strategies for bolstering vulnerability management, security automation, and the safeguarding of infrastructure.
Guide the formulation and continuous refinement of security policies and procedures, with a spotlight on architectural best practices.
Cultivate an environment of innovation within the team, promoting continual learning and professional advancement.
Function as a principal consultant and subject matter authority on information security architecture, offering pivotal guidance to internal teams and key stakeholders.
Develop and maintain roadmaps for critical security infrastructure components, aligning them with the strategic goals of the organization.
Collaborate with fellow Information Security leaders to forge a unified and robust Information Security Framework and Strategy.
Perform regular technology evaluations, risk assessments, and devise appropriate remediation strategies.
Lead and nurture a team of security architects and engineers in a fast-paced, global setting.
Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary.
Qualifications
Demonstrated expertise in Information Security Architecture, with practical experience in the design and management of a broad spectrum of security technologies.
Exceptional leadership and communication capabilities, adept at guiding global, interdisciplinary teams.
Deep familiarity with contemporary cybersecurity trends and a commitment to remaining at the cutting edge of technology.
Desirable certifications include CISSP, CISM, CEH, or other relevant qualifications.
Proficiency in cloud security architecture and solutions, with experience in AWS, Azure, or Google Cloud platforms.
Expertise in security frameworks such as NIST, ISO 27001, and CIS.
Strong analytical and problem-solving skills, capable of making informed decisions in complex scenarios.
Ability to foster relationships and collaborate effectively with various internal and external stakeholders.
Commitment to ethical conduct and a deep understanding of regulatory compliance requirements relevant to the insurance and financial sectors.
Bachelor's or Master's degree in Computer Science, Information Security, or a related discipline, or equivalent experience.
Behavioral Core Competencies
Flexibility
Customer Service Oriented & Operational Effectiveness
Personal Ownership
Quick Decision Making
Team Builder
Transformational Leadership
The Company is an equal employment opportunity employer.
Auto-ApplyManager, Information Security
Information security analyst job in Dallas, TX
At Bluebeam, we empower people to advance the way the world is built. We create smart software solutions that make construction sites more efficient, connected, and safe, and improve the lives of design and construction professionals everywhere. The Information Security Manager leads a team of security engineers in key functional areas, including vulnerability management, application security, incident detection and response, and security awareness.
The person in this role leads the team in maturing and defining processes, developing metrics and reporting on security risk, and adhering to SOC 2 and ISO 27001 compliance. This role requires a combination of technical acuity and strong interpersonal skills to effectively build cross-functional relationships and trust with teams like ITS, DevOps, and Engineering.
The role is Hybrid to our Dallas office.
About the Role
* Leads the security engineering team in projects and operations
* Manages penetration testing and vulnerability management programs
* Works cross-functionally to implement and improve information security-related processes
* Partners with Product and Engineering teams to improve security in the software development lifecycle
* Participates in security incident response
* Collaborates with Privacy and GRC teams to implement compliant processes
About You
* People management experience in Information Security
* Strong knowledge of information security domains including vulnerability management, identity and access management, and endpoint protection
* Experience in application security or software development
* Familiarity with AWS
* Strong project management and hands on implementation skills
* Experience working with security frameworks such as NIST CSF, CIS, and SOC 2
Bonus Points:
* Security-related certifications (e.g. CISSP, CISM, etc.)
What we offer :
* People-focused, entrepreneurial culture with the backing of a stable, global, corporate entity - Nemetschek
* Competitive compensation and benefits package
* Work-life balance fostered through a culture of diversity, inclusion, and appreciation of individual lifestyle needs
* Opportunity for continuous professional development through things like Pluralsight, conferences, and certification programs
About Bluebeam
The construction industry is adopting new technology at a feverish pace. Tablets and cell phones are replacing paper blueprints, drones are surveying jobsites in 3D, and cloud collaboration is changing the way teams work together. Bluebeam plays a crucial role in this transformation. The key to our success is a customer-focused approach to product development: we work with the industry to create solutions for the industry. Today, over 3 million people throughout the world use Bluebeam. In the US, we're a critical partner for the majority of top AEC firms, and rapidly expanding our presence globally, with offices in Sweden, Germany, and the UK.
Come design and build your future with us!
Bluebeam is proud to be an equal-opportunity workplace. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
The base pay offered will depend upon qualifications and other operational considerations. Base pay is one part of Bluebeam's Total Rewards program, which seeks to compensate and recognize employees for their work. Most sales positions are eligible for commission under the terms of an applicable commission plan, while most non-sales positions are eligible for a bonus under the terms of an applicable bonus plan. Additionally, Bluebeam provides best-in-class benefits, with 100% employee-covered health and welfare benefits and paid time off. Bluebeam is a growing company with many opportunities. If this role and/or pay range are not an exact fit, we still encourage you to apply.
The base pay range for this position is: $153,800 - $192,300
Nearest Major Market: Dallas
Nearest Secondary Market: Fort Worth
IT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-Apply