Cyber Security Analyst
Information security analyst job in Houston, TX
SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including:
Identifying cyber threat tactics and methods
Identifying and correcting gaps in the company's cybersecurity posture
Testing information systems for vulnerabilities
Documenting and escalating incidents
Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts
Identifying and analyzing anomalies in network traffic or log data
Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches
Responding to urgent cybersecurity events and incidents
Reviewing events and incidents to understand root causes
Monitoring reputation for hostile content directed towards organizational or partner interests
Recommend procedures and/or changes to procedures necessary for good cyber hygiene
Improve the overall cybersecurity posture of the organization's systems
Determine the operational and safety impacts of cybersecurity lapses
Prepare threat and target briefings and situational updates
Monitor threat activities and prepare threat activity reports
Manage and report on adversarial activities
EDUCATION AND REQUIRED EXPERIENCE:
A degree in business or technology is preferred (associate's or bachelors)
3-5 years of experience in IT security
Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred
Basic scripting (Python, PowerShell, Bash)
Experience with vulnerability management
Experience with network packet analysis
Experience with log analysis and log management
Experience with Cloud Security Management interfaces
Experience with enterprise authentication systems, such as directory services or identity management platforms
Experience with Incident handling and response preferred
Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes
Working knowledge of computer networking protocols including how traffic flows within a network
Working knowledge of cybersecurity laws and regulations
Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting
Ability to prioritize security requests according to urgency and established criteria
Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats
General understanding of security frameworks (NIST, MITRE Attack) preferred
Familiarity with the variations, similarities, and differences between IT and OT network environments
Experience working on project teams and project management is preferred
Intermediate understanding of Threat Intelligence research and methodologies
Familiarity with adversarial TTPs
SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS:
Demonstrate excellent communication (written, verbal and listening) and interpersonal skills
Superior organizational skills and attention to detail
Must possess a proven ability to deliver high-quality customer service
Ability to triage and prioritize security related data quickly
Ability to respond to work after hours and weekends as needed
PHYSICAL DEMANDS:
Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
Cyber Security Specialist
Information security analyst job in Houston, TX
Job Responsibilities:
We are seeking a highly skilled and motivated Cyber Security Specialist to join our cybersecurity programmatic assessment team. The Cyber Security Specialist will assist the Department of Energy (DOE) in monitoring and assessing the Department's cyber programs performance while considering compliance with Federal Information Security Modernization Act (FISMA) implementation requirements.
This position will lead and participate in comprehensive or focused cybersecurity assessments, creation of assessment reports, and presenting the assessment results to senior management. Assessment areas can be tailored to best assess the sites implementation and may include program management, account management, risk management, configuration management, contingency planning, incident response, system security plans, security controls assessments, Plan of Action and Milestones reviews, and vulnerability scan reviews.
Other duties and responsibilities:
· Plan, execute, and lead cybersecurity assessments across the department.
· Help develop assessment objectives that will provide value to the program and department.
· Evaluate the efficiency, effectiveness and performance of operation processes with department security policies and related government regulations.
· Conduct subject matter expert interviews in order to develop an understanding of the current cybersecurity policies, processes, procedures, and risks to the department.
· Assess the exposures resulting from ineffective or missing control practices.
· Develop rigorous best practice recommendations to improve cybersecurity on all levels.
· Develop assessment findings and prepare assessment reports.
· Provide written and verbal reports of assessment results.
· Other duties as specified by manager or organization.
Position Requirements:
· Must possess at least a bachelors degree from an accredited university or college, in such fields as an engineering discipline, business administration, security management, computer science, or information management or equivalent combination of education and experience.
· 5 years of experience in cybersecurity risk and compliance, IT governance, IT assessments, or an IT/cybersecurity-related field.
· Must be a U.S. citizen.
· Ability to successfully receive and maintain a DOE Q/SCI (TS/SCI) Clearance.
· Must have detailed knowledge of NIST requirements and DOE policies and procedures.
· Must have detailed knowledge of DOE missions, sites, facilities, operations, and organizational roles and responsibilities.
· Must be able to demonstrate detailed knowledge in cybersecurity management programs, including classified and unclassified computer systems, broad working knowledge of state-of-the-art computer security applications, and familiarity with current and emerging information technologies as they apply to the protection of classified information.
· Must be knowledgeable about computer networks, penetration techniques, viruses, classified computer systems, Federal computer security requirements and techniques, national standards, and comparable industrial/commercial applications.
· Must have familiarity with a broad range of tools and techniques used for network scanning, automated penetration testing, data encryption, and virus detection.
· Must have a demonstrated ability to develop reports and presentations (oral and written) that are understandable to a management audience.
· Must have excellent oral and written communication skills, and a proven ability to meet deadlines and perform under pressure in an uncertain environment.
Desired Skills, Knowledge, and Abilities:
Previous experience as a cybersecurity assessor in a similar function.
Previous experience as an Information System Security Manager (ISSM).
Previous experience managing a cybersecurity program.
A solid understanding of DOE missions, sites, facilities, operations, and organizational roles and responsibilities.
Possess one or more nationally recognized certifications.
Job Type: Full-time
Pay: $75.00 - $95.00 per hour
Benefits:
401(k)
401(k) matching
Dental insurance
Health insurance
Health savings account
Life insurance
Paid time off
Work Location: Remote
Information Security Analyst-GRC LVL II
Information security analyst job in Houston, TX
Job Description
Job Title: Information Security Analyst - Governance, Risk & Compliance (GRC) Level II
Job Location: Downtown Houston, TX 77002 *Prospective candidates MUST be located in the HOUSTON, TX area. Job Type: Contract/Full-Time
*This contract position has a duration of 6-months.
Job Schedule: Mon-Fri 8AM-5PM/Hybrid
*Exact hybrid schedule will be determined by direct manager.
Job Salary:$52-$54/hour
*Depending on experience.
This Information Security Analyst- Governance, Risk & Compliance (GRC) Level II role will design and implement a scalable Cloud and Third-Party Cybersecurity Risk Management Framework aligned with NIST, ISO 27001, and other relevant standards.
Key Requirements:
Develop and maintain risk assessment procedures and questionnaires tailored for cloud services and third-party applications.
Define security review workflows for vendor onboarding, contract renewals, and offboarding.
Integrate cybersecurity risk activities with procurement, legal, and enterprise architecture processes.
Conduct technical and compliance assessments focusing on:
Data classification and regulatory alignment (e.g., HIPAA, CJIS, PCI, GDPR)
Encryption standards and access controls
Review vendor responses to security questionnaires and validate supporting documentation (e.g., SOC 2 reports, ISO certifications, penetration test results).
Analyze risks associated with APIs, SaaS integrations, homegrown plug-ins, and third-party application stores.
Role and Responsibilities
Collaborate with internal stakeholders to define third-party cybersecurity roles and responsibilities.
Partner with legal and procurement teams to ensure contracts include appropriate security terms (e.g., data handling, breach notification, audit rights).
Provide security guidance to project teams evaluating or implementing cloud-based or externally hosted solutions.
Scheduled Milestones and Deliverables
Support the development of cloud security baselines and governance controls.
Recommend mitigation strategies and track remediation efforts.
Evaluate cloud service configurations (e.g., AWS, Azure, Google Cloud, SaaS platforms) for alignment with enterprise security policies and industry best practices.
Metrics to be Utilized to Measure the Performance
Maintain and update a centralized inventory of critical cloud services and third-party vendors.
Develop and present risk dashboards and executive-level summaries to communicate risk posture and assessment outcomes.
Track security exceptions, risk acceptance approvals, and remediation timelines across third-party engagements.
Participate in governance forums such as the Cybersecurity Review Committee (CRC) and provide input on vendor-related risks.
Requirements
Education:
High School diploma, or G.E.D. equivalency from an accredited educational institution. -
Required
Bachelor's degree in Computer Science, Information Security, Information Technology, Risk Management, or similar area of study from an accredited college or university. -
Preferred
Experience:
(5)-Five years of work experience in an Information Security, Information Technology, Computer Science, IT Risk Management or related field.
Knowledge, Skills, and Abilities (KSAs):
Experience designing, implementing, and executing IT Risk Management projects, cloud solutions, cybersecurity governance, and technologies across complex, large-scale environments.
Ability to build and maintain strong relationships across departments/teams and effectively communicate information security risks and controls to stakeholders and leadership.
A passion for cybersecurity, self-starter mentality, flexibility, and willingness to take on new challenges and ability to thrive in a team environment.
Applicants for this position will be subject to a criminal background check that includes being fingerprinted. This applies to any position with network access to Criminal Justice Information Services (CJIS) or access to an area where CJIS is received, maintained, or stored either manually or electronically (i.e., custodian, maintenance).
Automatic Disqualification:
Convictions, probation, or deferred adjudication for any Felony, and any Class A Misdemeanor
Convictions, probation, or deferred adjudication for a Class B Misdemeanor, if within the previous 10 years
Open arrest for any criminal offense (Felony or Misdemeanor)
Family Violence conviction
Cyber Security Analyst
Information security analyst job in Houston, TX
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplyCyber Security Analyst
Information security analyst job in Sugar Land, TX
The Cybersecurity Analyst will be responsible for safeguarding the organization's information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.
The ideal candidate will possess 3-5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.
Key Responsibilities
Security Operations & Monitoring
· Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.
· Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.
· Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.
Network & Infrastructure Security
· Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.
· Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.
· Perform network hardening to reduce the attack surface, following best practices and compliance standards.
Server & System Hardening
· Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.
· Review and implement secure configurations, patch management, and vulnerability remediation.
Disaster Recovery & Continuity
· Participate in DR drills and testing to validate readiness and response effectiveness.
Policy, Documentation & Compliance
· Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.
· Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 3-5 years of hands-on experience managing and securing enterprise networks and systems.
- Proven experience with:
- Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint
- Fortinet Gateways
- Duo MFA
- Server and Network Hardening
- Disaster Recovery implementation and testing
- Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles.
- Familiarity with incident response, threat intelligence, and vulnerability management processes.
- Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent).
- Experience with other routing protocols (EIGRP, BGP) and advanced firewall features.
- Familiarity with automation tools (Python, Ansible, Netmiko) for network management.
- Experience in high-availability enterprise or government environments.
Senior Security Analyst - Compliance
Information security analyst job in Houston, TX
Senior Security Analyst FLSA Class: EXEMPT Responsible to: Lead Security Architect The Senior Security Analyst - Compliance will ensuring our organization's adherence to regulatory requirements, industry standards, and internal policies. The Senior Analyst will collaborate across IT, Security, Legal, Engineering, and Business units to monitor compliance posture, support audits, manage security assessments, and strengthen our risk and compliance framework.
What You'll Do:
* Compliance & Regulatory Oversight
* Monitor, assess, and maintain compliance with frameworks such as SOC 2, NIST, and ISO 27001, as applicable.
* Support certification, attestation, and regulatory audit activities.
* Maintain evidence repositories and coordinate responses for internal and external audits.
* Policy & Procedure Management
* Develop, maintain, and enforce security policies, standards, and procedures.
* Educate employees on compliance requirements and best practices.
* Ensure alignment of security operations with company policies and legal obligations.
* Risk Management & Assessments
* Conduct security and compliance risk assessments across systems, vendors, and business processes.
* Support regular vulnerability assessments and penetration testing to identify and address system weaknesses.
* Monitor, prioritize, and manage risks from IT and Operational Technology (OT) environments
* Track remediation efforts and verify corrective actions are implemented.
* Integrate vulnerability scanning tools for live risk scoring
* Maintain and manage a centralized risk register tied to controls, with real-time updates.
* Security Awareness & Training
* Support ongoing compliance training initiatives.
* Communicate regulatory and policy updates to stakeholders.
* Monitoring & Reporting
* Track compliance metrics and prepare regular reports for leadership, IT Security Council, and audit committees, as required.
* Monitor security systems, including SIEM tools, EDR, DLP, IPS systems, and other security tools to identify and respond to potential threats in real time.
* Support investigations of security incidents, perform root cause analysis, and coordinate remediation efforts to minimize impact.
* Maintain and manage updates to policies (e.g. cybersecurity, incident response, disaster recovery) in a centralized, version-controlled repository.
* Escalate non-compliance issues and propose remediation strategies.
Other Requirements:
* Bachelor's degree in Information Security, Computer Science, Risk Management, or related field (or equivalent work experience).
* 5+ years of experience in information security, compliance, or risk management, with at least 2 years of experience in a senior or lead role.
* Strong knowledge of regulatory frameworks such as SOC 2, ISO 27001, NIST CSF, GDPR, or CCPA.
* Experience supporting audits, evidence gathering, and compliance assessments.
* Familiarity with GRC (Governance, Risk, and Compliance) platforms (e.g., Drata, OneTrust, Archer, ServiceNow GRC).
* Excellent written and verbal communication skills.
Nice to have:
* Relevant certifications such as CISA, CISSP, CISM, or CCSK.
* Experience in cloud security compliance (AWS, Azure, GCP).
* Knowledge of third-party/vendor risk management.
VoltaGrid is an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, creed, color, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information, arrest record, or any other characteristic protected by applicable federal, state or local laws.
Our management team is dedicated to this policy with respect to recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, and general treatment during employment.
Senior Cybersecurity Analyst - Security Operations Center (Operations Technology)
Information security analyst job in Houston, TX
Primary Purpose
The Sr. Cybersecurity Specialist - OT design and implement systems and processes of Sempra's security functions across operational technologies (OT), ensuring the 24/7 protection of Sempra's assets and data against the dynamically changing threat landscape. The Sr. Specialist -OT is responsible for the design and implementation of security across OT solutions to ensure Sempra's endpoints, servers, networks, and databases are always protected. This position coordinates with lines of business and development teams to ensure security controls are in place from design through deployment. This position works closely with cyber operations to ensure operational technologies are incorporated in functions, such as security monitoring, threat and vulnerability, and incident response.
Duties and Responsibilities
Delivery & Execution
Standards Setting:
Provides incident response plans and procedures for foreseeable incidents and continuously update the incident response playbook in line with emerging threats and leading industry standards
Develops and maintains incident response, threat and vulnerability, and security monitoring documentation
Oversees and leads Cybersecurity Specialists - OT, ensuring the specialists follow incident handling procedures and processes.
Project Delivery:
Drives the planning, execution, and management of multi-faceted projects related to Cyber security operations center
Responsible for the design and implementation of activities related to security monitoring and incident response
Oversee OT Specialist participation and ensure OT Specialist provide quality technical and procedural documents.
Compliance:
Implements OT security operations in accordance with industry standards and practices (i.e. NIST SP 800-82 AND ISO/IEC 62443)
Responsible for ensuring assigned projects and activities within the functional areas meet all compliance and architecture standards
Ensures proper oversight for solutions and artifacts
Ensures re-use through implementation of shared technology assets
Value Delivery, Strategy, and Planning
Functional Area Strategy
Coordinates activities of incident response, threat and vulnerability analysis, and security monitoring for operational technologies to ensure timely detection, prevention, and response to security incidents
Coordinates the implementation of requirements and recommendations to OT / critical infrastructure
Researches SCADA vendors and CISA advisory documents
Works with all business lines to ensure that incidents are quickly identified and remediated and to define recommended threat mitigation actions
Participates in business continuity plans in business lines
Maintains alignment with IT governance/risk objectives in solution delivery
Drives quick escalation and resolution during major incidents; prioritizes actions to ensure maximum protection of company assets and data
Provides detailed explanations of security events and their impact on specific parts of the business
Train OT Specialists and IT personnel to improve cross-training.
Emerging Technology
Incorporates areas of IT and OT convergence; works closely with IT to secure technologies
Drives continuous improvement across OT Incident response, threat and vulnerability, and security monitoring functions; ensures functions remain up to date with the current threat landscape
Drives innovation and identifies emerging technologies to sustain and automate the cyber security operations
Drives tabletop exercises with playbooks and pertest
Reviews of OT architectures for OT security improvements
Collaboration
Works with cross-functional IT and enterprise teams to build alignment and model commitment to high performance as “one team”
Drives the relationship and communications to across business lines to ensure security is embedded within solutions
Performs other duties as assigned (no more than 5% of duties)
Senior Security Analyst
Information security analyst job in Houston, TX
6+ years of experience in multiple industry risk, control and governance disciplines (e.g. Audit, Business Continuity Planning, and Regulatory Compliance). In-depth understanding of information technology and business continuity principles and best practices across the industry as well as project management principles.
Broad knowledge of information and technology risk management policies, methods, standards, tools, and processes (e.g. ISO, COSO, COBIT) as well as knowledge of compliance, legal, internal / external audit & regulatory requirements.
Significant expertise in the collaboration, facilitation and coordination of the mitigation of risks. Adept at navigating governance structures. Ability to manage and analyze data. Experience raising awareness of information and technology risk throughout an organization.
Understanding of metrics development and reporting. Strong problem solving and program execution skills. Ability to prioritize and drive difficult decisions among business partners.
Ability to solve or to collaborate in solving very complex risk issues that span legal, compliance and regulatory obligations across various lines of business and shared service areas of the company.
Ability to prioritize and drive difficult decisions among business partners
Strong client relationship management experience and influencing skills.
Strong interpersonal and oral/written communication skills, able to build relationships with people at all levels. Experience developing and delivering presentations to all levels of management. Strong ability to develop, lead and manage a professional staff.
Qualifications
PLEASE NOTE:
While technical experience is a plus, this is not a technical information security position. It is best filled by someone with information security management or information technology audit experience. This is a leadership position requiring strong communication and analytical skills.
Additional Information
Job Status: Contract
Eligibility: H1B/EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact:
************
Keep the subject line with Job Title and Location
Easy ApplyInformation Security Analyst
Information security analyst job in Deer Park, TX
Job Details Deer Park - Deer Park, TX Full TimeDescription
Shift Hours:
M-W & F 8:30 AM - 5:15 PM TH 8:30 AM - 5:45 PM and On-Call
The Information Security Analyst is responsible for working with and providing support to the ISM and IS&T Team in maintaining security best practices and regulatory requirements.
Essential Job Duties and Responsibilities
Consistently meet all Shell FCU Service Commitments; Shell FCU Employee Creed and Shell FCU Service Distinctions
Accountable to maintain knowledge of and comply with all applicable rules and regulations required within the scope of duties, including, but not limited to, the Bank Secrecy Act
Required to attend annual training sessions as instructed or scheduled.
Perform job duties and responsibilities in compliance with Shell FCU policies, procedures, philosophy, and standards of performance.
Assist security team in identifying current security and compliance requirements and recommend security solutions or actions.
Assess network threats such as computer viruses and malware, perform vulnerability assessment in support of penetration analysis, operate host and network intrusion/prevention programs, administer access/ monitoring of critical systems, review critical system logs, identify, and document unique local threats/vulnerabilities and recommend remedial action.
Work with ISM/Network Team security standards and practices to install, design, configure and maintain security applications that protect against malware, encrypt information, and ward off hackers and other bad actors.
Maintain the security and health of the network from misuse through neglect, lack of training, or malevolence from internal and external sources.
Monitor programs and processes that keep outsiders from gaining access to Shell FCU private networks and data.
Prepare for and provide rapid response to security threats such as virus, worms, or other malicious attacks.
Assist in the preservation, identification, extraction, and documentation of evidence stored in computers.
Perform log reviews on a predefined basis, to detect anomalous activity.
Perform network vulnerability scans and make recommendations based on findings. Conduct forensic analyses when necessary.
Utilize cybersecurity tools to periodically test the corporate environment and verify end user best practices to maintain strong security practices.
Work with IS&T staff to continually review and maintain security hardening standards within newly deployed systems, codes, updates, upgrades, or patches.
Assist in patch management and firmware updates to maintain optimal levels of security.
Support anomaly detection and trending tools to provide in-depth analysis of events detected by these applications. Included in this position will be the overall maintenance of the environments, configuration upgrades and tuning, incident response escalations, and 1st level NOC support for all alerts detected.
Respond to network security incidents through remediation efforts including implementation of a secure infrastructure, the secure repair of technology components and assist in the development of incident response and recovery processes.
Support IS&T staff on security-related projects including design, configuration, deployment and maintenance of policy enforcement tools, techniques, and reporting.
Participate in business continuity / disaster recovery planning and Change Management / Change Configuration processes and reviews.
Effectively communicate security information gathered from security tools, logs, evolving risks, and reported incidents by employees, to management or security teams.
Perform additional duties, as assigned.
Shell Federal Credit Union is an equal opportunity and an affirmative action employer and committed to providing equal opportunity for all employees and applicants for employment, without regard to race, religion, color, sex, sexual orientation, gender identity, national origin, age, citizenship status, marital status, protected veteran status, mental and/or physical disability, pregnancy, or any basis prohibited by State or Federal law.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Knowledge and Skills
Experience:
Three or more years' strong Windows and Windows Network administration, database systems and network connectivity skills.
Three or more years' experience performing security related tasks for a medium to large enterprise.
Education / Training:
Two-year degree; Cybersecurity degree and/or equivalent related experience or certification.
Two or more years' systems development, information security, PC support and network/systems administration experience.
Current, Industry standard recognized certification in information security (ex: Security+, CEH certification)
Good knowledge/experience working with following products a plus:
Windows Server Technologies, Cisco Routers/Switches/Firewalls, Websense, Symantec Endpoint Protection, IDS/IPS, Cisco CSA, Windows Active Directory Infrastructure, Linux based systems, Kali Linux, Threat Hunting, Honeypots, Wireshark, NESSUS, Penetration Testing Tools, Dell KACE, working knowledge of Python.
Job Requirements:
Knowledge of credit union products and services
Positive, welcoming, and helpful demeanor
Must be able to communicate information technology and security procedures and requirements to users and key Management.
Must possess functional knowledge regarding regulatory issues pertaining to security in a financial institution.
Must have strong analytical and problem-solving skills with the ability to clearly present and communicate technical and management concepts.
Advanced computer skills
Must possess professional verbal communication skills.
Position requires participation in on-call rotations as needed or assigned.
Position will at times require participation in after-hours or weekend work.
Must be prepared to participate in Disaster Recovery, Business Continuity, or Incident Response scenarios.
Ability to multitask in a fast-paced environment.
Ability to handle workloads during emergencies or stressful time sensitive situations.
Ability to work in open-concept workspace/environment.
Physical Demands:
While performing the duties of this job, the employee is regularly required to bend and stand. May at times be able to lift, carry and/or move up to 15 pounds.
Working Conditions
Exposure to potential hazardous conditions-robbery. Employees are to receive detailed instructions and procedures to be followed to minimize risk.
In accordance with the American with Disabilities Act, it is possible that requirements may be modified to reasonably accommodate disabled individuals. However, no accommodations will be made which may pose serious health or safety risks to the employee or others or which impose undue hardships on the organization.
This is not a complete statement of all duties and responsibilities comprising this position. Job descriptions are not intended and do not create employment contracts. The organization maintains its status as an at-will employer. Employees can be terminated for any reason not prohibited by law.
This organization uses E-Verify in its hiring practices to achieve a lawful workforce.
Security Analyst
Information security analyst job in Houston, TX
Experienced Technologists. Common Sense Approach. Indigo Beam was born of Bluware, Inc. Based in the heart of the Energy Corridor in Houston, TX, since 1986, we have experience solving the business problems of some of the most dynamic and demanding industries with a common sense approach and disciplined focus in using technology intelligently.
Our consultants bring to bear a wealth of experience and deep expertise in the Power and Utilities, Oil and Gas, Public Sector and Healthcare industries. Our extensive reference list demonstrates our commitment to our many satisfied clients with whom we have built long-term relationships.
Software Innovation to Solve Business Problems
We partner with our clients to create innovative mobile, Geographic Information System (GIS) and Web applications they need for the long haul. The results are strategic, technology-driven solutions that are intuitive, scalable, and sustainable. Our custom applications are intentionally designed to work in complete harmony with third-party Enterprise Resource Planning (ERP), content management, and database solutions within client organizations.
Job Description
SUMMARY
The Security Analyst detects, manages and reduces the impact of cybersecurity threats to the organization. They are responsible for proactively managing the security of the network and identifying weaknesses of company infrastructure (software, hardware and networks).
ESSENTIAL/ NON-ESSENTIAL JOB FUNCTIONS
Investigate security alerts / notifications from SPLUNK
Work with the process automation team on cybersecurity initiatives
Perform risk assessments and maintain the risk register
Utilize Mimecast and ForcePoint for web and email monitoring
Review IT small project charters for security risks
Assist in the completion of vendor SSAE16's
Work with the infrastructure team on mitigating penetration testing findings
Plan, implement and upgrade security technical measures and controls
Establish plans and protocols to protect data and information systems against unauthorized access, modification and/or destruction
Perform vulnerability testing and security assessments
Conduct internal security audits / compliance testing
Recommend and install appropriate technical tools and countermeasures
Define, implement and maintain corporate security policies
Provide input into security awareness communications
Utilize in-house tools to manage DLP
EDUCATION AND EXPERIENCE REQUIREMENTS
Required Education and Experience:
Bachelor's degree in Computer Science or the equivalent (e.g. Math, Electrical Engineering, Cyber Security, etc.)
5+ years of experience
IDS/IPS, penetration and vulnerability testing
TCP/IP, computer networking, routing and switching
Windows, UNIX and Linux operating systems
Network protocols and packet analysis tools
Preferred Education and Experience:
Degree preferred
Data Loss Prevention (DLP) tools, anti-virus / anti-malware tools
Firewall and intrusion detection/prevention protocols
C, C++, C#, Java or PHP programming languages
Security Information and Event Management (SIEM)
CERTIFICATIONS
CISSP, CCE, CEH, GCFE, GCFA, GCIH, GCIA, CCFE, CPT, CREA, CompTIA A+ would be desirable certifications though other comparable certifications and experience would be considered
SUPERVISORY RESPONSIBILITIES
Supervises others:
No
BUDGETARY RESPONSIBILITIES
No, but all team members provide input into the annual planning process and tool evaluation/selections
TRAVEL REQUIREMENTS
No
COMPETENCIES
·
Self-starter who is able to work independently while supporting the needs of the team
·
Excellent oral and written communication skills
·
Strong decision making skills
·
Comfortable interacting with all levels of management
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security Analyst:
Information security analyst job in Houston, TX
Houston, TX 6+ Months Primary : Mandatory to have good hands-on experience in one or more skills on the below products & technologies Firewalls (Checkpoint, Palo Alto), McAfee SIEM 9.6, McAfee Web Gateway, McAfee Web Reporter, McAfee Email Gateway RSA Token, Proof Point, CyberArc, IDS/IPS, Tufin, Cyber Security.
Good to Have Skills: Madient, Assessment, Forescout, Incident Management
ITIL: Incident Management, Change management
Certifications for Manager: CISSP for SOC Manager/Lead, Security+, CEH
Certifications for Analyst: Security+, CEH
Please provide:
1. Certificate numbers and Expiry Date
Additional Information
All your information will be kept confidential according to EEO guidelines.
Jr. Security Analyst
Information security analyst job in Houston, TX
About the Role
We are seeking a Security Analyst to join our Security Operations team. This role is ideal for someone with prior cybersecurity experience who is ready to take ownership of monitoring, analyzing, and responding to security events in a dynamic MSP environment. You will be the first line of defense in identifying potential breaches, escalating incidents, and ensuring our clients remain secure and compliant.
Key Responsibilities
Maintain, and tune security tools to identify vulnerabilities, anomalous activities, and misconfigurations
Monitor, analyze, and gather data for security events, alerts, and incidents to identify threats and anomalies
Escalate potential breaches and coordinate with senior analysts for incident response
Support security awareness campaigns and phishing defense programs
Recommend improvements to tools, processes, and playbooks
Develop, implement, and enforce security policies, procedures, and best practices
Assist with proactive threat hunting and detection of suspicious activities
Qualifications
1-2 years of experience in cybersecurity, SOC, or information security roles
Familiarity with attack techniques, endpoint protection, malware behavior, and cloud defense strategies
Experience automating repetitive tasks and scripting for analysis or reporting
Familiarity with log analysis and query languages
Strong communication skills and ability to work in a fast-paced environment
Understanding of regulatory and compliance frameworks
Preferred Certifications: CompTIA Security+, CySA+, GSEC, or similar
Auto-ApplyLead Security Engineer
Information security analyst job in Houston, TX
Join a team where you can play a crucial role in shaping the future of a world-renowned company and make a direct and meaningful impact in a space designed for top performers. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity and Technology Controls , you are an integral part of an agile team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. Drive significant business impact through your capabilities and contributions and apply deep technical expertise and problem-solving methodologies to tackle a diverse array of cybersecurity challenges that span multiple technology domains.
**Job responsibilities**
+ Design and build software solutions for security projects
+ Mentor junior security engineers
+ Facilitates security requirements clarification for multiple networks to enable multi-level security to satisfy organizational needs
+ Works with stakeholders and senior business leaders to recommend business modifications during periods of vulnerability
+ Be responsible for triaging based on risk assessments of various threats and managing resources to cover impact of disruptive events
+ Adds to team culture of diversity, equity, inclusion, and respect
**Required qualifications, capabilities, and skills**
+ Formal training or certification on software engineering concepts and 5+ years applied experience .
+ Experience planning, designing, building and implementing enterprise level security engineering products and solutions in a public cloud environment (i.e. AWS, GCP, Azure)
+ Advanced in one or more programming languages/scripts (i.e. C/C#, Python, PowerShell)
+ Knowledgeable in secure software application development and technical processes with considerable in-depth knowledge in one or more technical disciplines (e.g., cloud, artificial intelligence, machine learning, mobile, etc.)
+ Experience with continuous integration and continuous deployment (CI/CD) tools (Jenkins), version control tools (BitBucket, Git), managing and tracking work using management tools like Jira
+ Experience building security engineering products and solutions
+ Knowledge of the Windows Workstation OSs (Windows 10/Windows 11 and Virtual platforms) and/or Mac OSX
+ Understanding of Active Directory concept and practical implementation of GPO management
+ Ability to tackle design and functionality problems independently with little to no oversight
**Preferred qualifications, capabilities, and skills**
+ Experience within Cyber Security is preferred
+ Excellent communication and presentation skills
+ Prior experience in finance industry is a huge plus
**\#CTC**
JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans
**Base Pay/Salary**
Jersey City,NJ $152,000.00 - $215,000.00 / year
Sr Information Security Analyst Developer
Information security analyst job in Texas City, TX
Salary Grade: G06 Minimum Midpoint Maximum $78,537 - $106,024 - $133,511 Personnel in this job title may be covered by NERC CIP cyber security standards. If the position is covered, prior to being hired, promoted, or transferred into the position, the candidate must successfully pass a Personnel Risk Assessment, which includes identity verification and a criminal background check. Prior to being granted unescorted access to cyber secure areas, the candidate must attend cyber security training. Annual cyber security training is also required.
SUMMARY:
Acts as an IT security subject matter expert and technical consultant for security initiatives. Functions as technical engineer, system architect and operational support for the Identity Management (IDM) suite of products. Analyzes the security of systems and applications, and develops security baselines to protect information against unauthorized access. Conducts forensic investigations including investigations done in coordination with other departments.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Assesses, designs, and recommends security access requirements for systems and applications; creates ad hoc reports for review
Collaborates with enterprise architecture on the development of system and application security standards and baselines
Provisions electronic access for supported systems and applications in accordance with the Enterprise Access Provisioning Program
Ensures all access issues are handled in a timely manner and that supported systems are functioning properly
Creates, modifies and deletes profiles and other access controls as part of Role Based Access Control (RBAC) program
Provides routine reaccreditation of existing users and associated entitlements
Produces evidence in support of Company policies and regulatory requirements, such as Sarbanes-Oxley (SOX) and North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)
Participates in projects as a subject matter expert in support of business initiatives; ensures project work is completed in a timely manner in accordance with Information Security policies, programs and standards; oversees and continuously improves the Enterprise Access Provisioning Program
Performs user access reviews supporting Company investigation needs; assists with data preservation requests for litigation holds; conducts digital forensics in support of the Information Security program
Ensures teamwork to reduce security exposures
COMPETENCIES:
Strong knowledge of Company business practices and familiarity with Company products and services
Strong knowledge of digital forensic steps and incident response
Ability to develop and make recommendations for complex security processes, procedure improvements and management level security standards
Ability to identify best practices for security risk assessments, policies, standards and processes
Extensive policy, process, and standard development experience
Ability to demonstrate leadership skills and provide guidance to less experienced team members
QUALIFICATIONS
MINIMUM EDUCATION AND/OR EXPERIENCE:
Bachelor's degree from a four-year college or university in Information Resource Management, Business Computer Systems, Computer Science or Computer Security with five to seven years related experience, or equivalent combination of education and/or experience related to the discipline.
COMMUNICATION SKILLS:
Ability to maintain positive and productive working relationships with various individuals and groups
Ability to recognize and initiate complex tasks without direction
Ability to read and interpret technical manuals and reports, instructional documents, and procedure manuals
Ability to write procedural documentation and user instructions
Ability to speak effectively with various individuals, groups, and vendors
MATHEMATICAL SKILLS:
Ability to calculate figures and amounts such as discounts, interest, commissions, proportions, percentages, area, circumference, and volume
Ability to apply concepts of basic algebra and geometry
COMPUTER SKILLS:
In-depth knowledge and experience with Linux/UNIX servers, client & server applications and information security issues
In-depth knowledge of Microsoft, Linux and UNIX server security functionality
In-depth knowledge of related security software
In-depth knowledge of database product security technology, specifically Oracle and SQL, and general knowledge of physical security methods
ANALYSIS AND PROBLEM-SOLVING ABILITY:
Ability to understand and assimilate complex technical information. Ability to solve partial problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.
DECISION MAKING:
Ability to make access management and provisioning decisions without direction, in accordance with Company policies, procedures and programs. Examines potential areas for service improvement and makes recommendations for changes to senior staff or management.
PHYSICAL DEMANDS:
While performing the duties of this job, the employee is regularly required to sit up to 2/3 of the time and talk and listen for long periods of time.
WORK ENVIRONMENT:
Office environment.
SAFETY AND ADA STATEMENT
Safety Statement:
Safety is a core value at (TXNM Energy/PNM/TNMP) and our vision, "everyone goes home safe", reflects our commitment to promoting an environment conducive to learning, improving and building safety practices. Our safety value is built upon the belief that every employee deserves to work in an environment free from harm.
Americans with Disabilities Act (ADA) Statement:
If you require assistance with the job application process due to a disability, please contact HR ADA Analyst, at ************.
Information Security Engineer
Information security analyst job in Houston, TX
Description About Us: By combining a rich legacy in the power and gas compression space with pioneering technology, INNIO brings our customers affordable, reliable, and sustainable energy solutions for today-and tomorrow. We are helping to meet today's energy needs with 64 GW of installed capacity and 48,000 of our powerful Jenbacher and Waukesha engines, which can be found in more than 100 countries. And, by harnessing our history of energy industry firsts along with the power of digital innovation, we will continue to deliver for the future. Welcome to a World of Innovation and Inspiration! Welcome to INNIO!Work Structure:
The Information Security Engineer will be based at our Houston, TX office in a hybrid capacity, with a combination of onsite & remote workdays.
Occasional travel to data centers or branch offices as needed in the US, Canada and/or Mexico.
Position Responsibilities:
The Information Security Engineer will focus on incident response & automation including coordinating day‑to‑day incident handling with internal teams and SOC Provider: triage, scoping, containment, recovery, and documentation.
Maintain and improve response playbooks, runbooks, enrichment pipelines, and case workflows; ensure consistency and auditability.
Prioritize and deliver automation for high‑volume tasks (enrichment, correlation, evidence collection, notifications, containment actions).
Tune alerts and data pipelines to improve signal‑to‑noise and reduce manual touches; track and report on detection/response quality metrics.
Translate incident lessons into preventive controls and configuration changes (identity, endpoint, AD, cloud) in partnership with platform owners.
Keep risk records and asset mappings up‑to‑date; link incidents to risks, treatments, and control improvements.
Prepare audit evidence and contribute to policy/procedure updates to sustain ISMS compliance.
Mentor analysts on triage methods, documentation quality, and safe automation practices; participate in tabletop exercises.
Minimum Requirements:
4+ years in incident response or security engineering with measurable improvements to detection/response and workflow automation.
Proficiency with enterprise security tooling (e.g., EDR/MDR, log analytics/SIEM, identity/AD, M365 security) and case management platforms.
Scripting/query ability for automation and investigations (e.g., Python, PowerShell, KQL/SPL/SQL‑like).
Experience operating within an ISMS and supporting ISO 27001/27005 processes and audits.
Strong cross‑functional communication and documentation skills.
Preferred Skills:
Designing automation backlogs and value tracking (time saved, error reduction, MTTR impact).
Exposure to risk tooling (ServiceNow IRM or similar) and control mapping (e.g., MITRE ATT&CK).
Hardened identity/endpoint/AD change implementations and validation via purple‑team/attack simulation.
Certifications such as GCFA, GCIA, GCIH, Azure Security Engineer, Microsoft Security Operations Analyst, or equivalent.
INNIO offers a great work environment, professional development, challenging careers, and competitive compensation. INNIO is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, gender (including pregnancy), sexual orientation, gender identity or expression, age, disability, veteran status or any other characteristics protected by law.
Auto-ApplyIT Security Engineer
Information security analyst job in Houston, TX
Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs
Position : IT Security Engineer
Location: Houston, TX
Duration: Full Time
Job Description :
The IT Security Engineer will support all Client personnel, both local and remote, by providing reliable and efficient security support services.
Network Security
The candidate will report to local management team and work with senior technical architects, leads and SMEs. This position requires strong knowledge in security operations. Candidates should be very experienced in large scale network security design, deployment and support. Work with vendors to resolve problems via ticketing portals and escalating issues to team lead and/or management as needed. Meet with client and partners as needed. Provide regular status summaries and reports to team lead and/or management as required. The successful applicant will be rewarded with a wide variety of technologies to master along with a closely-knit, enthusiastic team and plenty of room to grow their career within the division or within other divisions of Wipro as appropriate. Perform application and infrastructure security vulnerability assessments. Research and respond to identified security vulnerabilities. Assume rotational 7x24 on-call duties with other team members. Respond to client requests and other project tasking as needed.
Qualifications, Skills & Education Required:
• Good communication, presentation and interpersonal skills
• Bachelor's degree in a technical field (engineering, sciences, etc.) from an accredited college/university or additional 5 years of overall security experience
• Must have a sound knowledge and change management experience on ITIL V3
• Strong Networking background combined with Strong Security
• Must have ability to support flexible schedule in support of 7x24 staff.
• Relevant certifications such as GSEC, CCSA, CCSE,CISSP, etc.
• Expert level knowledge of installing, deploying, documenting, and troubleshooting network perimeter security technologies such as firewalls, proxy servers, intrusion prevention/detection (IDS/IPS), SIEM, antivirus, antimalware, antispam and unified threat management (UTM).
• Must be well versed in TCP/IP, IPSec, SSL, PKI, VLANs, system hardening, and troubleshooting.
• Experience with application and infrastructure security auditing processes.
Thanks & Regards
Rahul Kumar
Ventures Unlimited Inc.
Tel: ************ Ext - 157 / Mobile : ************
Additional Information
Contact
"Rahul Kumar
" for more details at
************ Ext:157
IT Analyst
Information security analyst job in Houston, TX
We are seeking a skilled and detail-oriented IT Analyst to join our team. The IT Analyst will be responsible for supporting IT infrastructure, troubleshooting technical issues, and assisting in the implementation of IT solutions that enhance operational efficiency. The ideal candidate will have strong analytical skills, a proactive approach to problem-solving, excellent customer service skills, and the ability to work collaboratively with various teams.
Your Responsibilities:
* Provide first and second-level IT support to end users, troubleshooting hardware, software, and network issues.
* Assist in the deployment, configuration, and maintenance of IT systems, including workstations, network equipment, and mobile devices.
* Create, maintain and update IT documentation, SOP's, including asset inventories, network diagrams, and user guides.
* Collaborate with internal teams and external vendors to implement and lead small size projects and organization initiatives.
* Support cloud-based applications and platforms, ensuring seamless integration and functionality.
* Manage user accounts, permissions, and access control across various IT systems.
* Assist in the development and enforcement of IT policies, procedures, and best practices.
* Provide training and guidance to employees on IT tools and cybersecurity awareness.
* Participate in IT audits, risk assessments, and compliance initiatives.
* Assist with new hire onboarding and IT orientation, ensuring smooth setup of IT resources and accounts.
Skills - Qualifications:
* Strong knowledge of Windows operating systems, Active Directory, and Office 365.
* Experience with networking concepts, including TCP/IP, DNS, DHCP, and VPN.
* Familiarity with IT security principles, firewalls, antivirus software, and endpoint protection.
* Knowledge of cloud computing platforms such as Azure and SharePoint is an asset.
* Highly motivated with the ability to work independently.
* Strong communication and interpersonal skills, with the ability to explain technical concepts to non-technical users.
Education/Experience:
* Minimum of 2-4 years of experience in IT support, systems administration, or a similar role.
* Certifications such as CompTIA A+, Microsoft Certified: Azure Fundamentals, or ITIL Foundation are a plus.
* Successfully managed small- to medium-sized projects for a minimum of two years.
What We Offer:
As a full-time non-exempt associate, you will be eligible for full comprehensive benefits to include your choice of multiple medical plans, dental, and vision. In addition, you will be eligible for time off benefits, paid holidays, and a 401k with company match. Occasional travel may be required to attend training and other company functions.
Compensation: $34 - $36 / hour
Disclaimer:
This is not an all-inclusive job description; therefore, management has the right to assign or reassign schedules, duties, and responsibilities to this job at any time.
#LI-SC1
#I-CO1
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst
Information security analyst job in Houston, TX
Job Title: Information Security Analyst - Threat & Vulnerability Management
Job Location: Downtown Houston, TX 77002*Prospective candidates MUST be located in the HOUSTON, TX area. Job Type: Contract/Full Time
has a duration of 6-months.
Job Schedule: Mon-Fri 8AM-5PM
*This contract role is hybrid (4-days onsite/1-day WFH).
Job Salary:$42-$45/hour
*Depending on experience.
Project Overview
The Information Security Analyst will support key cybersecurity initiatives including SIEM operations, automation, incident response processes, and integration of security tools. This role is critical to advancing our security operations and maturity.
Role and Responsibilities
Contribute to the development of cybersecurity strategies, objectives, and project plans
Assist with design and implementation of improved cybersecurity processes and services
Administer and maintain cybersecurity technology platforms for the Elections Administrative Department and the Enclave Department
Fulfill customer requests and support daily security operations, including incident monitoring, analysis, and response
Analyze cybersecurity threats and vulnerabilities and develop appropriate mitigation strategies
Create documentation including procedures, job aids, reports, metrics, and presentations
Participate in Cybersecurity Incident Response Team (CIRT) investigations and activities
Scheduled Milestones & Deliverables
Enhance maturity of SIEM, SOC, and Incident Response processes
Integrate automation best practices
Improve Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)
Performance Metrics
Completion of projects related to SIEM and other security platforms (e.g., incidents, alerts, tickets)
Availability and uptime of systems
SOC effectiveness
Compliance with defined processes and procedures
Requirements
Highlighted Requirements
2+ years of SIEM experience, preferably with Azure Sentinel and Kusto Query Language (KQL)
Multi-year, direct experience in Incident Response, ideally in an Incident Response Team or MSSP setting for medium to large organizations
Practical experience with tools within the Microsoft security stack
Key Skills
Cyber Incident Response
KQL - Deep understanding and hands-on experience
SOC Analyst / Operations - Level 1, 2, and 3 (Triage, Escalation)
SIEM Administration - Managing, maintaining, creating custom detections/logging
SentinelOne - In-depth knowledge for incident handling, hunting, queries, and detections
Linux Administration - Comfortable with navigation, configuration, and server management
Microsoft Cloud Security Tools - Understanding of architecture and platform use
Additional Skills
Data analysis and reporting
Education
Required: High School diploma or GED equivalent
Preferred: Bachelor's degree or currently pursuing a degree in Information Systems, Information Assurance, Cybersecurity, IT, Computer Science, or a related field
Certifications
Required/Preferred:
CompTIA Security+
CompTIA Network+
Other relevant industry certifications
Experience
Minimum of 5 years of progressive work experience in Information Security, IT, Computer Science, or a related field
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.