Security Analyst with Active Directory, SIEM and EDR skills - 100% onsite
Information security analyst job in Arlington, TX
3 month contract to hire
Rate: $55-60/hr
Salary: $100-120k/yr
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
Security Analyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
· Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
· Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
· DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
· Active Directory Sites and Services
o Management of sites and subnets
· Active Directory Domains and Trusts
o Management of domain trust configuration
· Group Policy Management
o Troubleshooting and cleanup of GPOs
· Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
· Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
· Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
· Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
· Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
· Ability to participate in a weekly call rotation
· IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
operational
· On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
· Mentoring and Training
o .Responsible for the mentoring of Security Administrators
· Ability to travel overnight
Qualifications
Education and/or Experience
· High school diploma or general education degree (GED)
· One to four years' experience in an IT related field
· Knowledge of IT Security Operations and Forensic Operations
· Experience with computer networks
· Experience with project management and delegation
· Business communication and collaboration skills
· Documentation skills
· Ability to work well within a team, and work alone to accomplish tasks independently
· Ability to interpret research into solutions to actual problems
· Customer Service skills
· Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
· Proficiency with MS Office and email
Information Security Analyst
Information security analyst job in Irving, TX
Mid-Senior career position responsible for supporting defense of information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction via support, maintenance and enhancement of our client's Oracle application.
Qualifications
Minimum of three years of hands-on experience implementing or maintaining Oracle EBS & GRC security controls, rules, responsibility design and administration
Oracle EBS security user and role administration duties
CISA, CRISC or CGEIT, or equivalent certification preferred.
Functional knowledge of Oracle EBS and GRC and Oracle Cloud
Strong understanding of current and developing information security administration practices and technologies
Strong knowledge of role-based access management controls and practices
Additional Information
All your information will be kept confidential according to EEO guidelines.
Microsoft 365 Information Security Specialist
Information security analyst job in Taylor, TX
Hybrid Wed and Thursday onsite in Taylor TX- NO EXECPTIONS
US Citizens, Green Cards only for this role. No subcontracting or sponsorship.
We are seeking highly skilled Microsoft 365 Information Security Specialists to join our team. The ideal candidates will be responsible for planning and implementing information security measures for sensitive data using Microsoft Purview and related services. This role is critical in mitigating risks by protecting data within collaboration environments managed by Microsoft 365 from both internal and external threats, as well as securing data utilized by AI services.
Key Responsibilities:
Information Protection: Implement information protection strategies to safeguard sensitive data.
Data Loss Prevention (DLP): Develop and enforce DLP policies to prevent unauthorized data sharing and leakage.
Data Retention: Establish and manage data retention policies to ensure compliance and regulatory adherence.
Insider Risk Management: Monitor and manage insider threats by identifying and mitigating potential risks.
Information Security Alerts and Activities: Oversee and respond to information security alerts, ensuring timely and effective actions.
Data Classification Label Strategy: Develop and implement a strategy for data classification and labeling to ensure proper handling of sensitive information.
Identity and Access Management (IAM) Strategy for Collaboration Services: Design and manage IAM strategies to secure access to collaboration services within Microsoft 365.
Data Security Posture Management: Continuously assess and improve the security posture of data within Microsoft 365 environments.
Collaboration with Governance and Security Roles: Work with roles responsible for governance, data, and security to develop policies aimed at achieving the organization's information security and risk reduction goals.
Stakeholder Collaboration: Collaborate with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support necessary policies and controls.
Incident Response: Participate in responding to information security incidents, ensuring appropriate measures are taken to mitigate and resolve issues.
Entra ID Administration: Manage user identities and access, enforce security policies, and oversee identity governance.
Exchange Online Administration: Maintain and troubleshoot email services, ensure data integrity and compliance.
Exchange On-Premises Infrastructure Management: Manage the on-premises Exchange infrastructure for SMTP Relay and business continuity support.
License Management: Optimize license allocations, ensure compliance with software licensing agreements.
Azure Information Protection: Implement data classification, labeling, and encryption policies to protect sensitive information.
Data-at-Rest Encryption: Apply and manage encryption solutions for stored data, including managing Thales HSMs to support encryption requirements.
Service Onboarding: Facilitate smooth integration of new services into the existing IT ecosystem.
Entra ID Service Principal Management: Administer service principals, configure permissions, and manage automated workflows, including the creation, rotation, and expiration of secrets and certificates.
Managed Identities in Microsoft Entra: Oversee the creation, configuration, and management of managed identities, ensuring secure access control and continuous monitoring.
Entra ID Federation Administration: Manage identity federation, enabling seamless single sign-on experiences.
Business Continuity: Develop and test disaster recovery plans, ensure service resilience.
Training and Support: Provide training and support to end-users and administrators, ensuring they are proficient in using the software.
Documentation: Maintain detailed documentation of security policies, procedures, and incident responses.
Qualifications:
5-7 years of experience in managing and securing Microsoft 365 environments.
Bachelor's degree or higher in Computer Information Systems or an equivalent field.
Advanced knowledge of Microsoft Purview, Entra ID, Exchange Online, SharePoint Online, and Exchange On-Premises.
SME in Purview
Expertise in Azure Information Protection and data-at-rest encryption.
Strong knowledge of security and compliance features within Microsoft 365, such as data protection, encryption, access control, and data retention.
Excellent analytical and troubleshooting skills to resolve technical issues efficiently.
Ability to use PowerShell for automation and management tasks.
Familiarity with identity federation and business continuity planning.
Looking for:
Microsoft 365 Certified: Fundamentals
Microsoft 365 Certified: Administrator Expert
Microsoft 365 Certified: Information Security Administrator Associate-Highly preferred OR higher.
Security Systems Analyst
Information security analyst job in Plano, TX
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Description
• Deploy and maintain a full suite of endpoint security products.
• Responsible for ensuring high level of systems security compliance.
• Maintain pertinent site location details to ensure proper incident management ticket routing.
• Perform incident triage and handling by determining scope, urgency and potential impact
• Provide support for vulnerability assessments tools across multiple vendors.
• Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists.
• Maintain and expand related information security metrics.
Qualifications
• 5+ years supporting workstation and server operating systems.
• 1 year incident response and malware removal experience
• 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc.
• Basic knowledge of network and perimeter security methodologies and tools.
Additional Information
Looking only for W2, No C2C ( Referral and H1B Transfer will work )
Analyst, Information Security
Information security analyst job in San Antonio, TX
Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
* Conduct risk and security assessments through vulnerability analysis and reporting
* Perform mitigation support for both internal and external security audits
* Investigate, analyze and document security incidents to identify and document the root cause
* Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
* Partner with IT Operation teams to remediate system vulnerabilities
* Participates in the production of documentation and management reporting
* Research security enhancements and make recommendations for improved policy and process
* Analyze IT requirements and provide objective advice on the use of new IT security offerings
* Stay up-to-date on information technology and cybersecurity trends and standards
* Other IT Security-related duties as required
* Capable of identifying, evaluating and mitigating significant risks within an enterprise.
* Strong working experience with Microsoft Office Suite.
* Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
* Possess strong analytical skills attention to detail.
* Ability to prioritize assignments while working on multiple projects
* Ability to work independently and proactively to meet assigned objectives
* Flexible with the ability to multi-task, effectively prioritize and work under pressure
* Basic project management
* Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
* Analyze, report and respond to security alerts within the various IT technologies and global locations
* Proactively remediate information technology security threats as a member of the security team
* Assist in the designing, documenting, architecting and implementing IT security measures and controls
* Provide support through 'Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
* Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
* Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
* Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered.
* 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
* 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
* 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
* 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
* IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
* SDLC, and understand application security.
* Containerization and Development Security Operations
Benefits that make life better:
* Comprehensive Healthcare
* 401(k) with 100% company match; up to 5% vested
* Paid Time Off starting on day one
* Bonus opportunities
* Health- & Dependent Care Flexible Spending Accounts
* Short- & Long-Term Disability
* Life & AD&D Insurance
* Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
Auto-ApplyInformation Security Analyst
Information security analyst job in Southlake, TX
An Information Security Analyst is responsible for protecting an organization's systems and data by identifying risks, implementing security controls, and ensuring compliance with policies and regulations. They monitor for threats, investigate incidents, and collaborate with IT and development teams to embed security into technology operations, maintaining a strong and proactive security posture across the organization.
Principle Responsibilities
* Monitor, analyze, and respond to security alerts and incidents to protect sensitive member and staff information.
* Conduct regular risk assessments across ministry and operational systems, recommending practical steps to strengthen security.
* Develop and maintain security policies, standards, and procedures that reflect organizational values of stewardship and integrity.
* Partner with IT, development, and ministry teams to ensure security is embedded into systems, applications, and digital tools used across campuses.
* Manage and optimize core security platforms (e.g., endpoint protection, identity access, email security, SIEM, MFA) to safeguard all environments.
* Support compliance with applicable data protection standards and nonprofit regulations, ensuring responsible handling of personal and financial data.
* Perform periodic access reviews and internal audits to confirm appropriate data access and adherence to policy.
* Lead or assist in incident response efforts, including investigation, documentation, and recovery.
* Provide training and guidance to staff and volunteers to promote a culture of cybersecurity awareness and safe technology use.
* Collaborate with vendors and external partners to align solutions with organizational needs, budget constraints, and mission objectives.
Required Skills and Job Complexity
a) Unique Skills and Knowledge
* Excellent communication skills, with the ability to convey complex security concepts clearly.
* Personable and outgoing, with a friendly demeanor.
* Technically savvy and comfortable using various security and compliance software platforms.
* Eagerness to learn and adapt to new technologies and security practices.
* Passionate about customer support and the role it plays in creating a secure, customer-centric team.
* Strong problem-solving skills with the ability to prioritize and manage multiple tasks.
* Flexibility and adaptability to evolving security threats and technologies.
* Proactive and mission-driven, dedicated to seeing tasks through to completion.
b) Problem Solving and Decision Making
* High level of resourcefulness, knowing when and where to seek information or ask for help
* Solution-oriented approach to security challenges.
* Excellent listening skills with the ability to ask probing questions, understand concerns, and resolve issues.
c) Relational Connections
* Gateway Staff (all locations)
* Part-time staff and high-capacity volunteers.
* Maintain vendor relationships
d) Physical Capabilities
* Able to pick up and carry large items such as monitors and desktop computers, cameras, servers and uninterruptible power supplies.
Competencies Critical to this Position
Core Competencies
* Punctual and reliable
* Customer service-centered
* Proactive
* Team player
* Teachable
Technical Competencies
* 5+ years of experience in IT security and compliance
* Identity & Access Management (IAM): Administer and secure user access across systems using tools like Microsoft Entra ID, Okta, and MFA enforcement.
* Threat Monitoring & Incident Response: Detect, investigate, and respond to security events using SIEM tools such as Microsoft Sentinel.
* Endpoint & Network Protection: Manage and maintain defenses like Microsoft Defender, firewalls, and secure configurations for on-prem and cloud environments.
* Risk & Vulnerability Management: Identify, assess, and remediate security risks through regular vulnerability scans, audits, and patching processes.
* Compliance & Data Protection: Ensure alignment with data privacy standards (e.g., NIST, CIS Controls, GDPR, HIPAA) and safeguard sensitive member and staff information.
Key Performance Measurements
* Timely completion of assigned tasks and projects.
* Ability to give and receive feedback to the Technology Team as well as end users.
* Contribution to knowledge base articles and security documentation.
* Ability to quickly understand, maintain, and implement new security technologies.
* This description is not all inclusive, and other duties may be assigned as necessary.
Gateway Church does not discriminate in employment opportunities or practices on the basis of race, color, sex, national origin, age, disability, or any other characteristic protected by law as it applies to churches. However, Gateway Church does discriminate on the basis of religion.
Requirement: All Staff must be a member or become a member of Gateway Church upon employment
Auto-ApplyInformation Security Analyst 2
Information security analyst job in San Antonio, TX
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Auto-ApplySenior Manager, Information Security Office Consultant
Information security analyst job in Waco, TX
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Network Security Analyst
Information security analyst job in Austin, TX
Support senior cybersecurity staff in evaluating cybersecurity risks across commercial real estate (CRE) environments. Responsibilities include assisting with network security assessments, reviewing access controls, identifying common misconfigurations, running vulnerability scans, documenting networks/systems, and preparing clear reports. Scope spans both IT and OT (building systems such as BMS/BAS, HVAC, access control, CCTV).
Key Responsibilities
Perform asset discovery and initial scans to identify hosts, services, and firmware versions (e.g., Nmap).
Review firewalls, VPNs, and endpoint security to identify misconfigurations and vulnerabilities
Evaluate switch/router configurations for proper segmentation
Document current-state diagrams and asset inventories
Assess BMS/BAS, IoT, and physical security systems for cyber risk with minimal disruption to operations.
Identify common gaps (weak/default credentials, unpatched systems, outdated TLS, flat networks, exposed management interfaces, insecure vendor remote access).
Support remediation by coordinating with IT teams, vendors, and property managers; verify fixes and retest critical findings.
Prepare and maintain assessment artifacts: asset lists, risk-rated findings, evidence, compliance checklists, and client-ready reports.
Track emerging threats and advisories relevant to smart buildings/IoT and CRE environments; summarize impact for the team.
Qualifications
Associate's or Bachelor's in Cybersecurity/IT (or 2+ years equivalent hands-on experience).
Familiarity with core security technologies: Firewalls (e.g., Fortinet, Palo Alto), IAM/MFA (e.g., Entra ID/Azure AD), and EDR (e.g., SentinelOne).
Intermediate networking: TCP/UDP, routing basics, Layer-3 switches, VPNs (IPsec/SSL), VLANs, ACLs, NAT, DHCP/DNS, Wi-Fi/WPA3.
Working knowledge of Windows client/server; basic Linux familiarity.
Strong documentation and communication skills; ability to translate technical findings into clear business impact.
Nice to Have
Exposure to vulnerability management tooling and concepts.
OT/IoT awareness: BACnet/Modbus basics, safety-first testing on live control networks, maintenance-window/change-control etiquette.
Firewalls and platforms: Palo Alto, Fortinet, Check Point; switch stacks (Cisco Catalyst/Meraki, UniFi).
Identity, privileged access, and remote access hygiene
Endpoint and device management
Scripting/automation
Ticketing and knowledge tools (ServiceNow/Jira/Confluence); diagramming (Visio/draw.io).
Familiarity with frameworks and benchmarks: NIST CSF 2.0, CIS Controls
Travel: Regular on-site visits to local properties (50%) with occasional out-of-area travel (5-10%)
Benefits
Medical, dental, and vision insurance
Life insurance
Long-term disability
Paid vacation
Paid holidays
Simple IRA (401K equivalent) for eligible employees
Stocked snack bar
Company-sponsored outings
Fitness center onsite
Network Security - Cisco ASA Checkpoint
Information security analyst job in Plano, TX
Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint
Type: Contract
We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments.
Primary Technical Skills
SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat.
Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection.
Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies.
Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules.
Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback.
Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis.
High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments.
Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing.
Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows.
User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance.
Secondary Technical Skills
SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution.
Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP.
Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks.
SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel.
Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement.
DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection.
Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies.
Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning.
Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls.
Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation.
Required Experience
8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations.
Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement.
Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation.
Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking.
Experience in incident response, forensics, and policy rollback in production SSE environments.
Preferred Qualifications
Experience with hybrid cloud security models and multi-cloud segmentation strategies.
Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs).
Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS.
Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning.
Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration.
Nice to Have
Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA)
AWS/Azure Security Specialty
CISSP or CCSP
Network Security Analyst
Information security analyst job in San Antonio, TX
Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyInformation Security Architect Manager
Information security analyst job in Texas
Company Details
Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible.
Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “
What's Next
” in our industry and beyond.
With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions.
Berkley Technology Services: Right Team, Right Technology, Simple and Secure.
Responsibilities
The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC. This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley Technology Services' technological assets and services.
Spearhead the architectural design, deployment, and management of cutting-edge security solutions, including but not limited to SIEM, EDR, PAM, Data Access Governance, Identity Governance, Cloud Access Security Brokers, and WAFs.
Architect and sustain the security infrastructure, ensuring seamless integration with existing technology ecosystems.
Craft and execute architectural strategies for bolstering vulnerability management, security automation, and the safeguarding of infrastructure.
Guide the formulation and continuous refinement of security policies and procedures, with a spotlight on architectural best practices.
Cultivate an environment of innovation within the team, promoting continual learning and professional advancement.
Function as a principal consultant and subject matter authority on information security architecture, offering pivotal guidance to internal teams and key stakeholders.
Develop and maintain roadmaps for critical security infrastructure components, aligning them with the strategic goals of the organization.
Collaborate with fellow Information Security leaders to forge a unified and robust Information Security Framework and Strategy.
Perform regular technology evaluations, risk assessments, and devise appropriate remediation strategies.
Lead and nurture a team of security architects and engineers in a fast-paced, global setting.
Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary.
Qualifications
Demonstrated expertise in Information Security Architecture, with practical experience in the design and management of a broad spectrum of security technologies.
Exceptional leadership and communication capabilities, adept at guiding global, interdisciplinary teams.
Deep familiarity with contemporary cybersecurity trends and a commitment to remaining at the cutting edge of technology.
Desirable certifications include CISSP, CISM, CEH, or other relevant qualifications.
Proficiency in cloud security architecture and solutions, with experience in AWS, Azure, or Google Cloud platforms.
Expertise in security frameworks such as NIST, ISO 27001, and CIS.
Strong analytical and problem-solving skills, capable of making informed decisions in complex scenarios.
Ability to foster relationships and collaborate effectively with various internal and external stakeholders.
Commitment to ethical conduct and a deep understanding of regulatory compliance requirements relevant to the insurance and financial sectors.
Bachelor's or Master's degree in Computer Science, Information Security, or a related discipline, or equivalent experience.
Behavioral Core Competencies
Flexibility
Customer Service Oriented & Operational Effectiveness
Personal Ownership
Quick Decision Making
Team Builder
Transformational Leadership
The Company is an equal employment opportunity employer.
Not ready to apply? Connect with us for general consideration.
Auto-ApplyCyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)
Information security analyst job in San Antonio, TX
Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff. Work Schedule 7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department
Essential Job Functions
* Leads analysis and development of the integration, testing, operations, and maintenance of system security.
* Leads assessments of systems and networks and identifies deviations.
* Maintains access control and collection gaps.
* Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards.
* Prepares and executes system tests to evaluate optimization.
* Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response.
* Executes and manages a Security Awareness Training Program and provides data for reports.
* Leads security "tiger team" in the prosecution of vectors, hackers, and various threats.
* Assist superiors in the production of the Alamo Region Security Operation Center products.
* Performs related duties and fulfills responsibilities as required.
Job Requirements
* Bachelor's degree from an accredited college or university.
* Four (4) years of relevant technical, cyber security, and business work experience.
* CompTIA Security+.
* GIAC: GPEN or GWAPT.
* Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
* Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations.
* Experience leading agile efforts.
* Experience in coaching and mentoring team members.
* Scrum Master, Agile Certifications.
Applicant Information
* Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university.
* Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted.
* Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application.
* If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents. may be attached to the application for consideration in advance.
Knowledge, Skills, and Abilities
* Knowledge of 7 NICE Framework Workforce Categories.
* Knowledge of business operations, systems requirements, and IT processes and technologies.
* Knowledge of information and data analysis and reporting.
* Knowledge of Cyber Security system design, programming principles, processes, and tools.
* Knowledge of strategic planning and change management.
* Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI.
* Skill in interpersonal communications and analytical thinking.
* Skill in technical writing.
* Ability to perform all the essential functions of the position, with or without accommodations.
* Ability to work in an office environment.
Senior Security Engineer
Information security analyst job in Cedar Park, TX
Job DescriptionSalary:
We are seeking an experienced Senior Security Engineer to join our growing team in Austin, Texas. This individual contributor role will support clients across the New Mexico and Texas regions, focusing on security frameworks, network engineering, and infrastructure management. The successful candidate will serve as a technical escalation point while supporting project management functions and maintaining strong client relationships.
Key Responsibilities
Technical Leadership
Implement and maintain security frameworks in regulated industry environments.
Execute cloud migration strategies and endpoint management solutions.
Provide systems and data center engineering expertise.
Serve as escalation management point for complex technical issues.
Conduct independent reviews of technical documentation and develop remediation plans.
Infrastructure Management
Storage Systems:Pure Storage, ExaGrid, Dell, HPE
Server Platforms:Dell, HPE, IBM (IBM Z mainframe experience highly valued)
Networking Equipment:Cisco, Aruba, Juniper, Extreme Networks
Specialized Technologies:InfiniBand, High Performance Computing
Project Support
Collaborate with Project Management team based in Albuquerque.
Provide quality assurance review of project scopes of work.
Reset client expectations and relationships when projects encounter challenges.
Coordinate remediation efforts and delegate follow-up activities to PM team
Client Relations
Maintain and develop business relationships within target market segments.
Support MSP/VAR partnerships
Focus on K-12 education and local government sectors in Austin, Houston, and San Antonio markets.
Required Qualifications
Experience
10+ years of network engineering experience
7-10 years of security framework implementation or regulated industry experience
Demonstrated expertise in systems and data center engineering.
Certifications & Technical Skills
Required:CISSP certification with at least one concentration area
Preferred:SANS Institute certifications, IEC credentials
Focus:Blue team defensive security approach (red team/offensive security not primary focus)
Experience with GEC (Global Enterprise Cybersecurity) frameworks
Core Competencies
Master-level understanding of fundamental infrastructure technologies.
Proven project management and escalation management capabilities
Strong technical documentation and remediation planning skills
Experience working in MSP/VAR environments.
Preferred Qualifications
High Performance Computing (HPC) experience
IBM Z mainframe experience
Existing business relationships within K-12 or local government sectors
Experience supporting geographically distributed client base.
Eligibility & Work Location Requirements
Candidates mustreside in the Austin, Texas areaor be within reasonable commuting distance to Ardhams offices.
This position isnot eligible for relocation assistance.
Candidates must belegally authorized to work in the United Stateswithout the need for current or future sponsorship.
Employment is contingent upon successful completion of background and employment verification checks.
What We Offer
This role provides the opportunity to work directly with senior leadership while maintaining technical expertise as an individual contributor. You will have significant autonomy in technical decision-making while supporting critical client relationships across diverse industry verticals.The position offers exposure to cutting-edge technologies, complex problem-solving scenarios, and the opportunity to serve as a technical leader within a growing organization serving the Texas and New Mexico markets.
About Ardham Technologies
Ardham Technologies is headquartered in Albuquerque, New Mexico, and is experiencing rapid growth throughout the Southwest and Texas regions. As an exciting and innovative technology company, Ardham Technologies is dedicated to powering clients into the future of IT through comprehensive managed services and cutting-edge technology solutions.Our mission is to transform how organizations approach their technology infrastructure by delivering innovative managed offerings that drive business success. With our expanding presence across multiple markets, we provide our team members with exceptional opportunities for professional growth while working with diverse clients across various industries. Join Ardham Technologies and be part of a dynamic team that's shaping the future of managed IT services in one of the fastest-growing technology markets in the country.
As part of our hiring process, youll be asked to complete a quick (~10-minute) online survey via Culture Index. This helps us better align talent with our team dynamics and ensure the right fit for both your success and ours.
Click Here to Complete
Manager, Information Security
Information security analyst job in Dallas, TX
At Bluebeam, we empower people to advance the way the world is built. We create smart software solutions that make construction sites more efficient, connected, and safe, and improve the lives of design and construction professionals everywhere. The Information Security Manager leads a team of security engineers in key functional areas, including vulnerability management, application security, incident detection and response, and security awareness.
The person in this role leads the team in maturing and defining processes, developing metrics and reporting on security risk, and adhering to SOC 2 and ISO 27001 compliance. This role requires a combination of technical acuity and strong interpersonal skills to effectively build cross-functional relationships and trust with teams like ITS, DevOps, and Engineering.
The role is Hybrid to our Dallas office.
About the Role
* Leads the security engineering team in projects and operations
* Manages penetration testing and vulnerability management programs
* Works cross-functionally to implement and improve information security-related processes
* Partners with Product and Engineering teams to improve security in the software development lifecycle
* Participates in security incident response
* Collaborates with Privacy and GRC teams to implement compliant processes
About You
* People management experience in Information Security
* Strong knowledge of information security domains including vulnerability management, identity and access management, and endpoint protection
* Experience in application security or software development
* Familiarity with AWS
* Strong project management and hands on implementation skills
* Experience working with security frameworks such as NIST CSF, CIS, and SOC 2
Bonus Points:
* Security-related certifications (e.g. CISSP, CISM, etc.)
What we offer :
* People-focused, entrepreneurial culture with the backing of a stable, global, corporate entity - Nemetschek
* Competitive compensation and benefits package
* Work-life balance fostered through a culture of diversity, inclusion, and appreciation of individual lifestyle needs
* Opportunity for continuous professional development through things like Pluralsight, conferences, and certification programs
About Bluebeam
The construction industry is adopting new technology at a feverish pace. Tablets and cell phones are replacing paper blueprints, drones are surveying jobsites in 3D, and cloud collaboration is changing the way teams work together. Bluebeam plays a crucial role in this transformation. The key to our success is a customer-focused approach to product development: we work with the industry to create solutions for the industry. Today, over 3 million people throughout the world use Bluebeam. In the US, we're a critical partner for the majority of top AEC firms, and rapidly expanding our presence globally, with offices in Sweden, Germany, and the UK.
Come design and build your future with us!
Bluebeam is proud to be an equal-opportunity workplace. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
The base pay offered will depend upon qualifications and other operational considerations. Base pay is one part of Bluebeam's Total Rewards program, which seeks to compensate and recognize employees for their work. Most sales positions are eligible for commission under the terms of an applicable commission plan, while most non-sales positions are eligible for a bonus under the terms of an applicable bonus plan. Additionally, Bluebeam provides best-in-class benefits, with 100% employee-covered health and welfare benefits and paid time off. Bluebeam is a growing company with many opportunities. If this role and/or pay range are not an exact fit, we still encourage you to apply.
The base pay range for this position is: $153,800 - $192,300
#Bluebeam #LI-Hybrid #LI-SR
Nearest Major Market: Dallas
Nearest Secondary Market: Fort Worth
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Compliance Analyst
Information security analyst job in Baytown, TX
Starting Salary Range is $71,905.60 - $75,573. The initial salary offer is commensurate with education and related work experience. The Information Security Compliance Analyst is the designated administrator of the Lee College Information Security Program TAC 202.
This position provides assistance to the Chief Information Officer in the operations of the Lee College Information Security Program, as well as oversight and implementation of system-wide information security strategies and solutions. Specific areas include IT policy, continuity of IT operations, information security risk assessment, information security operations review, and security life cycle for information systems.
Please Note: This position offers a hybrid work arrangement, blending onsite presence with remote flexibility.
* Develop, recommend, and establish policies, procedures, and practices as necessary to protect Lee College information resources against unauthorized or accidental modification, destruction, or disclosure.
* Design, coordinate and execute audit process, monitoring and procedures to assess and measure company Governance, risks, compliance with its security policies and procedures. Monitor advancements in information privacy laws to ensure organizational adaptation and compliance.
* Identify and implement proactive and reactive technical measures to detect vulnerabilities and to defend against external and internal security threats.
* Plan, implement and overseeing risk-related programs as per TAC 202 and other industry related frameworks & compliances. Creating and coordinating proper reporting channels for compliance issues. Developing compliance communications. Coordinating and scheduling required compliance training for employees.
* Provide consulting and technical support services to owners, custodians, and users in defining and deploying cost-effective security controls and protections.
* Ensures College functions in a legal and ethical manner while meeting its business goals. Responsible for developing Risk & compliance programs, reviewing company policies, and advising management on possible risks as per TAC202 state program and other best practices.
* Establish, maintain, and institutionalize security incident response procedures to ensure that security events are thoroughly investigated, documented, and reported; that damage is minimized, that risks are mitigated, and that remedial actions are taken to prevent recurrence.
* Investigate or direct Governance, Risk and compliance security issues, assess product, vulnerabilities, compliance, or operational risks and develop risk management strategies.
* Establish and publicize a security awareness program to achieve and maintain a security-conscious user community.
* Document, maintain, and obtain ongoing support for all aspects of the information security program.
* Monitor the effectiveness of strategies, activities, measures, and controls designed to protect the College information resources.
* Assure executive management's awareness of legal and regulatory changes that might impact the College information security and privacy policies and practices.
* Serve as Lee College internal and external point of contact for information security matters.
* Report frequently (at least annually) on the status and effectiveness of the information security program as directed by the Chief Information Officer (see TAC §202.73(a)).
* Have authority for information security for the entire institution (see TAC §202.71(a)(2)).
* Develop and recommend policies and establish procedures and practices, in cooperation with the information-owners and custodians, necessary to ensure the security of information and information resources against unauthorized or accidental modification, destruction, or disclosure.
* Coordinate the review of the data security requirements, specifications, and, if applicable, third-party risk assessment of any new computer applications or services that receive, maintain, and/or share confidential data.
* Verify that security requirements are identified, and risk mitigation plans are developed and contractually agreed to and obligated prior to the purchase of information technology hardware, software, and systems development services for any new high impact computer applications or computer applications that receive, maintain, and/or share confidential data.
* Serve as liaison with assigned Lee College educational centers for the purpose of monitoring information security program effectiveness and compliance with program requirements.
Perform other duties as assigned.
* Bachelor's (or higher) degree in a related field
* Five (5) years of experience designing, implementing, auditing, and/or managing information resources, information security, or risk management projects, operations, and/or programs
* Experience in the implementation of governance, risk, and compliance strategies preferred
* Experience working in a higher education setting preferred
* Experience in Texas State government preferred
* Must be able to work evenings and weekends as required
Network Security Audit
Information security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyAnalyst, Cyber Security
Information security analyst job in Houston, TX
The Cyber Security Analyst, under the direction of the Director of Cyber Security & Compliance, assists in developing, implementing, and enforcing IT infrastructure security policies, standards, guidelines and technologies. Ensures these controls effectively safeguard Information Systems against accidental or unauthorized modification, destruction, or disclosure.
ESSENTIAL FUNCTIONS
Assist with the development, implementation and maintenance of a comprehensive Information Security Program.
Assist in the development of a website for the Security Office and be responsible for maintaining the site with up-to-date content.
Coordinate and maintain security-related policies, procedures, security standards and best practices.
Contribute to the development of Security Risk Assessments and conducts risk assessments as needed.
Participate in vulnerability assessments, security evaluations and reviews.
Research and stay abreast of new vulnerabilities and exploit that may compromise the Institution.
Evaluate risk and works with inter-departmental personnel to address vulnerabilities.
Advise Departments on regulatory requirements, institutional policies, and security best practices.
Contribute to inter-departmental and cross-functional working groups.
Assist to remediate audit and assessment findings.
Assist in the development of Business Continuity and Disaster Recovery Plans.
Manage security projects and technology implementations.
Meet project deadlines.
Develop and maintain documentation for all assigned projects.
Contribute to the evaluation, implementation and management of security solutions and processes.
Provide security guidance and training to personnel.
Recommend and implement necessary technologies and processes needed to protect the Institution.
Work with the Director of Administrative and IT Security, and other technical/security staff; contributes to the development of project plans and budget proposals to address current needs and potential security issues.
Perform other duties, tasks and assignments as required.
QUALIFICATIONS
Education & Experience
* Bachelor's degree in Computer Science or a related field required
* 8 years directly-related work experience may be substituted in lieu of degree
* 5 years' experience with progressively-increasing responsibility in related subject matter
* Experience in security aspects of multiple platforms, operating systems, software, communications and network protocols
* Experience in a community college environment preferred
Licensing & Certification
* Valid Texas Driver License
Special Skills
* MS Office Programs
* Knowledge of Information Management Systems
* Knowledge of data security, access control systems, encryption and information protection methodologies and concepts
* Able to communicate technical issues to various representatives
Competencies
* Delivering High Quality Work
* Accepting Responsibility
* Serving Customers
* Supporting Organizational Goals
* Driving Continuous Improvement
* Acting with Integrity
* Thinking Critically
* Managing Change
* Communicating Effectively
Working Conditions
General Office. Must be able to perform all job requirements with or without reasonable accommodations; remain in a stationary position during shift; move items weighing up to 25 pounds; position self to operate job equipment; apply established protocols in a timely manner. Must access, input and retrieve information from technology devices; communicate with others to accomplish job requirements. May be required to work after hours to include weekends and holidays.
SECURITY SENSITIVE:
This job class may contain positions that are security sensitive and thereby subject to the provisions of Texas Education Code § 51.215
The Organization
Houston Community College (HCC) is an open-admission, public institution of higher education offering a high-quality, affordable education for academic advancement, workforce training, career development and lifelong learning to prepare individuals in our diverse communities for life and work in a global and technological society. We're proud to say that 98 percent of our graduates step into a job in their field of study immediately upon graduation. One of the largest community colleges in the nation, HCC has served the Greater Houston area for over four decades. Accredited by the Southern Association of Colleges and Schools, and the Schools Commission on Colleges, we offer 300+ associate degree and certificate programs to 75,000+ students across 13 Centers of Excellence and online each semester. We are proud to be No.1 among all community colleges in the nation in providing associate degrees to minorities and No.1 in educating international students, with 10.4 percent of our student population from outside the USA. Our vision is to become the Employer of Choice in support of our mission for Student Success by attracting, retaining and motivating the best employees.
The Team
Play a central role at HCC as you keep our everyday operations running like clockwork. You'll get the chance to make things happen and work closely with inspiring leaders across different parts of the institution. Whether your role is supportive, administrative, financial or something else, you'll be part of a dynamic team that not only provides HCC students with cutting-edge academic and career tools, it also takes care of its people.
Location
Houston is a city with limitless possibilities:
* Fourth-largest city in the U.S. and home to 54 Fortune 500 companies, second only to New York City's 55.
* 145 languages are spoken here.
* Overall after-taxes living costs are 5.6 percent below the average for all 308 urban areas recently surveyed.
* Houston is a major-league sports town, and don't forget the annual Houston Livestock Show & Rodeo.
* The weather is great! Mild winters ensure that outdoor activities can be enjoyed year-round.
* World-renowned medical care. The Houston metro area has long been known for its first-rate health care system, with many Houston area hospitals consistently ranking among the nation's top institutions.
* With over 150 museums and cultural institutions in the Greater Houston area, museums are a large part of Houston's cultural scene.
* Houston is the Culture & Culinary Capital of Texas with more than 7,500 restaurants and eating establishments covering 60+ cuisines.
If this sounds like the role for you and you're ready to join an amazing team, please apply right away.
EEO Statement
Houston Community College does not discriminate on the bases of race, color, religion, sex, gender identity and expression, national origin, age, disability, sexual orientation or veteran's status. The following person has been designated to handle inquiries regarding the non-discrimination policies:
* David Cross, Director EEO/Compliance, Title IX Coordinator
* Office of Institutional Equity
* PO Box 667517
* Houston, TX 77266
* ************ or *****************************
HCC values its employees and their contributions, promotes opportunities for their professional growth and development, and provides a positive working and learning environment that encourages diversity, innovation and creativity, and inclusion.
Individuals with disabilities, who require special accommodations to interview, should contact **************.
Easy ApplyIT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-Apply