Senior Information Assurance Engineer
Information security analyst job in San Antonio, TX
GovCIO is currently hiring a Senior Information Assurance Engineer in support of the Air Force AFSCI network. This position will be located in San Antonio TX and will be an on-site only position.
Responsibilities:
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessments and provides recommendations for application design. Involved in a wide range of computer security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Prepares security reports for government agencies.
Performs a wide range of computer security duties, including architectures, firewalls, electronic data traffic, and network access.
Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security.
Provides business continuity and disaster recovery support.
Engages in intrusion detection and prevention; provides incident reporting and response support.
Conducts ongoing monitoring of computer security requirements and compliance, maintains system security plans and risk mitigation plans.
Trains clients in proper computer security measures and prevention
Specifically, this position will:
Provide support for all vulnerability and compliance scan tool applications and modules (pre-built and customized).
Develop workflows and customize, implement, and maintain the aforementioned applications.
Develop and update standard operating procedures (SOPs) and provide training on existing and new technologies to Government personnel. This is informal office training.
Provide process and operations guides.
Provide technical support in the daily operations and evaluation of existing security tools, products, and future capabilities. Tools shall include, but are not limited to: Security Log Management, Account Management, Asset Management, Vulnerability Management, End Point Security, and any related network security tools. Current tool sets are: ArcSight, Directory Resource Administration (DRA), Automated Compliance Assessment Solution (ACAS), System Center Configuration Manager (SCCM), Tanium, Host Base Security System (HBSS) and Service Now.
Maintain operational oversight and manage Command-level and privileged user accounts for the Enterprise using provided Enterprise tools.
Prepare for and conduct customer briefings, attend, and provide minutes on Technical Exchange Meetings (TEMs), and provide status reports on cybersecurity activities.
Add so,ething about leadership briefs
Develop information systems security studies and reports that address areas of information system security concerns. Ensure cybersecurity requirements are incorporated in system development and sustainment activities. Provide consultant services in all areas of information system security, including: physical, administrative, personnel, computer, operations, and industrial security. Provide security documentation and reports within specified timeframes.
Monitor and report, IAW IC Directives and AFSCI policy, the status of security measures established by the Director of National Intelligence (DNI) and related authorizing officials that protect and defend information and information systems, web-based services, remote hosted applications, discovery, storage, operating systems, public key infrastructure (PKI), and other information technology components and applications for the Enterprise.
Maintain cybersecurity, system security, and sustainment programs. The contractor shall follow all applicable ICD and National Institute of Standards and Technology (NIST) guidance in performing day-to-day duties.
Create, edit, and review security accreditation and authorization packages for the AFSCI Enterprise. Adhere to the RMF process. Input data into appropriate A&A tool. The current toolset used is XACTA. Review logical network drawings, configurations, and control parameters to ensure they are current. Review documentation required to certify new hardware and software systems for deployment.
Monitor and administer the vulnerability and compliance scan tool.
Review AFSCI change proposals for security, interoperability, accreditation and authorization issues or vulnerabilities.
Perform vulnerability and compliance assessments. Conduct security tests and evaluations. Monitor and review Information Assurance Vulnerability Alerts (IAVA) and Information Assurance Vulnerability Bulletins (IAVB).
Track and provide results to appropriate Government entity for review IAW standard operating procedures.
Monitor and report mandated Federal Information Security Management Act (FISMA) statistics for the AFSCI Enterprise.
Provide quarterly report to appropriate Government entity in accordance with IC Directives and AFSCI policy.
Qualifications:
High School with 9+ years (or commensurate experience)
Clearance Required: Current TS/SCI
Required Skills and Experience
MUST have current one of these certifications: CISSP, CISSP-ISSMP, CISM, FITSP-M, GCIA, GCIG, GICSP, GSLC
Strong understanding of RMF workflow tools like eMASS or Xacta
Strong working knowledge of programs working within AFSCI network rules and guides
Experience with network management tools, network engineering principles, network analysis
Expert understanding of A&A process
Possess an expert understanding of current computer security requirement and compliance
Expert ability to maintain System Security and Risk Mitigation plans
Excellent written/verbal communications skills
#NSS #TMK #DSG
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $135,000.00 - USD $140,000.00 /Yr.
Cyber Security Analyst
Information security analyst job in Houston, TX
SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including:
Identifying cyber threat tactics and methods
Identifying and correcting gaps in the company's cybersecurity posture
Testing information systems for vulnerabilities
Documenting and escalating incidents
Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts
Identifying and analyzing anomalies in network traffic or log data
Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches
Responding to urgent cybersecurity events and incidents
Reviewing events and incidents to understand root causes
Monitoring reputation for hostile content directed towards organizational or partner interests
Recommend procedures and/or changes to procedures necessary for good cyber hygiene
Improve the overall cybersecurity posture of the organization's systems
Determine the operational and safety impacts of cybersecurity lapses
Prepare threat and target briefings and situational updates
Monitor threat activities and prepare threat activity reports
Manage and report on adversarial activities
EDUCATION AND REQUIRED EXPERIENCE:
A degree in business or technology is preferred (associate's or bachelors)
3-5 years of experience in IT security
Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred
Basic scripting (Python, PowerShell, Bash)
Experience with vulnerability management
Experience with network packet analysis
Experience with log analysis and log management
Experience with Cloud Security Management interfaces
Experience with enterprise authentication systems, such as directory services or identity management platforms
Experience with Incident handling and response preferred
Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes
Working knowledge of computer networking protocols including how traffic flows within a network
Working knowledge of cybersecurity laws and regulations
Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting
Ability to prioritize security requests according to urgency and established criteria
Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats
General understanding of security frameworks (NIST, MITRE Attack) preferred
Familiarity with the variations, similarities, and differences between IT and OT network environments
Experience working on project teams and project management is preferred
Intermediate understanding of Threat Intelligence research and methodologies
Familiarity with adversarial TTPs
SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS:
Demonstrate excellent communication (written, verbal and listening) and interpersonal skills
Superior organizational skills and attention to detail
Must possess a proven ability to deliver high-quality customer service
Ability to triage and prioritize security related data quickly
Ability to respond to work after hours and weekends as needed
PHYSICAL DEMANDS:
Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
information security systems engineers
Information security analyst job in Rockwall, TX
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
L3Harris Engineering & Security Hiring Event - Richardson, Texas
Must have a minimum of 3 years relevant experience and be eligible to obtain a DOD Secret Security Clearance, which requires US Citizenship.
Date: Tuesday, December 9th
Time: 2:00 - 5:30pm
Location: DoubleTree Hotel - 1981 N Central Expy, Richardson, TX 75080
We will be interviewing and hiring for the following positions in the Greenville, Plano, and Rockwall areas:
Systems Engineers
Software Engineers
Structural Engineers
Aerospace Engineers
Electrical Engineers
Mechanical Engineers
Project Engineers
Integration & Test Engineers
Information Security Systems Engineers
Specialty Engineering (Technical Writers, Product Trainers, System Safety Engineers, and Configuration/Data Management)
Security (Cyber Intelligence, Security Systems, Security Officers, Personnel Security Specialist (PERSEC), CSSO, Industrial Security)
Click 'APPLY NOW' to register for this event.
L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.
Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.
By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
Director Information Security
Information security analyst job in Richardson, TX
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Cyber Security Architect
Information security analyst job in Dallas, TX
Privileged Access Management (PAM) Architect
Westlake, TX
Responsibilities:
10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors.
Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred.
Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise.
Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk.
Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR.
Expertise with build vs. buy solution options.
Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management.
Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization
Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable.
They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault)
Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience.
They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
Junior Information Security Analyst #2925
Information security analyst job in Austin, TX
Junior Information Security Analyst 12 month Contract (with strong potential for extension and career advancement) Our client is seeking a Junior Information Security Analyst to assist in supporting and enhancing cybersecurity initiatives across their organization. This role will focus on implementing and monitoring security controls aligned with the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards.
This is a great opportunity for an early-career professional eager to gain deep experience in information security within an enterprise environment.
Required Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field
Security certifications such as CompTIA Security+, GSEC, or equivalent
2+ years of experience in information security, cybersecurity, or a related IT field
Working knowledge of common security frameworks including:
NIST Risk Management Framework (RMF)
NIST Cybersecurity Framework (CSF)
Texas Information Security Standards
Experience with basic project planning and system development methodologies
Strong analytical, communication, and documentation skills
Ability to work independently with minimal supervisio
Familiarity with enterprise-level IT systems or public-sector environments is highly preferred
Key Responsibilities:
Assist in implementing and monitoring security measures across systems and applications
Support security risk assessments and compliance reviews
Help maintain and document security policies, procedures, and standards
Coordinate with internal teams and external vendors on security initiatives
Assist in identifying and recommending improvements to existing security processes
Participate in incident response and audit support activities
Support research and evaluation of emerging cybersecurity tools and technologies
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
Security Systems Analyst
Information security analyst job in Plano, TX
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Description
• Deploy and maintain a full suite of endpoint security products.
• Responsible for ensuring high level of systems security compliance.
• Maintain pertinent site location details to ensure proper incident management ticket routing.
• Perform incident triage and handling by determining scope, urgency and potential impact
• Provide support for vulnerability assessments tools across multiple vendors.
• Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists.
• Maintain and expand related information security metrics.
Qualifications
• 5+ years supporting workstation and server operating systems.
• 1 year incident response and malware removal experience
• 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc.
• Basic knowledge of network and perimeter security methodologies and tools.
Additional Information
Looking only for W2, No C2C ( Referral and H1B Transfer will work )
Information Security Analyst 2
Information security analyst job in Universal City, TX
Job Description
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Network Security Analyst
Information security analyst job in Austin, TX
Support senior cybersecurity staff in evaluating cybersecurity risks across commercial real estate (CRE) environments. Responsibilities include assisting with network security assessments, reviewing access controls, identifying common misconfigurations, running vulnerability scans, documenting networks/systems, and preparing clear reports. Scope spans both IT and OT (building systems such as BMS/BAS, HVAC, access control, CCTV).
Key Responsibilities
Perform asset discovery and initial scans to identify hosts, services, and firmware versions (e.g., Nmap).
Review firewalls, VPNs, and endpoint security to identify misconfigurations and vulnerabilities
Evaluate switch/router configurations for proper segmentation
Document current-state diagrams and asset inventories
Assess BMS/BAS, IoT, and physical security systems for cyber risk with minimal disruption to operations.
Identify common gaps (weak/default credentials, unpatched systems, outdated TLS, flat networks, exposed management interfaces, insecure vendor remote access).
Support remediation by coordinating with IT teams, vendors, and property managers; verify fixes and retest critical findings.
Prepare and maintain assessment artifacts: asset lists, risk-rated findings, evidence, compliance checklists, and client-ready reports.
Track emerging threats and advisories relevant to smart buildings/IoT and CRE environments; summarize impact for the team.
Qualifications
Associate's or Bachelor's in Cybersecurity/IT (or 2+ years equivalent hands-on experience).
Familiarity with core security technologies: Firewalls (e.g., Fortinet, Palo Alto), IAM/MFA (e.g., Entra ID/Azure AD), and EDR (e.g., SentinelOne).
Intermediate networking: TCP/UDP, routing basics, Layer-3 switches, VPNs (IPsec/SSL), VLANs, ACLs, NAT, DHCP/DNS, Wi-Fi/WPA3.
Working knowledge of Windows client/server; basic Linux familiarity.
Strong documentation and communication skills; ability to translate technical findings into clear business impact.
Nice to Have
Exposure to vulnerability management tooling and concepts.
OT/IoT awareness: BACnet/Modbus basics, safety-first testing on live control networks, maintenance-window/change-control etiquette.
Firewalls and platforms: Palo Alto, Fortinet, Check Point; switch stacks (Cisco Catalyst/Meraki, UniFi).
Identity, privileged access, and remote access hygiene
Endpoint and device management
Scripting/automation
Ticketing and knowledge tools (ServiceNow/Jira/Confluence); diagramming (Visio/draw.io).
Familiarity with frameworks and benchmarks: NIST CSF 2.0, CIS Controls
Travel: Regular on-site visits to local properties (50%) with occasional out-of-area travel (5-10%)
Benefits
Medical, dental, and vision insurance
Life insurance
Long-term disability
Paid vacation
Paid holidays
Simple IRA (401K equivalent) for eligible employees
Stocked snack bar
Company-sponsored outings
Fitness center onsite
Network Security Analyst
Information security analyst job in San Antonio, TX
Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyCyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)
Information security analyst job in San Antonio, TX
Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff. Work Schedule 7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department
Essential Job Functions
* Leads analysis and development of the integration, testing, operations, and maintenance of system security.
* Leads assessments of systems and networks and identifies deviations.
* Maintains access control and collection gaps.
* Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards.
* Prepares and executes system tests to evaluate optimization.
* Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response.
* Executes and manages a Security Awareness Training Program and provides data for reports.
* Leads security "tiger team" in the prosecution of vectors, hackers, and various threats.
* Assist superiors in the production of the Alamo Region Security Operation Center products.
* Performs related duties and fulfills responsibilities as required.
Job Requirements
* Bachelor's degree from an accredited college or university.
* Four (4) years of relevant technical, cyber security, and business work experience.
* CompTIA Security+.
* GIAC: GPEN or GWAPT.
* Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
* Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations.
* Experience leading agile efforts.
* Experience in coaching and mentoring team members.
* Scrum Master, Agile Certifications.
Applicant Information
* Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university.
* Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted.
* Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application.
* If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents. may be attached to the application for consideration in advance.
Knowledge, Skills, and Abilities
* Knowledge of 7 NICE Framework Workforce Categories.
* Knowledge of business operations, systems requirements, and IT processes and technologies.
* Knowledge of information and data analysis and reporting.
* Knowledge of Cyber Security system design, programming principles, processes, and tools.
* Knowledge of strategic planning and change management.
* Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI.
* Skill in interpersonal communications and analytical thinking.
* Skill in technical writing.
* Ability to perform all the essential functions of the position, with or without accommodations.
* Ability to work in an office environment.
Manager, Information Security
Information security analyst job in Dallas, TX
At Bluebeam, we empower people to advance the way the world is built. We create smart software solutions that make construction sites more efficient, connected, and safe, and improve the lives of design and construction professionals everywhere. The Information Security Manager leads a team of security engineers in key functional areas, including vulnerability management, application security, incident detection and response, and security awareness.
The person in this role leads the team in maturing and defining processes, developing metrics and reporting on security risk, and adhering to SOC 2 and ISO 27001 compliance. This role requires a combination of technical acuity and strong interpersonal skills to effectively build cross-functional relationships and trust with teams like ITS, DevOps, and Engineering.
About the Role
* Leads the security engineering team in projects and operations
* Manages penetration testing and vulnerability management programs
* Works cross-functionally to implement and improve information security-related processes
* Partners with Product and Engineering teams to improve security in the software development lifecycle
* Participates in security incident response
* Collaborates with Privacy and GRC teams to implement compliant processes
About You
* People management experience in Information Security
* Strong knowledge of information security domains including vulnerability management, identity and access management, and endpoint protection
* Experience in application security or software development
* Familiarity with AWS
* Strong project management and hands on implementation skills
* Experience working with security frameworks such as NIST CSF, CIS, and SOC 2
Bonus Points:
* Security-related certifications (e.g. CISSP, CISM, etc.)
What we offer :
* People-focused, entrepreneurial culture with the backing of a stable, global, corporate entity - Nemetschek
* Competitive compensation and benefits package
* Work-life balance fostered through a culture of diversity, inclusion, and appreciation of individual lifestyle needs
* Opportunity for continuous professional development through things like Pluralsight, conferences, and certification programs
About Bluebeam
The construction industry is adopting new technology at a feverish pace. Tablets and cell phones are replacing paper blueprints, drones are surveying jobsites in 3D, and cloud collaboration is changing the way teams work together. Bluebeam plays a crucial role in this transformation. The key to our success is a customer-focused approach to product development: we work with the industry to create solutions for the industry. Today, over 3 million people throughout the world use Bluebeam. In the US, we're a critical partner for the majority of top AEC firms, and rapidly expanding our presence globally, with offices in Sweden, Germany, and the UK.
Come design and build your future with us!
Bluebeam is proud to be an equal-opportunity workplace. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
The base pay offered will depend upon qualifications and other operational considerations. Base pay is one part of Bluebeam's Total Rewards program, which seeks to compensate and recognize employees for their work. Most sales positions are eligible for commission under the terms of an applicable commission plan, while most non-sales positions are eligible for a bonus under the terms of an applicable bonus plan. Additionally, Bluebeam provides best-in-class benefits, with 100% employee-covered health and welfare benefits and paid time off. Bluebeam is a growing company with many opportunities. If this role and/or pay range are not an exact fit, we still encourage you to apply.
The base pay range for this position is: $153,800 - $192,300
#Bluebeam #LI-SR #Hybrid
Nearest Major Market: Dallas
Nearest Secondary Market: Fort Worth
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Architect Manager
Information security analyst job in Irving, TX
Company Details
Berkley Technology Services (BTS) is the dynamic technology solution for W. R. Berkley Corporation, a Fortune 500 Commercial Lines Insurance Company. With key locations in Urbandale, IA and Wilmington, DE, BTS provides innovative and customer-focused IT solutions to the majority of WRBC's 60+ operating units across the globe. BTS's wide reach ensures that ideas and opinions are considered at every level of the organization to guarantee we find the best solutions possible.
Driven by a commitment to collaboration, BTS acts as consultants to our customers and Operating Units by providing comprehensive solutions that not only address the challenge at hand, but proactively plan for the “
What's Next
” in our industry and beyond.
With a culture centered on innovation and entrepreneurial spirit, BTS stands as a community of technology leaders with eyes toward the future -- leaders who genuinely care about growing not only their team members, but themselves, and take pride in their employees who shine. BTS offers endless ways to get involved and have the chance to grow your career into a wide range of roles you'd never known existed. Come join us as we push forward into the future of industry leading technological solutions.
Berkley Technology Services: Right Team, Right Technology, Simple and Secure.
Responsibilities
The Information Security Architecture Manager at BTS is entrusted with a critical role in sculpting our Global Information Security Architecture framework. This leadership role demands a hands-on approach in the architectural design, strategic implementation, and management of security technologies and processes across various technology platforms. This role is integral in ensuring alignment with the overarching Global Information Security Strategy at WRBC. This role is designed for a visionary leader eager to drive the future of information security architecture at a global scale, ensuring the protection and resilience of Berkley Technology Services' technological assets and services.
Spearhead the architectural design, deployment, and management of cutting-edge security solutions, including but not limited to SIEM, EDR, PAM, Data Access Governance, Identity Governance, Cloud Access Security Brokers, and WAFs.
Architect and sustain the security infrastructure, ensuring seamless integration with existing technology ecosystems.
Craft and execute architectural strategies for bolstering vulnerability management, security automation, and the safeguarding of infrastructure.
Guide the formulation and continuous refinement of security policies and procedures, with a spotlight on architectural best practices.
Cultivate an environment of innovation within the team, promoting continual learning and professional advancement.
Function as a principal consultant and subject matter authority on information security architecture, offering pivotal guidance to internal teams and key stakeholders.
Develop and maintain roadmaps for critical security infrastructure components, aligning them with the strategic goals of the organization.
Collaborate with fellow Information Security leaders to forge a unified and robust Information Security Framework and Strategy.
Perform regular technology evaluations, risk assessments, and devise appropriate remediation strategies.
Lead and nurture a team of security architects and engineers in a fast-paced, global setting.
Provide “Person in Charge” (PIC) coverage when on rotation. This added responsibility is factored into your base salary.
Qualifications
Demonstrated expertise in Information Security Architecture, with practical experience in the design and management of a broad spectrum of security technologies.
Exceptional leadership and communication capabilities, adept at guiding global, interdisciplinary teams.
Deep familiarity with contemporary cybersecurity trends and a commitment to remaining at the cutting edge of technology.
Desirable certifications include CISSP, CISM, CEH, or other relevant qualifications.
Proficiency in cloud security architecture and solutions, with experience in AWS, Azure, or Google Cloud platforms.
Expertise in security frameworks such as NIST, ISO 27001, and CIS.
Strong analytical and problem-solving skills, capable of making informed decisions in complex scenarios.
Ability to foster relationships and collaborate effectively with various internal and external stakeholders.
Commitment to ethical conduct and a deep understanding of regulatory compliance requirements relevant to the insurance and financial sectors.
Bachelor's or Master's degree in Computer Science, Information Security, or a related discipline, or equivalent experience.
Behavioral Core Competencies
Flexibility
Customer Service Oriented & Operational Effectiveness
Personal Ownership
Quick Decision Making
Team Builder
Transformational Leadership
The Company is an equal employment opportunity employer.
Auto-ApplyNetwork Security Audit
Information security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyIT Network / Security Analyst
Information security analyst job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-ApplyInformation Security Analyst
Information security analyst job in Plano, TX
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
• Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus
Qualifications
MUST HAVES:
• 2+ years of experience in technical role with notable exposure to security
• Working knowledge of analyzing events from SPLUNK SIEM.
• Ability to work shift work in a 24/7/365 environment.
• Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management
This is a Bulk hiring position for our direct client.
Additional Information
For More Information, Please Contact
Siva Kumar
************
Information Security Analyst 2
Information security analyst job in San Antonio, TX
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Auto-ApplyCyber Security Analyst III - Alamo Regional Security Operations Center (ARSOC)
Information security analyst job in San Antonio, TX
Under general direction, is responsible for leading the Cyber Security Program processes and systems security assessment programs. Oversees the investigation, analysis, and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff.
Work Location
Alamo Regional Security Operations Center (ARSOC) - 638 Davy Crockett, San Antonio, TX 78226
Work Schedule
7:45 a.m. - 4:30 p.m., Monday - Friday; onsite (case by case remoting possible with manager's consent)
Essential Job Functions
* Leads the Cyber Security Program and the Systems Security Risk Assessment Program processes, which includes the investigation, analysis, and development of the integration, testing, operations, and maintenance of systems security.
* Manages the Vulnerability Assessment Program by analyzing and scanning enterprise systems and mitigating and resolving vulnerability gaps, while ensuring timely patching of COSA systems.
* Guides solution options and decision making based on evaluations and audits of IT project, program, environment, or its individual components to determine compliance with published standards.
* Maintains COSA cyber security missions and goals by overseeing threat hunting and cyber security activities and assessments, and developing plans, measures, and metrics of performance effectiveness.
* Oversees customer support relating to cyber security products and systems.
* Assesses, leads, and mentors subordinate Cyber Security Analysts in their duties and professional development.
* Serves as primary point of contact for the collaborative efforts and products in service of various organizations in the cyber defense of the Alamo Region Security Operations Center.
* Sets standards for data and data collection and gathers data to support recommendations to address problems with appropriate contingency plans.
* Evaluates system designs and identifies system weaknesses and vulnerabilities.
* Performs related duties and fulfills responsibilities as required.
Job Requirements
* Bachelor's degree from an accredited college or university.
* Seven (7) years of relevant technical, cyber security, and business work experience.
* CompTIA Security+.
* GIAC: GPEN, or GWAPT, or Certified Ethical Hacker.
* Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
* Experience leading agile efforts.
* Experience in coaching and mentoring team members.
* Scrum Master, Agile, and Lean Six Sigma Certifications.
* Certified Information Systems Security Professional.
* PCI: ISA, QSA
Applicant Information
* Unless otherwise stated, applicants are permitted to substitute two years of related full-time experience for one year of higher education or one year of related higher education for two years of experience in order tomeet the minimum requirements of the job. One year of full-time experience is defined as 30 or more hours worked per week for 12 months. One year of higher education is defined as 30 credit hours completed at an accredited college or university.
* Applicants selected for employment with the City of San Antonio in this position must receive satisfactory results from pre-employment drug testing and background checks. If required for the position, a physical, motor vehicle record evaluation, and additional background checks may be conducted.
* Please be advised that if selected for this position, information regarding employment history as it relates to the qualifications of the position will be needed for employment verification. Applicants claiming military service to meet the experience requirement for this position may attach a DD214 to the application.
* If selected for this position, official transcripts, diplomas, certifications, and licenses must be submitted at the time of processing. Unofficial transcripts and copies of other relevant documents may be attached to the application for consideration in advance.
Knowledge, Skills, and Abilities
* Knowledge of 7 NICE Framework Workforce Categories.
* Knowledge of business operations, systems requirements and IT processes and technologies.
* Knowledge of information and data analysis and reporting.
* Knowledge of system design and programming principles.
* Knowledge of processes, tools, and Cyber Security frameworks.
* Knowledge of strategic planning and change management.
* Knowledge conducting Risk Assessments of HIPAA, CJIS, and PCI.
* Skill in interpersonal communications and analytical thinking.
* Skill in technical writing.
* Skill in coordinating work projects.
* Ability to perform all the essential functions of the position, with or without accommodations.
* Ability to work in an office environment.
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.