Cyber Security Analyst
Information security analyst job in Houston, TX
We are looking for a Cyber Security Analyst to join our global security team. This role will suit a technically capable individual with experience in security operations who is looking to broaden their exposure across security monitoring, engineering, and incident response within a dynamic environment.
The role provides hands-on involvement in triaging and investigating security alerts, acting as an escalation point for the outsourced Security Operations Centre (SOC), supporting major incident response activities. The successful candidate will work closely with infrastructure and network teams to manage and optimise endpoint, email, identity, and vulnerability management platforms, while contributing to continuous improvement of the organisation's security posture.
This role offers the opportunity to evaluate and transition between security tools, maintain policy continuity and develop a broad, practical skillset across enterprise cyber security functions.
Business Overview
Established in 1783, ED&F Man is an employee-owned agricultural commodities merchant with 2,800 people in 43 countries and annual revenue in excess of $8bn. We trade sugar, coffee, molasses, animal feed and fish oils. Corporate responsibility is ingrained in our culture. We are passionate about sustainable production, take care to limit the environmental impact of our operations and actively support the communities in which we work.
Key Accountabilities
Act as the escalation point for the outsourced SOC, receiving and triaging alerts that require deeper investigation.
Conduct thorough investigations to produce high-quality, actionable insights for incident resolution.
Participate actively in major security incidents, contributing to containment, eradication and recovery efforts
Document incident timelines and contribute to post-incident reviews and lessons learned.
Respond to detections, triage alerts and update SOC tickets with investigation findings
Maintain and update policies in line with vendor best practice and internal Change Advisory Board protocols.
Monitor agent health, audit version compliance and remediate orphaned or non-compliant clients.
Attend monthly vendor meetings to review support cases and incorporate best practice guidance.
Design and refine SOC playbooks and response actions, evaluating new security technologies through structured proof-of-concept trials and creating scoring matrices to compare vendors.
Manage block and safe listings to maintain email hygiene, troubleshooting false positives and tune detection rules.
Perform email investigations as required in response to phishing or BEC attempts, producing monthly vulnerability reports and prioritising remediation efforts based on risk.
Work with infrastructure and application teams to test patches and drive vulnerability counts down.
Attend monthly TAM meetings to review support cases and best practices.
Maintain agility to substitute security products as business requirements evolve, ensuring policy continuity throughout transitions.
Skills and Experience:
5+ years' experience in a Cyber Security Analyst or similar role, with strong incident response and major incident handling expertise.
Hands-on experience with EDR (alert triage, policy management, sensor deployment), preferably CrowdStrike Falcon.
Experience developing SOC playbooks, response actions, and running proof-of-concept evaluations and vendor comparisons.
Confident, proactive communicator able to engage senior stakeholders, clearly explain complex security issues, and recommend actions.
Collaborative and approachable, building trust with technical peers and supporting service desk and front-line teams.
Calm, effective, and resilient under pressure, particularly during security incidents in a front-facing role.
Formal qualifications not essential; proven hands-on experience and delivery record valued.
Technical Capabilities:
Experience with SIEM platforms (e.g. Rapid7), Email Security and Data Security/DLP solutions (e.g. Varonis).
Strong knowledge of Entra ID security features including Conditional Access and PIM, plus familiarity with PAM tools including BeyondTrust, Osirium and Okta.
Solid networking fundamentals (TCP/IP, DNS, firewalls, proxies, SSL/TLS) and vulnerability management experience (Qualys/Rapid7 preferred).
Cloud security experience across Azure and/or AWS.
Scripting skills in Python and/or AutoIT for automation and tooling.
Desirable certifications include CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and relevant vendor certifications (e.g., CrowdStrike, Qualys, Palo Alto).
We recognise that talent comes in many forms, and we value potential just as much as experience. If this role excites you but you don't meet every requirement, we still encourage you to apply.
Our Offer
We provide a fast-paced, stimulating and truly global environment, which will stretch your abilities and channel your talents. We also offer competitive salary and benefits combined with outstanding career development opportunities in one of the global leaders in soft commodity trading.
Our Values
Respect, Integrity, Meritocracy, Client Focus, Entrepreneurship
Our values define who we are. They are the fundamental beliefs that determine our actions and guide our behaviour. They influence the way we communicate and collaborate, and define the way we engage with our clients, partners, and communities. Our values are underpinned by a set of essential behaviours, which form part of our performance management approach. Delivering on our objectives is very much about ‘what' we do, but these essential behaviours also provide a guide and measure for ‘how' we do things. Our performance essentials are Take Initiative, Self‐Management, Deliver Results and Collaboration.
Our Commitment
We are committed to creating and sustaining an inclusive and diverse work environment where all employees are treated with dignity and respect. We are committed to promoting equal opportunities in employment and are focussed on actively building and developing diverse teams. All qualified applicants will receive equal treatment without regard to race, colour, sex, gender, age, religion or belief, ethnic or national origin, marital or civil partner status, physical or mental disability, military or veteran status, sexual orientation, gender reassignment (identity, gender expression), genetic information or any characteristic protected by local law.
We are willing to make any reasonable adjustments throughout our recruitment process.
To apply you must have the right to work for the provided location.
Cyber Security Analyst
Information security analyst job in Houston, TX
Cybersecurity Analyst - Level II / Senior (Deployment & Engineering Focus)
Houston, TX
Contract to Hire
Sector: Oil & Gas
We're hiring a seasoned, hands-on Cybersecurity Analyst (Level II or Senior) to drive the build-out and continuous improvement of our security tooling ecosystem. This is primarily an engineering and deployment role-not a SOC or pure incident-response position. You'll own the implementation, optimization, and maturation of critical security controls across the enterprise.
What You'll Own
Lead the deployment, configuration, tuning, and upgrade of core cybersecurity technologies
Particular emphasis on Privileged Access Management (PAM) and Endpoint Detection & Response (EDR) platforms (experience here is highly valued)
Identify gaps, propose solutions, and execute security infrastructure enhancements at a rapid pace
Automate repetitive tasks, build integrations, and streamline processes wherever possible
Partner with other security engineers, infrastructure teams, and application owners to embed security into the environment
Provide occasional tier-3 escalation support for incidents when needed (not primary duty)
What You Bring
Proven track record deploying and managing enterprise security tools in real-world environments
Deep hands-on experience with PAM and/or EDR solutions strongly preferred (e.g., CyberArk, BeyondTrust, Delinea, CrowdStrike, SentinelOne, Microsoft Defender, Carbon Black, etc.)
Strong automation mindset-scripting (Python, PowerShell, Bash) and infrastructure-as-code experience is a big plus
Ability to operate independently, prioritize ruthlessly, and deliver results in a fast-moving environment
Adaptable and eager to work across a wide variety of security technologies
SANS GIAC certifications (GSEC, GCIA, GNFA, GCIH, GMON, etc.) strongly preferred
Degree not required-demonstrated capability is what matters
If you live for building and hardening security controls, move fast, hate manual work, and want to see your deployments protect the enterprise in real time, we want to talk to you.
Cyber Security Analyst
Information security analyst job in Houston, TX
Cybersecurity Analyst (FTE, Onsite Houston)
Our client is an Oil & Gas Security professional to support day-to-day security operations, tool deployment, and infrastructure improvements.
Contract-to-hire: 6 months contract, converting to FTE after this period.
Responsibilities:
Deploy, configure, and enhance cybersecurity tools.
Support operations across firewalls, EDR, PAM, vulnerability management.
Collaborate across departments to enhance security posture.
Requirements:
Familiarity with tools like CrowdStrike, CyberArk, Rapid7, Zscaler, Security Onion.
Hands-on knowledge of firewalls, network security, endpoint protection.
SANS/GIAC certs preferred
Please apply with an up-to-date resume
IT Analyst ERP
Information security analyst job in Houston, TX
IT Analyst ERP
Compensation: $120,000 - $140,000 annually, depending on experience
Inceed has partnered with a great company to help find a skilled IT Analyst ERP to join their team!
Are you ready to make a significant impact in the energy sector? This is your chance to join a dynamic team where your expertise in Quorum applications will drive innovation and operational excellence. This role was created to enhance the efficiency and accuracy of the company's revenue and land systems. As an IT Analyst ERP, you'll be the go-to expert, bridging the gap between technology and business needs. Join now and be part of a team that values continuous improvement and proactive problem-solving.
Key Responsibilities & Duties:
Support Quorum ERP business users across various departments
Troubleshoot and resolve operational issues in Quorum
Develop technical relationships to explain concepts in business terms
Participate in change management for Quorum ERP applications
Monitor and create automated jobs and data transformations in Quorum
Translate business requirements into technology solutions
Prepare updates and document Quorum ERP processes
Required Qualifications & Experience:
3+ years of IT support for Quorum applications
Bachelor's Degree in Computer Science or related field
Proficiency in user security configuration and administration in Quorum
Hands-on experience with SQL, Spotfire, and Power BI
Solid understanding of oil & gas upstream business processes
Nice to Have Skills & Experience:
5 years of progressive IT experience with Quorum applications
Experience with Spotfire is a plus
Perks & Benefits:
This opportunity includes a comprehensive and competitive benefits package-details will be shared during later stages of the hiring process.
If you are interested in learning more about the IT Analyst ERP opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time.
We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them.
Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.
#INDHOU
Business Information Security Officer (BISO) Fortune 100 company Direct Hire
Information security analyst job in Houston, TX
About the Role
We are seeking a highly strategic and business-minded Business Information Security Officer (BISO) to serve as the primary liaison between our enterprise security organization and key business units. As a Fortune 100 company operating at global scale, we manage complex distribution and supply chain environments that require world-class security, risk governance, and operational excellence.
The BISO will help shape and execute a unified security strategy that aligns with business objectives, ensures regulatory compliance, and strengthens our cyber resilience across a diverse technology and operational footprint.
Key Responsibilities
Strategic Security Leadership
Act as the trusted security advisor to senior business leadership, translating technical risks into clear business impacts.
Drive alignment between corporate security strategy and business-unit initiatives, ensuring security enables-not hinders-innovation and growth.
Represent business needs within enterprise cybersecurity governance forums.
Risk Management & Compliance
Identify, assess, and prioritize cybersecurity risks across business units, including emerging threats to distribution operations, supply chain systems, and large-scale logistics platforms.
Ensure compliance with internal policies, industry standards, and regulatory frameworks (e.g., NIST CSF, ISO 27001, SOX, PCI, data privacy regulations).
Oversee remediation plans and ensure timely closure of audit and assessment findings.
Program & Policy Execution
Support implementation of enterprise-wide security programs (IAM, data protection, vulnerability management, cloud security, OT/ICS security, incident response).
Champion best practices for secure architecture, application development, and third-party vendor management.
Coordinate with IT, OT, and business operations teams to drive adoption of security controls across complex distributed environments.
Incident Response & Business Continuity
Liaise between business leadership and Cyber Incident Response teams during major incidents or disruptions.
Ensure business units are prepared with effective response plans, communication protocols, and recovery strategies.
Stakeholder Engagement & Education
Build strong partnerships with executives, technology leaders, and operational teams.
Deliver targeted security awareness and training for business units.
Communicate risk posture and security metrics to leadership through dashboards, reports, and briefings.
Qualifications
Required
8+ years of experience in cybersecurity, risk management, or information security leadership roles.
Proven experience supporting large-scale, distributed enterprise environments (preferably in supply chain, logistics, distribution, or retail).
Strong understanding of cybersecurity frameworks, governance, and risk methodologies.
Ability to interact with C-suite executives, translate complex technical issues into business language, and influence decision-making.
Experience coordinating cross-functional initiatives in complex, highly regulated organizations.
Preferred
Experience within a Fortune 100 or Fortune 500 corporate environment.
Background working with OT/ICS, distribution center technologies, or supply-chain automation systems.
Relevant certifications: CISSP, CISM, CRISC, CISA, CGEIT, or similar.
Bachelor's degree in Cybersecurity, Information Systems, Business, or related field; Master's degree a plus.
Competencies
Executive communication and presentation skills
Strategic thinking with strong business acumen
Ability to drive change across matrixed organizations
Strong analytical, risk evaluation, and problem-solving capabilities
Collaborative leadership with a focus on partnership and enablement
Why Join Us?
Influence security strategy at a world-class, Fortune 100 distribution leader
High-visibility role with direct impact on enterprise risk posture
Opportunity to shape security across cutting-edge logistics, cloud, data, and automation platforms
Competitive compensation, comprehensive benefits, and career growth at a global scale
Information Security Analyst -TVM - LVL II
Information security analyst job in Houston, TX
***Please note: This position is onsite and not remote. Candidates must be based in the Houston area, as relocation assistance is not provided. Only individuals authorized to work in the U.S. will be considered.***
Role and Responsibilities of the Resource Request Required
Participate in the creation of the Cybersecurity Strategy, program objectives, and project plans.
Assist in the design and implementation of enterprise Cybersecurity processes and services across multiple domains to ensure protection of county information and IT assets.
Administer and maintain Cybersecurity technology platforms and services related to the enclave.
Fulfill customer requests and perform daily security operations, including vulnerability scanning, remediations, incident monitoring, analysis, and response activities.
Conduct analysis of Cybersecurity threats, vulnerabilities, and exposures, providing effective recommendations and remediation plans.
Develop procedures, job aids, metrics, reports, and presentations to support Cybersecurity objectives.
Participate as a member of the Cybersecurity Incident Response Team (CIRT) for investigation and response activities as required.
Scheduled Milestones and Deliverables Required
Advance the maturity level of Vulnerability Management and Remediation Processes.
Integrate automation best practices to improve operational efficiency.
Enhance Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) for vulnerabilities and incidents.
Metrics to Be Utilized to Measure the Performance of this Resource Required
Successful completion of projects related to Vulnerability Management and Remediation Processes.
Performance and uptime of Security Platforms (e.g., Incidents, Alerts, Tickets).
Adherence to SOC and Compliance standards.
Compliance with documented processes and procedures.
Requirements
Project and Requirements Required
A Contractor is needed to support Cybersecurity Remediation Projects with a strong focus on Vulnerability Management, including vulnerability scanning, automation, remediation workflows, and tool integrations. The resource will assist in supporting vulnerability management operations, enhancing scan capabilities, and streamlining remediation processes across environments.
Requirements:
Minimum 2 years of hands\-on experience with vulnerability scanning technologies such as Qualys, Tenable, or Rapid7, with proven ability to translate scan results into prioritized, actionable remediation steps across enterprise environments.
Ability to operationalize scan results into effective remediation workflows.
Minimum 2 years of hands\-on experience with Linux administration, including server navigation, configuration, and management.
Familiarity with Microsoft Security Tools, including architecture and platform knowledge.
Additional Skills:
Cyber Incident Response
SIEM (Security Information and Event Management)
Data Analysis and Reporting
Experience:
Minimum five (5) years of progressive work experience in Information Security, Information Technology, Computer Science, or related fields.
"}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"673084038","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"Work Experience","uitype":2,"value":"5+ years"},{"field Label":"Salary","uitype":1,"value":"$52\-54\/hr"},{"field Label":"City","uitype":1,"value":"Houston"},{"field Label":"State\/Province","uitype":1,"value":"Texas"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"77002"}],"header Name":"Information Security Analyst\-TVM \- LVL II","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00216003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********04525326","FontSize":"12","google IndexUrl":"https:\/\/smarterhrsolutions.zohorecruit.com\/recruit\/ViewJob.na?digest=kSkbnHeM0@ULfN8kre4OLPli4bFRLEndlpu1pHU3DGc\-&embedsource=Google","location":"Houston","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do","logo Id":"2oxsac7e1f4138a8a48e1b2b76fabf6b3a45c"}
Cyber Security Analyst
Information security analyst job in Houston, TX
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplySenior Security Analyst
Information security analyst job in Houston, TX
6+ years of experience in multiple industry risk, control and governance disciplines (e.g. Audit, Business Continuity Planning, and Regulatory Compliance). In-depth understanding of information technology and business continuity principles and best practices across the industry as well as project management principles.
Broad knowledge of information and technology risk management policies, methods, standards, tools, and processes (e.g. ISO, COSO, COBIT) as well as knowledge of compliance, legal, internal / external audit & regulatory requirements.
Significant expertise in the collaboration, facilitation and coordination of the mitigation of risks. Adept at navigating governance structures. Ability to manage and analyze data. Experience raising awareness of information and technology risk throughout an organization.
Understanding of metrics development and reporting. Strong problem solving and program execution skills. Ability to prioritize and drive difficult decisions among business partners.
Ability to solve or to collaborate in solving very complex risk issues that span legal, compliance and regulatory obligations across various lines of business and shared service areas of the company.
Ability to prioritize and drive difficult decisions among business partners
Strong client relationship management experience and influencing skills.
Strong interpersonal and oral/written communication skills, able to build relationships with people at all levels. Experience developing and delivering presentations to all levels of management. Strong ability to develop, lead and manage a professional staff.
Qualifications
PLEASE NOTE:
While technical experience is a plus, this is not a technical information security position. It is best filled by someone with information security management or information technology audit experience. This is a leadership position requiring strong communication and analytical skills.
Additional Information
Job Status: Contract
Eligibility: H1B/EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact:
************
Keep the subject line with Job Title and Location
Easy ApplySenior Security Analyst
Information security analyst job in Houston, TX
Senior Security Analyst FLSA Class: EXEMPT Responsible to: Lead Security Architect The Senior Security Analyst plays a critical role in protecting our company's systems, data, and assets by monitoring threats, analyzing incidents, and implementing security measures. This individual will serve as a subject matter expert, providing technical guidance and helping drive improvements in our security posture. In addition, this role will support GRC efforts.
What You'll Do:
* Threat Monitoring & Incident Response
* Monitor security alerts and events across various platforms including EDR, DLP, SIEM, and other tools.
* Lead investigations of potential security incidents and coordinate response actions per the Security Incident Response Plan.
* Perform root cause analysis and recommend remediation measures.
* Vulnerability & Risk Management
* Conduct vulnerability assessments, penetration testing support, and threat hunting leveraging tools and industry threat intelligence.
* Partner with IT and Engineering teams to remediate findings and strengthen security controls.
* Maintain an up-to-date understanding of emerging threats and attack vectors.
* Security Operations
* Monitor daily alert activities, escalate issues, and provide guidance to key stakeholders.
* Tune detection rules, playbooks, and response workflows to improve efficiency.
* Develop and maintain security documentation, including incident response playbooks and procedures.
* Governance & Compliance Support
* Assist with internal and external assessments and audits, evidence gathering, and regulatory requirements (e.g., SOC 2, ISO 27001, etc.)
* Ensure security controls align with policies, standards, and best practices.
* Collaboration & Leadership
* Work cross-functionally with IT, Engineering, Legal, and Compliance teams.
* Mentor and coach junior security staff.
* Contribute to strategic security initiatives and roadmap planning.
Other Requirements:
* Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience).
* 8+ years of experience in security analysis, SOC operations, or incident response.
* Strong knowledge of security tools (SIEM, EDR, IDS/IPS, DLP, etc.)
* Experience with vulnerability management and risk assessment.
* Familiarity with cloud security (AWS, Azure, or GCP).
* Excellent problem-solving, analytical, and communication skills.
Nice to have:
* Professional certifications such as CISSP, CISM, GIAC, CEH, or Security+.
* Hands-on scripting or automation skills (Python, PowerShell, etc.).
* Experience with GRC tools and compliance frameworks.
* Background in mentoring or leading junior analysts.
VoltaGrid is an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, creed, color, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information, arrest record, or any other characteristic protected by applicable federal, state or local laws.
Our management team is dedicated to this policy with respect to recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, and general treatment during employment. #LI-LM1 #LI-onsite
Security Analyst
Information security analyst job in Houston, TX
Experienced Technologists. Common Sense Approach. Indigo Beam was born of Bluware, Inc. Based in the heart of the Energy Corridor in Houston, TX, since 1986, we have experience solving the business problems of some of the most dynamic and demanding industries with a common sense approach and disciplined focus in using technology intelligently.
Our consultants bring to bear a wealth of experience and deep expertise in the Power and Utilities, Oil and Gas, Public Sector and Healthcare industries. Our extensive reference list demonstrates our commitment to our many satisfied clients with whom we have built long-term relationships.
Software Innovation to Solve Business Problems
We partner with our clients to create innovative mobile, Geographic Information System (GIS) and Web applications they need for the long haul. The results are strategic, technology-driven solutions that are intuitive, scalable, and sustainable. Our custom applications are intentionally designed to work in complete harmony with third-party Enterprise Resource Planning (ERP), content management, and database solutions within client organizations.
Job Description
Linux Background
Familiar with log review and Seim tools (AlertLogic preferred but not necessary).
Familiar with a variety of tools that currently used such as:
Tripwire
Oracle Audit Vault
Tenable
Palo Alto firewalls
Familiar with tools similar to what we may soon implement:
Centrify or some other Privilege Identity Management System
Imperva SecureSphere
Must have superior documentation and written communication skills.
Must be willing to work regular work hours (8 to 5) or so.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security / Soc Analyst III
Information security analyst job in Houston, TX
Job Description
Exciting Security / Soc Analyst III, 6 months contract opportunity in Houston, TX.
Requirements
5 plus years experience in the security domain, Incident Response, threat monitoring, and handling incidents (incident triage and response)
Determine detection requirements for data sources being on-boarded to the SIEM, and assessing the value of in place SIEM detection cases, in order to determine gaps and overlap in the overall detection scheme.
Perform security monitoring and incident response of cyber security events for proper determination of being considered a cybersecurity event.
Triage offenses for false positives
Hands-on experience defining detection or protection schemes based on industry standards and frameworks.
SIEM, Endpoint Detection and Response, Firewall/IPS/IDS, Proxy, Data Loss Prevention, Authentication
Experience leveraging data from security technologies and referential data sources to define security detection requirements, including detections which correlate data across multiple data sources.
Ability to interpret code in the support of detection case development.
Security / Soc Analyst III
Information security analyst job in Houston, TX
Exciting Security / Soc Analyst III, 6 months contract opportunity in Houston, TX.
Requirements
5 plus years experience in the security domain, Incident Response, threat monitoring, and handling incidents (incident triage and response)
Determine detection requirements for data sources being on-boarded to the SIEM, and assessing the value of in place SIEM detection cases, in order to determine gaps and overlap in the overall detection scheme.
Perform security monitoring and incident response of cyber security events for proper determination of being considered a cybersecurity event.
Triage offenses for false positives
Hands-on experience defining detection or protection schemes based on industry standards and frameworks.
SIEM, Endpoint Detection and Response, Firewall/IPS/IDS, Proxy, Data Loss Prevention, Authentication
Experience leveraging data from security technologies and referential data sources to define security detection requirements, including detections which correlate data across multiple data sources.
Ability to interpret code in the support of detection case development.
Auto-ApplyLead Security Engineer
Information security analyst job in Houston, TX
Join a team where you can play a crucial role in shaping the future of a world-renowned company and make a direct and meaningful impact in a space designed for top performers. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity and Technology Controls , you are an integral part of an agile team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. Drive significant business impact through your capabilities and contributions and apply deep technical expertise and problem-solving methodologies to tackle a diverse array of cybersecurity challenges that span multiple technology domains.
**Job responsibilities**
+ Design and build software solutions for security projects
+ Mentor junior security engineers
+ Facilitates security requirements clarification for multiple networks to enable multi-level security to satisfy organizational needs
+ Works with stakeholders and senior business leaders to recommend business modifications during periods of vulnerability
+ Be responsible for triaging based on risk assessments of various threats and managing resources to cover impact of disruptive events
+ Adds to team culture of diversity, equity, inclusion, and respect
**Required qualifications, capabilities, and skills**
+ Formal training or certification on software engineering concepts and 5+ years applied experience .
+ Experience planning, designing, building and implementing enterprise level security engineering products and solutions in a public cloud environment (i.e. AWS, GCP, Azure)
+ Advanced in one or more programming languages/scripts (i.e. C/C#, Python, PowerShell)
+ Knowledgeable in secure software application development and technical processes with considerable in-depth knowledge in one or more technical disciplines (e.g., cloud, artificial intelligence, machine learning, mobile, etc.)
+ Experience with continuous integration and continuous deployment (CI/CD) tools (Jenkins), version control tools (BitBucket, Git), managing and tracking work using management tools like Jira
+ Experience building security engineering products and solutions
+ Knowledge of the Windows Workstation OSs (Windows 10/Windows 11 and Virtual platforms) and/or Mac OSX
+ Understanding of Active Directory concept and practical implementation of GPO management
+ Ability to tackle design and functionality problems independently with little to no oversight
**Preferred qualifications, capabilities, and skills**
+ Experience within Cyber Security is preferred
+ Excellent communication and presentation skills
+ Prior experience in finance industry is a huge plus
**\#CTC**
JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans
**Base Pay/Salary**
Jersey City,NJ $152,000.00 - $215,000.00 / year
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security Analyst:
Information security analyst job in Houston, TX
Houston, TX 6+ Months Primary : Mandatory to have good hands-on experience in one or more skills on the below products & technologies Firewalls (Checkpoint, Palo Alto), McAfee SIEM 9.6, McAfee Web Gateway, McAfee Web Reporter, McAfee Email Gateway RSA Token, Proof Point, CyberArc, IDS/IPS, Tufin, Cyber Security.
Good to Have Skills: Madient, Assessment, Forescout, Incident Management
ITIL: Incident Management, Change management
Certifications for Manager: CISSP for SOC Manager/Lead, Security+, CEH
Certifications for Analyst: Security+, CEH
Please provide:
1. Certificate numbers and Expiry Date
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Compliance Analyst
Information security analyst job in Baytown, TX
Starting Salary Range is $71,905.60 - $75,573. The initial salary offer is commensurate with education and related work experience. The Information Security Compliance Analyst is the designated administrator of the Lee College Information Security Program TAC 202.
This position provides assistance to the Chief Information Officer in the operations of the Lee College Information Security Program, as well as oversight and implementation of system-wide information security strategies and solutions. Specific areas include IT policy, continuity of IT operations, information security risk assessment, information security operations review, and security life cycle for information systems.
Please Note: This position offers a hybrid work arrangement, blending onsite presence with remote flexibility.
* Develop, recommend, and establish policies, procedures, and practices as necessary to protect Lee College information resources against unauthorized or accidental modification, destruction, or disclosure.
* Design, coordinate and execute audit process, monitoring and procedures to assess and measure company Governance, risks, compliance with its security policies and procedures. Monitor advancements in information privacy laws to ensure organizational adaptation and compliance.
* Identify and implement proactive and reactive technical measures to detect vulnerabilities and to defend against external and internal security threats.
* Plan, implement and overseeing risk-related programs as per TAC 202 and other industry related frameworks & compliances. Creating and coordinating proper reporting channels for compliance issues. Developing compliance communications. Coordinating and scheduling required compliance training for employees.
* Provide consulting and technical support services to owners, custodians, and users in defining and deploying cost-effective security controls and protections.
* Ensures College functions in a legal and ethical manner while meeting its business goals. Responsible for developing Risk & compliance programs, reviewing company policies, and advising management on possible risks as per TAC202 state program and other best practices.
* Establish, maintain, and institutionalize security incident response procedures to ensure that security events are thoroughly investigated, documented, and reported; that damage is minimized, that risks are mitigated, and that remedial actions are taken to prevent recurrence.
* Investigate or direct Governance, Risk and compliance security issues, assess product, vulnerabilities, compliance, or operational risks and develop risk management strategies.
* Establish and publicize a security awareness program to achieve and maintain a security-conscious user community.
* Document, maintain, and obtain ongoing support for all aspects of the information security program.
* Monitor the effectiveness of strategies, activities, measures, and controls designed to protect the College information resources.
* Assure executive management's awareness of legal and regulatory changes that might impact the College information security and privacy policies and practices.
* Serve as Lee College internal and external point of contact for information security matters.
* Report frequently (at least annually) on the status and effectiveness of the information security program as directed by the Chief Information Officer (see TAC §202.73(a)).
* Have authority for information security for the entire institution (see TAC §202.71(a)(2)).
* Develop and recommend policies and establish procedures and practices, in cooperation with the information-owners and custodians, necessary to ensure the security of information and information resources against unauthorized or accidental modification, destruction, or disclosure.
* Coordinate the review of the data security requirements, specifications, and, if applicable, third-party risk assessment of any new computer applications or services that receive, maintain, and/or share confidential data.
* Verify that security requirements are identified, and risk mitigation plans are developed and contractually agreed to and obligated prior to the purchase of information technology hardware, software, and systems development services for any new high impact computer applications or computer applications that receive, maintain, and/or share confidential data.
* Serve as liaison with assigned Lee College educational centers for the purpose of monitoring information security program effectiveness and compliance with program requirements.
Perform other duties as assigned.
* Bachelor's (or higher) degree in a related field
* Five (5) years of experience designing, implementing, auditing, and/or managing information resources, information security, or risk management projects, operations, and/or programs
* Experience in the implementation of governance, risk, and compliance strategies preferred
* Experience working in a higher education setting preferred
* Experience in Texas State government preferred
* Must be able to work evenings and weekends as required
IT Security Engineer
Information security analyst job in Houston, TX
Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs
Position : IT Security Engineer
Location: Houston, TX
Duration: Full Time
Job Description :
The IT Security Engineer will support all Client personnel, both local and remote, by providing reliable and efficient security support services.
Network Security
The candidate will report to local management team and work with senior technical architects, leads and SMEs. This position requires strong knowledge in security operations. Candidates should be very experienced in large scale network security design, deployment and support. Work with vendors to resolve problems via ticketing portals and escalating issues to team lead and/or management as needed. Meet with client and partners as needed. Provide regular status summaries and reports to team lead and/or management as required. The successful applicant will be rewarded with a wide variety of technologies to master along with a closely-knit, enthusiastic team and plenty of room to grow their career within the division or within other divisions of Wipro as appropriate. Perform application and infrastructure security vulnerability assessments. Research and respond to identified security vulnerabilities. Assume rotational 7x24 on-call duties with other team members. Respond to client requests and other project tasking as needed.
Qualifications, Skills & Education Required:
• Good communication, presentation and interpersonal skills
• Bachelor's degree in a technical field (engineering, sciences, etc.) from an accredited college/university or additional 5 years of overall security experience
• Must have a sound knowledge and change management experience on ITIL V3
• Strong Networking background combined with Strong Security
• Must have ability to support flexible schedule in support of 7x24 staff.
• Relevant certifications such as GSEC, CCSA, CCSE,CISSP, etc.
• Expert level knowledge of installing, deploying, documenting, and troubleshooting network perimeter security technologies such as firewalls, proxy servers, intrusion prevention/detection (IDS/IPS), SIEM, antivirus, antimalware, antispam and unified threat management (UTM).
• Must be well versed in TCP/IP, IPSec, SSL, PKI, VLANs, system hardening, and troubleshooting.
• Experience with application and infrastructure security auditing processes.
Thanks & Regards
Rahul Kumar
Ventures Unlimited Inc.
Tel: ************ Ext - 157 / Mobile : ************
Additional Information
Contact "Rahul Kumar" for more details at ************ Ext:157
Cyber Security Engineer
Information security analyst job in Houston, TX
Title: Cyber Security Engineer
Type: Contract to Hire
Sector: Energy
About the Role
We are seeking a skilled and proactive Cyber Security Engineer to join our growing security team. You will design, implement, and maintain security controls that protect our organization's networks, systems, cloud environments, and sensitive data from evolving cyber threats.
Key Responsibilities
Design, deploy, and manage security tools and technologies (firewalls, IDS/IPS, SIEM, EDR/XDR, WAF, vulnerability scanners, etc.)
Perform security architecture reviews and provide actionable recommendations for new systems and applications
Conduct threat modeling, risk assessments, and security hardening of infrastructure (on-prem and cloud: AWS, Azure, GCP)
Respond to and investigate security incidents; perform digital forensics when needed
Lead or contribute to penetration testing, red/blue/purple team exercises
Develop and automate security processes using scripting (Python, PowerShell, Bash) and infrastructure-as-code (Terraform, Ansible, etc.)
Monitor, analyze, and respond to security alerts from SIEM and other detection systems
Implement and maintain identity & access management controls (MFA, RBAC, Zero Trust principles)
Create and update security policies, standards, and procedures
Collaborate with DevOps, engineering, and IT teams to integrate security into the SDLC (DevSecOps)
Stay current with emerging threats, vulnerabilities (CVEs), and industry best practices
Participate in compliance efforts (SOC 2, ISO 27001, NIST, GDPR, HIPAA, PCI-DSS, etc., as applicable)
Required Qualifications
Bachelor's degree in Computer Science, Information Security, or equivalent experience
2-5+ years of hands-on experience
Strong knowledge of network security, operating systems (Windows, Linux), and cloud security
Proficiency with security tools such as Splunk, CrowdStrike, Palo Alto, Tenable/Nessus, Qualys, Burp Suite, Metasploit, etc.
Experience with scripting/automation (Python strongly preferred)
Solid understanding of security frameworks (NIST CSF, MITRE ATT&CK, CIS Controls, Zero Trust)
Relevant certifications (at least one required; more are a plus): - CISSP, CCSP, CEH, OSCP, CompTIA Security+, GSEC, GIAC (GCIH, GCIA, GNFA, etc.), AWS/Azure/GCP security certifications
Information Security Analyst -GRC LVL II
Information security analyst job in Houston, TX
***Please note: This position is onsite and not remote. Candidates must be based in the Houston area, as relocation assistance is not provided. Only individuals authorized to work in the U.S. will be considered.*** Job Title: Information Security Analyst \- Governance, Risk & Compliance (GRC) Level II
Job Location: Downtown Houston, TX 77002 *Prospective candidates MUST be located in the HOUSTON, TX area.
Job Type: Contract\/Full\-Time
*This contract position has a duration of 6\-months.
Job Schedule: Mon\-Fri 8AM\-5PM\/Hybrid
*Exact hybrid schedule will be determined by direct manager.
Job Salary:$52\-$54\/hour
*Depending on experience.
This Information Security Analyst\- Governance, Risk & Compliance (GRC) Level II role will design and implement a scalable Cloud and Third\-Party Cybersecurity Risk Management Framework aligned with NIST, ISO 27001, and other relevant standards.
Key Requirements:
Develop and maintain risk assessment procedures and questionnaires tailored for cloud services and third\-party applications.
Define security review workflows for vendor onboarding, contract renewals, and offboarding.
Integrate cybersecurity risk activities with procurement, legal, and enterprise architecture processes.
Conduct technical and compliance assessments focusing on:
Data classification and regulatory alignment (e.g., HIPAA, CJIS, PCI, GDPR)
Encryption standards and access controls
Review vendor responses to security questionnaires and validate supporting documentation (e.g., SOC 2 reports, ISO certifications, penetration test results).
Analyze risks associated with APIs, SaaS integrations, homegrown plug\-ins, and third\-party application stores.
Role and Responsibilities
Collaborate with internal stakeholders to define third\-party cybersecurity roles and responsibilities.
Partner with legal and procurement teams to ensure contracts include appropriate security terms (e.g., data handling, breach notification, audit rights).
Provide security guidance to project teams evaluating or implementing cloud\-based or externally hosted solutions.
Scheduled Milestones and Deliverables
Support the development of cloud security baselines and governance controls.
Recommend mitigation strategies and track remediation efforts.
Evaluate cloud service configurations (e.g., AWS, Azure, Google Cloud, SaaS platforms) for alignment with enterprise security policies and industry best practices.
Metrics to be Utilized to Measure the Performance
Maintain and update a centralized inventory of critical cloud services and third\-party vendors.
Develop and present risk dashboards and executive\-level summaries to communicate risk posture and assessment outcomes.
Track security exceptions, risk acceptance approvals, and remediation timelines across third\-party engagements.
Participate in governance forums such as the Cybersecurity Review Committee (CRC) and provide input on vendor\-related risks.
Requirements
Education:
High School diploma, or G.E.D. equivalency from an accredited educational institution. \- Required
Bachelor's degree in Computer Science, Information Security, Information Technology, Risk Management, or similar area of study from an accredited college or university. \-
Preferred
Experience:
(5)\-Five years of work experience in an Information Security, Information Technology, Computer Science, IT Risk Management or related field.
Knowledge, Skills, and Abilities (KSAs):
Experience designing, implementing, and executing IT Risk Management projects, cloud solutions, cybersecurity governance, and technologies across complex, large\-scale environments.
Ability to build and maintain strong relationships across departments\/teams and effectively communicate information security risks and controls to stakeholders and leadership.
A passion for cybersecurity, self\-starter mentality, flexibility, and willingness to take on new challenges and ability to thrive in a team environment.
Applicants for this position will be subject to a criminal background check that includes being fingerprinted. This applies to any position with network access to Criminal Justice Information Services (CJIS) or access to an area where CJIS is received, maintained, or stored either manually or electronically (i.e., custodian, maintenance).
Automatic Disqualification:
Convictions, probation, or deferred adjudication for any Felony, and any Class A Misdemeanor
Convictions, probation, or deferred adjudication for a Class B Misdemeanor, if within the previous 10 years
Open arrest for any criminal offense (Felony or Misdemeanor)
Family Violence conviction
"}}],"is Mobile":false,"iframe":"true","job Type":"Contract","apply Name":"Apply Now","zsoid":"673084038","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"Work Experience","uitype":2,"value":"4\-5 years"},{"field Label":"Salary","uitype":1,"value":"$52\-$54\/hr"},{"field Label":"City","uitype":1,"value":"Houston"},{"field Label":"State\/Province","uitype":1,"value":"Texas"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"77002"}],"header Name":"Information Security Analyst\-GRC LVL II","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00216003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********04575001","FontSize":"12","google IndexUrl":"https:\/\/smarterhrsolutions.zohorecruit.com\/recruit\/ViewJob.na?digest=kSkbnHeM0@ULfN8kre4OLKN23qCl@d0P2uLoDwY4HVE\-&embedsource=Google","location":"Houston","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do","logo Id":"2oxsac7e1f4138a8a48e1b2b76fabf6b3a45c"}
Network Security Analyst with CCIE and Juniper (L2 Support)
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.