Information security analyst jobs in San Benito, TX - 811 jobs
All
Information Security Analyst
Senior Information Security Consultant
Intrusion Detection Analyst
Network Security Analyst
Securities Analyst
Cyber Security Specialist
Security Architect
Senior Information Assurance Engineer
Senior Cyber Security Analyst
Senior Information Assurance Engineer
Govcio LLC
Information security analyst job in San Antonio, TX
GovCIO is currently hiring a Senior Information Assurance Engineer in support of the Air Force AFSCI network. This position will be located in San Antonio TX and will be an on-site only position.
Responsibilities:
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessments and provides recommendations for application design. Involved in a wide range of computer security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Prepares security reports for government agencies.
Performs a wide range of computer security duties, including architectures, firewalls, electronic data traffic, and network access.
Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security.
Provides business continuity and disaster recovery support.
Engages in intrusion detection and prevention; provides incident reporting and response support.
Conducts ongoing monitoring of computer security requirements and compliance, maintains system security plans and risk mitigation plans.
Trains clients in proper computer security measures and prevention
Specifically, this position will:
Provide support for all vulnerability and compliance scan tool applications and modules (pre-built and customized).
Develop workflows and customize, implement, and maintain the aforementioned applications.
Develop and update standard operating procedures (SOPs) and provide training on existing and new technologies to Government personnel. This is informal office training.
Provide process and operations guides.
Provide technical support in the daily operations and evaluation of existing security tools, products, and future capabilities. Tools shall include, but are not limited to: Security Log Management, Account Management, Asset Management, Vulnerability Management, End Point Security, and any related network security tools. Current tool sets are: ArcSight, Directory Resource Administration (DRA), Automated Compliance Assessment Solution (ACAS), System Center Configuration Manager (SCCM), Tanium, Host Base Security System (HBSS) and Service Now.
Maintain operational oversight and manage Command-level and privileged user accounts for the Enterprise using provided Enterprise tools.
Prepare for and conduct customer briefings, attend, and provide minutes on Technical Exchange Meetings (TEMs), and provide status reports on cybersecurity activities.
Add so,ething about leadership briefs
Develop information systems security studies and reports that address areas of information system security concerns. Ensure cybersecurity requirements are incorporated in system development and sustainment activities. Provide consultant services in all areas of information system security, including: physical, administrative, personnel, computer, operations, and industrial security. Provide security documentation and reports within specified timeframes.
Monitor and report, IAW IC Directives and AFSCI policy, the status of security measures established by the Director of National Intelligence (DNI) and related authorizing officials that protect and defend information and information systems, web-based services, remote hosted applications, discovery, storage, operating systems, public key infrastructure (PKI), and other information technology components and applications for the Enterprise.
Maintain cybersecurity, system security, and sustainment programs. The contractor shall follow all applicable ICD and National Institute of Standards and Technology (NIST) guidance in performing day-to-day duties.
Create, edit, and review security accreditation and authorization packages for the AFSCI Enterprise. Adhere to the RMF process. Input data into appropriate A&A tool. The current toolset used is XACTA. Review logical network drawings, configurations, and control parameters to ensure they are current. Review documentation required to certify new hardware and software systems for deployment.
Monitor and administer the vulnerability and compliance scan tool.
Review AFSCI change proposals for security, interoperability, accreditation and authorization issues or vulnerabilities.
Perform vulnerability and compliance assessments. Conduct security tests and evaluations. Monitor and review Information Assurance Vulnerability Alerts (IAVA) and Information Assurance Vulnerability Bulletins (IAVB).
Track and provide results to appropriate Government entity for review IAW standard operating procedures.
Monitor and report mandated Federal InformationSecurity Management Act (FISMA) statistics for the AFSCI Enterprise.
Provide quarterly report to appropriate Government entity in accordance with IC Directives and AFSCI policy.
Qualifications:
High School with 9+ years (or commensurate experience)
Clearance Required: Current TS/SCI
Required Skills and Experience
MUST have current one of these certifications: CISSP, CISSP-ISSMP, CISM, FITSP-M, GCIA, GCIG, GICSP, GSLC
Strong understanding of RMF workflow tools like eMASS or Xacta
Strong working knowledge of programs working within AFSCI network rules and guides
Experience with network management tools, network engineering principles, network analysis
Expert understanding of A&A process
Possess an expert understanding of current computer security requirement and compliance
Expert ability to maintain System Security and Risk Mitigation plans
Excellent written/verbal communications skills
#NSS #TMK #DSG
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $135,000.00 - USD $140,000.00 /Yr.
$135k-140k yearly Auto-Apply 2d ago
Looking for a job?
Let Zippia find it for you.
Application Security Analyst
Trilyon, Inc.
Information security analyst job in Plano, TX
For over 16 years, Trilyon has been at the forefront of providing comprehensive global workforce solutions and staffing services. Leveraging our extensive expertise across multiple domains such as Cloud technology, Salesforce, AI, Machine Learning, and Technical Writing, we consistently exceed expectations in catering to a wide range of requirements.
Currently we are seeking a “Application SecurityAnalyst” for one of our clients that is a leading multination corporation.
Position: Application SecurityAnalyst
Duration: 12 month (Possible extension)
Location: Plano TX (Hybrid)
Interview process:
1st round virtual
2nd round onsite
Job Description
What we're looking for:
We are seeking a skilled and proactive Application SecurityAnalyst to integrate security practices into our DevOps processes. The ideal candidate will work closely with development and operations team to ensure secure software delivery pipelines, automate security controls, and foster a culture of shift left in the organization.
What you'll be doing
Design, implement, and maintain secure CI/CD pipelines.
Integrate security tools (SAST, DAST, SCA, etc.) into development workflows.
Collaborate with development and operations teams to remediate vulnerabilities.
Automate security testing and compliance checks.
Monitor and respond to security incidents in cloud and container environments.
Develop and enforce security policies, standards, and procedures.
Stay current with emerging security threats and DevSecOps best practices.
Requirements:
Qualifications/ What you bring (Must Haves) - Highlight Top 3-5 skills
Bachelor's degree in Computer Science, Cybersecurity, or related field.
3+ years of experience in DevOps, Security Engineering, or related roles. 2-3 years of security experience. Overall, 6 years
Strong understanding of CI/CD tools (e.g., Jenkins, Harness).
Development knowledge on Java, Python, .Net, etc
Experience with security tools (e.g., Veracode, GHAS, Orca).
Proficiency in scripting languages (e.g., Python, Bash).
Familiarity with containerization and orchestration (Docker, Kubernetes).
Knowledge of cloud platforms (AWS, Azure, GCP) and their security features.
Understanding of secure coding practices and application security principles.
Knowledge of Infrastructure as Code (Terraform, Ansible).
Regards
Kush Deshmukh | Trilyon, Inc.
P: ************ Fax: **************
E: ************************ | ***********************
Equal Employment Opportunity
Trilyon is an Equal Opportunity Employer, committed to fairness and respect for all individuals. We value diversity in age, disability, ethnicity, gender, gender identity, religion, and sexual orientation, believing it drives innovation and better service. Employment decisions are made impartially, without regard to any protected characteristic under federal, state, or local law. Our diverse team drives innovation, competitiveness, and creativity, enhancing our ability to effectively serve our clients and communities. This commitment to diversity makes us stronger and more adaptable.
$66k-93k yearly est. 3d ago
Security Analyst with Active Directory, SIEM and EDR skills - 100% onsite
Calance 4.3
Information security analyst job in Arlington, TX
3 month contract to hire
Rate: $55-60/hr
Salary: $100-120k/yr
The right candidate will address daily tasks and routine processes for IT security. This position will be responsible for
assessing IT security incidents and applying the necessary technical troubleshooting steps to resolve the issue. The
SecurityAnalyst will also be responsible for monitoring suspicious or malicious activity in the company IT infrastructure
and addressing security risk and incidents.
Essential Duties and Responsibilities include the following. Other duties may be assigned.
· Active Directory Management
o Domain controller maintenance and troubleshooting
o ADCS (Active Directory Certificate Services)
· Active Directory Federation Services
o ADFS Server maintenance and troubleshooting
o Work with IT Operations and Development teams with ADFS authentication
· DNS (Domain Name Service)
o Creation and management of DNS records
o Management of F5 DNS VIPs and pools
· Active Directory Sites and Services
o Management of sites and subnets
· Active Directory Domains and Trusts
o Management of domain trust configuration
· Group Policy Management
o Troubleshooting and cleanup of GPOs
· Patching Operations
o Patching research and preparation
§ Research the risk and value of each patch and report the "company" risk rating based on all layers of security in our environment
§ Validate that all applications for IT security are functioning as designed and intended at the conclusion of patching
o SCCM (System Center Configuration Manager)
o Work with the SCCM administrators to address all patching issues and confirm that patching has been configured correctly
· Forensic Operations
o Security Monitoring
§ Monitor security alerts and tools for signs of compromise or malicious behavior
§ Monitoring network alerts and traffic for DDoS attacks
· Forensic Investigation
o Investigate the root cause of compromise incidents or exploited vulnerabilities
o Investigate infrastructure weaknesses and report on malicious activity or potential risk
· Project Operations
o Assist with delegated duties for all security projects
o Partner with other security or IT operations team members for deployments or maintenance
· Conducts all business in a professional and ethical manner to serve customers and increase the
goodwill and profit of the company
· Ability to participate in a weekly call rotation
· IT Operations
o Monitor and assist with any and all IT operational emergencies to keep business applications
operational
· On-Call Responsibilities
o Respond and escalate all IT security incidents as needed
· Mentoring and Training
o .Responsible for the mentoring of Security Administrators
· Ability to travel overnight
Qualifications
Education and/or Experience
· High school diploma or general education degree (GED)
· One to four years' experience in an IT related field
· Knowledge of IT Security Operations and Forensic Operations
· Experience with computer networks
· Experience with project management and delegation
· Business communication and collaboration skills
· Documentation skills
· Ability to work well within a team, and work alone to accomplish tasks independently
· Ability to interpret research into solutions to actual problems
· Customer Service skills
· Ability to apply common sense understanding to carry out instructions furnished in written oral form or via
DRH applications
· Proficiency with MS Office and email
$100k-120k yearly 4d ago
Senior Manager, Information Security Office (ISO) Consultant
Capital One 4.7
Information security analyst job in Longview, TX
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in InformationSecurity. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with modern software, big data ecosystems, and cloud based technologies. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
Responsibilities:
Act as a central InformationSecurity point of contact for the Enterprise Platforms line of business
Coordinate and execute proactive InformationSecurity consulting to the business and technology teams covering Infrastructure Security, Data Security, Web Security, and Mobile Security
Serve as an expert in Capital One's InformationSecurity capabilities, solutions, policies, procedures, and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in development processes
Escalate and manage cyber security risk
Educate and influence executive leadership and associates to effectively leverage security capabilities and solutions to mitigate risks and emerging threats
Deliver Cyber agenda and integration of InformationSecurity within business objectives for the line of business area
Provide regular updates to executive leadership with your line of business on the overall InformationSecurity health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
About You:
You have a desire to work in a very fast moving, forward leaning, and modern computing environment
You have a deep passion for securing modern computing platforms
You have a strong desire to continually learn about new technologies
You possess strong conceptual thinking and communication skills
You are able to work well under minimal supervision
You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives
You are able to tailor communications and analysis to the intended audience
Basic Qualifications:
High School Diploma, GED, or equivalent certification
At least 6 years of experience working in cybersecurity or information technology
At least 6 years of experience providing guidance and oversight of cyber security concepts
At least 5 years of experience performing security risk assessments or security architecture reviews
At least 5 years of experience with architecture, software design, networking, or cloud infrastructure
At least 4 years of experience with cloud security engineering
At least 2 years experience utilizing agile methodologies within DevOps environments
Preferred Qualifications:
Bachelor's Degree
8+ years of experience in cyber security or information technology
6+ years of experience in securing a public cloud environment
5+ years of experience securing Identity Applications
5+ years of experience with Threat Modeling
AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical
Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$74k-96k yearly est. 2h ago
Senior Cyber Security Analyst
University Health 4.6
Information security analyst job in San Antonio, TX
/RESPONSIBILITIES The Senior Cyber SecurityAnalyst must have a deep understanding of informationsecurity protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data. In this role, the Senior Analyst will be instrumental in establishing and maintaining security standards across Community First. The Senior Analyst will be required to develop, implement, and manage security solutions; and must demonstrate the ability to communicate complex security concepts to both technical and non-technical audiences. The Senior Analyst champions awareness and influences compliance with security policies and provides solutions for business-specific security issues. Oversees day-to-day identity access management and quarterly required audits. Owns and oversees the disaster recovery plans; coordinates business continuity plans with the compliance and risk management team. Serves as a thought leader and enterprise subject matter expert (SME) for federal and state informationsecurity regulations and standards.
EDUCATION/EXPERIENCE
Bachelor's degree plus five years of progressive experience working in information technology, security, or risk management. Must possess one or more of the following certifications: CISSP, CASP+, CRISC, CISA. Healthcare experience is highly desirable. Must have a functional understanding of federal/state regulations and compliance mandates, including but not limited to HIPAA, HITRUST, SOC, and other regulatory audits. MITRE ATT&CK experience in building threat detections, performing threat hunting and/or conducting incident response. Familiarity with enterprise logging technologies such as Splunk. Must have Business Continuity Plan and Disaster Recovery planning and testing experience. Five years minimum with below technologies or areas: Network Security: IDS/IPS, NGFW, NGAV Operating Systems: Windows, Linux, mac OS. Security: EDR/XDR, SIEMs, Data Loss and Prevention (DLP), Vulnerability Scanning and Assessment tools.
$84k-107k yearly est. 1d ago
Intrusion Analyst 3
Intelligenesis LLC
Information security analyst job in San Antonio, TX
* Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources * Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained from metadata analysis
* Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs)
* Develop and implement mitigation strategies
* Have a network and/or host-based focus
Required Skills:
* US Citizens Only
* Active TS/SCI Clearance and Polygraph required
* Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master's degree or eight (8) years of relevant experience and a Bachelor's degree or ten (10) years of relevant experience and an Associate's degree required.
* One or more of the following certifications required:
* CISSP
* CEH
* Sec+
* Net+
* GIAC GREM
* CREA
* Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university
* Relevant experience must be in malware analysis
* Programming experience in C, C#, C++, Java, Perl, or Python is preferred
Compensation Range: $57,463.60 - $126,419.91
$57.5k-126.4k yearly 8d ago
Intrusion Analyst 3
Gormat
Information security analyst job in San Antonio, TX
Gormat is looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. You will categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). You will also develop and implement mitigation strategies. The ideal candidate will have a network and/or host-based focus.
The Intrusion Analyst shall possess the following capabilities:
Relevant experience must be in malware analysis
Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
CISSP, GIAC GREM or CREA Certification is preferred for level 1.
Supporting CSD; deep understanding of cyber threat intelligence, preferably against hard targets like state-sponsored APTs. Strong skills using customer toolset and depth of experience leveraging the sigint system for technical data.
Qualifications:
Level 1:
Bachelor's Degree with 2 years of relevant experience.
Associates degree with 4 years of relevant experience.
Level 2:
Master's Degree with 3 years of relevant experience.
Bachelor's Degree with 5 years of relevant experience.
Associates degree with 7 years of relevant experience.
Level 3:
Doctoral degree plus 4 years of relevant experience
Master's degree with 6 years of relevant experience
Bachelor's Degree with 8 years of relevant experience
Associates degree with 10 years of relevant experience
Level 4:
Doctoral degree plus 7 years of relevant experience
Master's degree with 9 years of relevant experience
Bachelor's Degree with 11 years of relevant experience
Associates degree with 13 years of relevant experience
All Levels:
Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university.
Certifications Required:
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3
TS/SCI with polygraph is required.
$69k-99k yearly est. 11d ago
Cyber Security Specialist
Harlingen Consolidated Independent School District (Tx
Information security analyst job in Harlingen, TX
Other Professionals Additional Information: Show/Hide PRIMARY PURPOSE: * This position involves both technical and administrative responsibilities focused on maintaining data integrity and security, including developing policies, monitoring systems, and protecting against unauthorized access or data loss. It also includes overseeing disaster recovery efforts, conducting vulnerability assessments, and performing risk reviews.
QUALIFICATIONS:
Education/Certification:
* Bachelor's Degree in Computer Science, InformationSecurity or related field or equivalent experience in network administration preferred
* CCNA (Cisco Certified Netowrk Associate), Security+ certification required
* Certified Information Systems security Professional (CISSP) certification preferred
Special Knowledge/Skills:
* Strong knowledge of the Texas Cybersecurity Strategic Plan, NIST standard and cybersecurity mandates.
Minimum Experience:
* At least four years' experience in informationsecurity, risk management, or compliance, preferably within a school district environment.
Calendar: 226 days
Salary:
Minimum - $64,647
$64.6k yearly 26d ago
Software Security Architect
Hewlett Packard Enterprise 4.7
Information security analyst job in San Juan, TX
This role has been designed as 'Hybrid' with an expectation that you will work on average 2 days per week from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today's complex world. Our culture thrives on finding new and better ways to accelerate what's next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE.
Job Description:
Job Family Definition:
Designs and develops security programs for software enhancements and new products. Develops solutions for security of software including operating systems, compilers, routers, networks, utilities, databases and Internet-related tools. Determines hardware compatibility and/or influences security hardware design.
Management Level Definition:
Contributions have visible technical impact on a product or major subcomponent. Applies in-depth professional knowledge and innovative ideas to solve complex security problems. Visible contributions improve security posture, time-to-market, , or satisfy current and future unmet customer security needs. Recognized internal authority on key technology area applying innovative principles and ideas. Provides technical security leadership for significant project/program work. Leads or participates in cross-functional initiatives and contributes to mentorship and knowledge sharing across the organization.
Responsibilities:
* Play a critical role in identifying and mitigating potential security risks, collaborating with cross-functional teams and other stakeholders, and maintaining compliance with industry standards and regulations.
* Develops organization-wide security architectures and methodologies for software systems development across multiple platforms in the organization.
* Conduct threat modeling, secure design and risk assessments to proactively identify potential security threats and develop strategies to mitigate them.
* Collaborates with all stakeholders like product management and engineering teams to integrate security into all stages of design and development for complex products and platforms, including solution design, analysis, coding, testing, and integration.
* Create and evolve security architectural patterns, threat modeling frameworks, and secure coding guidelines.
* Provide guidance and support to product development teams in implementing secure coding practices and security best practices.
* Educating and communicating securityinformation and best practices to other stakeholders at HPE.
* Translate emerging threats into actionable guidance for engineering and product teams.
* Represent HPE at industry events and conferences as a product security subject matter expert.
* Provides guidance and mentoring to less- experienced staff members.
Education and Experience Required:
* Bachelor's or Master's degree in Computer Science, Information Systems, or equivalent.
* Typically 10+ years experience in a security role .
Knowledge and Skills:
* Experience designing and developing secure software systems design tools and languages.
* Excellent analytical and problem-solving skills.
* Experience in overall architecture of software systems for products and solutions.
* Experience in cloud security technologies.
* Experience in common security vulnerability classes and taxonomies.
* Experience in security constructs in programming languages like python, java, go, and C.
* Excellent written and verbal communication skills; mastery in English and local language. Ability to effectively communicate product architectures, design proposals and negotiate options at senior management levels.
* History of innovation with multiple patents or deployed solutions in the field of software design.
* Excellent written and verbal communication skills; mastery in English and local language.
* Ability to effectively communicate product architectures, design proposals and negotiate options at business unit and executive levels.
Additional Skills:
Cloud Architectures, Cross Domain Knowledge, Design Thinking, Development Fundamentals, DevOps, Distributed Computing, Microservices Fluency, Full Stack Development, Security-First Mindset, Solutions Design, Testing & Automation, User Experience (UX)
What We Can Offer You:
Health & Wellbeing
We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
Personal & Professional Development
We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
Unconditional Inclusion
We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
Let's Stay Connected:
Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE.
#puertorico
#networking
Job:
Engineering
Job Level:
TCP_05
HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity.
Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities.
HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.
No Fees Notice & Recruitment Fraud Disclaimer
It has come to HPE's attention that there has been an increase in recruitment fraud whereby scammer impersonate HPE or HPE-authorized recruiting agencies and offer fake employment opportunities to candidates. These scammers often seek to obtain personal information or money from candidates.
Please note that Hewlett Packard Enterprise (HPE), its direct and indirect subsidiaries and affiliated companies, and its authorized recruitment agencies/vendors will never charge any candidate a registration fee, hiring fee, or any other fee in connection with its recruitment and hiring process. The credentials of any hiring agency that claims to be working with HPE for recruitment of talent should be verified by candidates and candidates shall be solely responsible to conduct such verification. Any candidate/individual who relies on the erroneous representations made by fraudulent employment agencies does so at their own risk, and HPE disclaims liability for any damages or claims that may result from any such communication.
$105k-150k yearly est. Auto-Apply 60d+ ago
Network Security Analyst
Cymertek
Information security analyst job in San Antonio, TX
Network SecurityAnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, InformationSecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$67k-91k yearly est. Easy Apply 60d+ ago
Network Security Analyst with CCIE and Juniper (L2 Support)
Tekskills 4.2
Information security analyst job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
$63k-91k yearly est. 60d+ ago
Information Security Compliance Analyst
Lee College 3.1
Information security analyst job in Baytown, TX
Starting Salary Range is $71,905.60 - $75,573. The initial salary offer is commensurate with education and related work experience. The InformationSecurity Compliance Analyst is the designated administrator of the Lee College InformationSecurity Program TAC 202.
This position provides assistance to the Chief Information Officer in the operations of the Lee College InformationSecurity Program, as well as oversight and implementation of system-wide informationsecurity strategies and solutions. Specific areas include IT policy, continuity of IT operations, informationsecurity risk assessment, informationsecurity operations review, and security life cycle for information systems.
Please Note: This position offers a hybrid work arrangement, blending onsite presence with remote flexibility.
* Develop, recommend, and establish policies, procedures, and practices as necessary to protect Lee College information resources against unauthorized or accidental modification, destruction, or disclosure.
* Design, coordinate and execute audit process, monitoring and procedures to assess and measure company Governance, risks, compliance with its security policies and procedures. Monitor advancements in information privacy laws to ensure organizational adaptation and compliance.
* Identify and implement proactive and reactive technical measures to detect vulnerabilities and to defend against external and internal security threats.
* Plan, implement and overseeing risk-related programs as per TAC 202 and other industry related frameworks & compliances. Creating and coordinating proper reporting channels for compliance issues. Developing compliance communications. Coordinating and scheduling required compliance training for employees.
* Provide consulting and technical support services to owners, custodians, and users in defining and deploying cost-effective security controls and protections.
* Ensures College functions in a legal and ethical manner while meeting its business goals. Responsible for developing Risk & compliance programs, reviewing company policies, and advising management on possible risks as per TAC202 state program and other best practices.
* Establish, maintain, and institutionalize security incident response procedures to ensure that security events are thoroughly investigated, documented, and reported; that damage is minimized, that risks are mitigated, and that remedial actions are taken to prevent recurrence.
* Investigate or direct Governance, Risk and compliance security issues, assess product, vulnerabilities, compliance, or operational risks and develop risk management strategies.
* Establish and publicize a security awareness program to achieve and maintain a security-conscious user community.
* Document, maintain, and obtain ongoing support for all aspects of the informationsecurity program.
* Monitor the effectiveness of strategies, activities, measures, and controls designed to protect the College information resources.
* Assure executive management's awareness of legal and regulatory changes that might impact the College informationsecurity and privacy policies and practices.
* Serve as Lee College internal and external point of contact for informationsecurity matters.
* Report frequently (at least annually) on the status and effectiveness of the informationsecurity program as directed by the Chief Information Officer (see TAC §202.73(a)).
* Have authority for informationsecurity for the entire institution (see TAC §202.71(a)(2)).
* Develop and recommend policies and establish procedures and practices, in cooperation with the information-owners and custodians, necessary to ensure the security of information and information resources against unauthorized or accidental modification, destruction, or disclosure.
* Coordinate the review of the data security requirements, specifications, and, if applicable, third-party risk assessment of any new computer applications or services that receive, maintain, and/or share confidential data.
* Verify that security requirements are identified, and risk mitigation plans are developed and contractually agreed to and obligated prior to the purchase of information technology hardware, software, and systems development services for any new high impact computer applications or computer applications that receive, maintain, and/or share confidential data.
* Serve as liaison with assigned Lee College educational centers for the purpose of monitoring informationsecurity program effectiveness and compliance with program requirements.
Perform other duties as assigned.
* Bachelor's (or higher) degree in a related field
* Five (5) years of experience designing, implementing, auditing, and/or managing information resources, informationsecurity, or risk management projects, operations, and/or programs
* Experience in the implementation of governance, risk, and compliance strategies preferred
* Experience working in a higher education setting preferred
* Experience in Texas State government preferred
* Must be able to work evenings and weekends as required
$71.9k-75.6k yearly 15d ago
Network Security Audit
Stem Xpert
Information security analyst job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
$67k-90k yearly est. Easy Apply 60d+ ago
IT Network / Security Analyst
Txo Partners Gp LLC
Information security analyst job in Fort Worth, TX
The IT Network/SecurityAnalyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
$67k-90k yearly est. Auto-Apply 60d+ ago
Senior Manager, Information Security Office Consultant
Capital One 4.7
Information security analyst job in Longview, TX
Senior Manager, InformationSecurity Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in InformationSecurity. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
As a Senior Manager, You will play a leading role in delivering product security advisory services for a fast moving project within a line of business portfolio, working closely with other professionals as required. You have the ability to lead complex problem solving in partnership with multiple stakeholders in a fast-paced environment, driving results with critical impact. You will work with the other Informationsecurity consultants, business, technology and risk partners to achieve time sensitive goals and objectives in a secure manner with a heavy forward lean on modern software and technology architectures.
Responsibilities:
Act as an InformationSecurity point of contact for a business function within the Card line of business
Coordinate and execute proactive InformationSecurity consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's InformationSecurity capabilities, solutions, policies, procedures and standards
Leverage strong technical acumen and be security SME reviewing architecture, providing risk mitigation solutions and driving overall risk management.
Partner closely with engineers, product managers, and other cross-functional partners to help break down complexity and organizational silos to problem solve.
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special InformationSecurity hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall InformationSecurity health and risk environment
About You:
You have a desire to work in a very fast moving, forward leaning, and modern computing environment
You have experience in securing large-scale e-commerce platforms, with deep understanding of payments systems, customer data protection across high transaction environments ensuring protection of user data across internal and partner ecosystems.
You have a deep passion for Securing modern computing platforms
You have a strong desire to continually learn about new technologies
You possess strong conceptual thinking and communication skills
You are able to work well under minimal supervision
You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 6 years of experience working in cybersecurity or information technology
At least 5 years of experience providing guidance and oversight of Security concepts
At least 5 years of experience performing security risk assessments and security architecture reviews
At least 5 years of experience with architecture, software design, networking, and cloud infrastructure
At least 4 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
6+ years of experience Application Security, Threat Modeling, Penetration Testing, Vulnerability Management
4+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
2+ years experience in e-commerce industry
2+ years of experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
1+ years of experience in security integration for Mergers and Acquisitions
1+ years of experience with Cloud patch management practices such as system rehydration and image management
1+ years of experience utilizing Agile methodologies
1+ years of experience with Software Security Architecture
1+ years of experience with Application Security
1+ years of experience with Threat Modeling
1+ years of experience with Penetration Testing and/or Vulnerability Management
1+ years of experience with integrating SaaS products into an Enterprise Environment
1+ years of experience with securing Container services
1+ years of experience with Splunk-Fu and Enterprise Monitoring experience
1+ years of experience in a Financial services industry experience
1+ years of experience with Offensive or Defensive Security techniques
AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, or another type of work authorization).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical
New York, NY: $245,900 - $280,600 for Sr Manager, Cyber Technical
Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical
Richmond, VA: $204,900 - $233,800 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$74k-96k yearly est. 2h ago
Intrusion Analyst 3
Intelligenesis
Information security analyst job in San Antonio, TX
Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
Have a network and/or host-based focus
Required Skills:
US Citizens Only
Active TS/SCI Clearance and Polygraph required
Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master's degree or eight (8) years of relevant experience and a Bachelor's degree or ten (10) years of relevant experience and an Associate's degree required.
One or more of the following certifications required:
CISSP
CEH
Sec+
Net+
GIAC GREM
CREA
Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university
Relevant experience must be in malware analysis
Programming experience in C, C#, C++, Java, Perl, or Python is preferred
Compensation Range: $57,463.60 - $126,419.91
_____________________________________________________________________________________________________
Compensation ranges encompass a total compensation package and are a general guideline only and not intended as a guaranteed and/or implied final compensation or salary for this job opening. Determination of official compensation or salary relies on several different factors including, but not limited to: level of position, complexity of job responsibilities, geographic location, candidate's scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements and alignment with local market data.
Our compensation includes other indirect financial components designed to support employees' total well-being, which should be considered when evaluating our competitive benefits package. These monetary benefits include medical insurance, life insurance, disability, paid time off, maternity/paternity leave, 401(k) company match, training/education reimbursements and other work/life programs.
_____________________________________________________________________________________________________
IntelliGenesis is committed to providing equal opportunity to all employees and applicants for employment. The Company is an Equal Opportunity Employer (EOE), and as such, does not tolerate discrimination, retaliation, or harassment of its employees or applicants based upon race, color, religion, gender, sexual orientation, national origin, age, genetic information, disability, or any other protected characteristic under local, state, or federal law in any employment practice. Such employment practices include, but are not limited to: hiring, promotion, demotion, transfer, recruitment, or recruitment advertising, selection, disciplinary action layoff, termination, rates of pay, or other forms of compensation and selection of training.
IntelliGenesis is committed to the fair and equal employment of individuals with disabilities. It is the Company's policy to reasonably accommodate qualified individuals with disabilities unless the accommodation would impose an undue hardship on the organization. In accordance with the Americans with Disabilities Act (ADA) as amended, reasonable accommodations will be provided to qualified individuals with disabilities, when such accommodations are necessary, to enable them to perform the essential functions of their jobs or to enjoy the equal benefits and privileges of employment. This policy applies to all applicants for employment and all employees.
$57.5k-126.4k yearly Auto-Apply 60d+ ago
Intrusion Analyst 3
Gormat
Information security analyst job in San Antonio, TX
Job Description
Gormat is looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. You will categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). You will also develop and implement mitigation strategies. The ideal candidate will have a network and/or host-based focus.
The Intrusion Analyst shall possess the following capabilities:
Relevant experience must be in malware analysis
Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
CISSP, GIAC GREM or CREA Certification is preferred for level 1.
Supporting CSD; deep understanding of cyber threat intelligence, preferably against hard targets like state-sponsored APTs. Strong skills using customer toolset and depth of experience leveraging the sigint system for technical data.
Qualifications:
Level 1:
Bachelor's Degree with 2 years of relevant experience.
Associates degree with 4 years of relevant experience.
Level 2:
Master's Degree with 3 years of relevant experience.
Bachelor's Degree with 5 years of relevant experience.
Associates degree with 7 years of relevant experience.
Level 3:
Doctoral degree plus 4 years of relevant experience
Master's degree with 6 years of relevant experience
Bachelor's Degree with 8 years of relevant experience
Associates degree with 10 years of relevant experience
Level 4:
Doctoral degree plus 7 years of relevant experience
Master's degree with 9 years of relevant experience
Bachelor's Degree with 11 years of relevant experience
Associates degree with 13 years of relevant experience
All Levels:
Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university.
Certifications Required:
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3
TS/SCI with polygraph is required.
Job Posted by ApplicantPro
$69k-99k yearly est. 11d ago
Senior Manager, Information Security Office Consultant
Capital One 4.7
Information security analyst job in Waco, TX
Senior Manager, InformationSecurity Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in InformationSecurity. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
As a Senior Manager, You will play a leading role in delivering product security advisory services for a fast moving project within a line of business portfolio, working closely with other professionals as required. You have the ability to lead complex problem solving in partnership with multiple stakeholders in a fast-paced environment, driving results with critical impact. You will work with the other Informationsecurity consultants, business, technology and risk partners to achieve time sensitive goals and objectives in a secure manner with a heavy forward lean on modern software and technology architectures.
Responsibilities:
Act as an InformationSecurity point of contact for a business function within the Card line of business
Coordinate and execute proactive InformationSecurity consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's InformationSecurity capabilities, solutions, policies, procedures and standards
Leverage strong technical acumen and be security SME reviewing architecture, providing risk mitigation solutions and driving overall risk management.
Partner closely with engineers, product managers, and other cross-functional partners to help break down complexity and organizational silos to problem solve.
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special InformationSecurity hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall InformationSecurity health and risk environment
About You:
You have a desire to work in a very fast moving, forward leaning, and modern computing environment
You have experience in securing large-scale e-commerce platforms, with deep understanding of payments systems, customer data protection across high transaction environments ensuring protection of user data across internal and partner ecosystems.
You have a deep passion for Securing modern computing platforms
You have a strong desire to continually learn about new technologies
You possess strong conceptual thinking and communication skills
You are able to work well under minimal supervision
You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 6 years of experience working in cybersecurity or information technology
At least 5 years of experience providing guidance and oversight of Security concepts
At least 5 years of experience performing security risk assessments and security architecture reviews
At least 5 years of experience with architecture, software design, networking, and cloud infrastructure
At least 4 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
6+ years of experience Application Security, Threat Modeling, Penetration Testing, Vulnerability Management
4+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
2+ years experience in e-commerce industry
2+ years of experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
1+ years of experience in security integration for Mergers and Acquisitions
1+ years of experience with Cloud patch management practices such as system rehydration and image management
1+ years of experience utilizing Agile methodologies
1+ years of experience with Software Security Architecture
1+ years of experience with Application Security
1+ years of experience with Threat Modeling
1+ years of experience with Penetration Testing and/or Vulnerability Management
1+ years of experience with integrating SaaS products into an Enterprise Environment
1+ years of experience with securing Container services
1+ years of experience with Splunk-Fu and Enterprise Monitoring experience
1+ years of experience in a Financial services industry experience
1+ years of experience with Offensive or Defensive Security techniques
AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, or another type of work authorization).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical
New York, NY: $245,900 - $280,600 for Sr Manager, Cyber Technical
Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical
Richmond, VA: $204,900 - $233,800 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$75k-96k yearly est. 2h ago
Intrusion Analyst 3
Intelligenesis
Information security analyst job in Boerne, TX
Job Description
Analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
Have a network and/or host-based focus
Required Skills:
US Citizens Only
Active TS/SCI Clearance and Polygraph required
Minimum of four (4) years of experience and a Doctoral degree or six (6) years of relevant experience and a Master's degree or eight (8) years of relevant experience and a Bachelor's degree or ten (10) years of relevant experience and an Associate's degree required.
One or more of the following certifications required:
CISSP
CEH
Sec+
Net+
GIAC GREM
CREA
Degree must be in Computer Science, Computer Engineering, Information Systems or related discipline from an accredited college or university
Relevant experience must be in malware analysis
Programming experience in C, C#, C++, Java, Perl, or Python is preferred
Compensation Range: $57,463.60 - $126,419.91
_____________________________________________________________________________________________________
Compensation ranges encompass a total compensation package and are a general guideline only and not intended as a guaranteed and/or implied final compensation or salary for this job opening. Determination of official compensation or salary relies on several different factors including, but not limited to: level of position, complexity of job responsibilities, geographic location, candidate's scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements and alignment with local market data.
Our compensation includes other indirect financial components designed to support employees' total well-being, which should be considered when evaluating our competitive benefits package. These monetary benefits include medical insurance, life insurance, disability, paid time off, maternity/paternity leave, 401(k) company match, training/education reimbursements and other work/life programs.
_____________________________________________________________________________________________________
IntelliGenesis is committed to providing equal opportunity to all employees and applicants for employment. The Company is an Equal Opportunity Employer (EOE), and as such, does not tolerate discrimination, retaliation, or harassment of its employees or applicants based upon race, color, religion, gender, sexual orientation, national origin, age, genetic information, disability, or any other protected characteristic under local, state, or federal law in any employment practice. Such employment practices include, but are not limited to: hiring, promotion, demotion, transfer, recruitment, or recruitment advertising, selection, disciplinary action layoff, termination, rates of pay, or other forms of compensation and selection of training.
IntelliGenesis is committed to the fair and equal employment of individuals with disabilities. It is the Company's policy to reasonably accommodate qualified individuals with disabilities unless the accommodation would impose an undue hardship on the organization. In accordance with the Americans with Disabilities Act (ADA) as amended, reasonable accommodations will be provided to qualified individuals with disabilities, when such accommodations are necessary, to enable them to perform the essential functions of their jobs or to enjoy the equal benefits and privileges of employment. This policy applies to all applicants for employment and all employees.
Powered by JazzHR
r6Q1S4orSF
$57.5k-126.4k yearly 2d ago
Senior Manager, Information Security Office (ISO) Consultant
Capital One 4.7
Information security analyst job in Waco, TX
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in InformationSecurity. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with modern software, big data ecosystems, and cloud based technologies. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
Responsibilities:
Act as a central InformationSecurity point of contact for the Enterprise Platforms line of business
Coordinate and execute proactive InformationSecurity consulting to the business and technology teams covering Infrastructure Security, Data Security, Web Security, and Mobile Security
Serve as an expert in Capital One's InformationSecurity capabilities, solutions, policies, procedures, and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in development processes
Escalate and manage cyber security risk
Educate and influence executive leadership and associates to effectively leverage security capabilities and solutions to mitigate risks and emerging threats
Deliver Cyber agenda and integration of InformationSecurity within business objectives for the line of business area
Provide regular updates to executive leadership with your line of business on the overall InformationSecurity health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
About You:
You have a desire to work in a very fast moving, forward leaning, and modern computing environment
You have a deep passion for securing modern computing platforms
You have a strong desire to continually learn about new technologies
You possess strong conceptual thinking and communication skills
You are able to work well under minimal supervision
You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives
You are able to tailor communications and analysis to the intended audience
Basic Qualifications:
High School Diploma, GED, or equivalent certification
At least 6 years of experience working in cybersecurity or information technology
At least 6 years of experience providing guidance and oversight of cyber security concepts
At least 5 years of experience performing security risk assessments or security architecture reviews
At least 5 years of experience with architecture, software design, networking, or cloud infrastructure
At least 4 years of experience with cloud security engineering
At least 2 years experience utilizing agile methodologies within DevOps environments
Preferred Qualifications:
Bachelor's Degree
8+ years of experience in cyber security or information technology
6+ years of experience in securing a public cloud environment
5+ years of experience securing Identity Applications
5+ years of experience with Threat Modeling
AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical
Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$75k-96k yearly est. 2h ago
Learn more about information security analyst jobs
How much does an information security analyst earn in San Benito, TX?
The average information security analyst in San Benito, TX earns between $60,000 and $126,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in San Benito, TX