Post job

Information security analyst jobs in The Woodlands, TX - 128 jobs

All
Information Security Analyst
Securities Analyst
Cyber Security Analyst
Senior Security Analyst
Information Security Officer
Network Security Analyst
Information Security Manager
Cyber Security Specialist
Information Security Director
Senior Information Security Analyst
  • Cyber Security Analyst | ED&F Man | Houston or Miami

    Ed&F Man Holdings Ltd. 3.3company rating

    Information security analyst job in Houston, TX

    We are looking for a Cyber Security Analyst to join our global security team. This role will suit a technically capable individual with experience in security operations who is looking to broaden their exposure across security monitoring, engineering, and incident response within a dynamic environment. The role provides hands-on involvement in triaging and investigating security alerts, acting as an escalation point for the outsourced Security Operations Centre (SOC), supporting major incident response activities. The successful candidate will work closely with infrastructure and network teams to manage and optimise endpoint, email, identity, and vulnerability management platforms, while contributing to continuous improvement of the organisation's security posture. This role offers the opportunity to evaluate and transition between security tools, maintain policy continuity and develop a broad, practical skillset across enterprise cyber security functions. Business Overview Established in 1783, ED&F Man is an employee-owned agricultural commodities merchant with 2,800 people in 43 countries and annual revenue in excess of $8bn. We trade sugar, coffee, molasses, animal feed and fish oils. Corporate responsibility is ingrained in our culture. We are passionate about sustainable production, take care to limit the environmental impact of our operations and actively support the communities in which we work. Key Accountabilities * Act as the escalation point for the outsourced SOC, receiving and triaging alerts that require deeper investigation. * Conduct thorough investigations to produce high-quality, actionable insights for incident resolution. * Participate actively in major security incidents, contributing to containment, eradication and recovery efforts * Document incident timelines and contribute to post-incident reviews and lessons learned. * Respond to detections, triage alerts and update SOC tickets with investigation findings * Maintain and update policies in line with vendor best practice and internal Change Advisory Board protocols. * Monitor agent health, audit version compliance and remediate orphaned or non-compliant clients. * Attend monthly vendor meetings to review support cases and incorporate best practice guidance. * Design and refine SOC playbooks and response actions, evaluating new security technologies through structured proof-of-concept trials and creating scoring matrices to compare vendors. * Manage block and safe listings to maintain email hygiene, troubleshooting false positives and tune detection rules. * Perform email investigations as required in response to phishing or BEC attempts, producing monthly vulnerability reports and prioritising remediation efforts based on risk. * Work with infrastructure and application teams to test patches and drive vulnerability counts down. * Attend monthly TAM meetings to review support cases and best practices. * Maintain agility to substitute security products as business requirements evolve, ensuring policy continuity throughout transitions. Skills and Experience * 5+ years' experience in a Cyber Security Analyst or similar role, with strong incident response and major incident handling expertise. * Hands-on experience with EDR (alert triage, policy management, sensor deployment), preferably CrowdStrike Falcon. * Experience developing SOC playbooks, response actions, and running proof-of-concept evaluations and vendor comparisons. * Confident, proactive communicator able to engage senior stakeholders, clearly explain complex security issues, and recommend actions. * Collaborative and approachable, building trust with technical peers and supporting service desk and front-line teams. * Calm, effective, and resilient under pressure, particularly during security incidents in a front-facing role. * Formal qualifications not essential; proven hands-on experience and delivery record valued. Technical Capabilities: * Experience with SIEM platforms (e.g. Rapid7), Email Security and Data Security/DLP solutions (e.g. Varonis). * Strong knowledge of Entra ID security features including Conditional Access and PIM, plus familiarity with PAM tools including BeyondTrust, Osirium and Okta. * Solid networking fundamentals (TCP/IP, DNS, firewalls, proxies, SSL/TLS) and vulnerability management experience (Qualys/Rapid7 preferred). * Cloud security experience across Azure and/or AWS. * Scripting skills in Python and/or AutoIT for automation and tooling. * Desirable certifications include CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and relevant vendor certifications (e.g., CrowdStrike, Qualys, Palo Alto). We recognise that talent comes in many forms, and we value potential just as much as experience. If this role excites you but you don't meet every requirement, we still encourage you to apply. Our Offer We provide a fast-paced, stimulating and truly global environment, which will stretch your abilities and channel your talents. We also offer competitive salary and benefits combined with outstanding career development opportunities in one of the global leaders in soft commodity trading. Our Values Respect, Integrity, Meritocracy, Client Focus, Entrepreneurship Our values define who we are. They are the fundamental beliefs that determine our actions and guide our behaviour. They influence the way we communicate and collaborate, and define the way we engage with our clients, partners, and communities. Our values are underpinned by a set of essential behaviours, which form part of our performance management approach. Delivering on our objectives is very much about 'what' we do, but these essential behaviours also provide a guide and measure for 'how' we do things. Our performance essentials are Take Initiative, Self‐Management, Deliver Results and Collaboration. Our Commitment We are committed to creating and sustaining an inclusive and diverse work environment where all employees are treated with dignity and respect. We are committed to promoting equal opportunities in employment and are focussed on actively building and developing diverse teams. All qualified applicants will receive equal treatment without regard to race, colour, sex, gender, age, religion or belief, ethnic or national origin, marital or civil partner status, physical or mental disability, military or veteran status, sexual orientation, gender reassignment (identity, gender expression), genetic information or any characteristic protected by local law. We are willing to make any reasonable adjustments throughout our recruitment process.
    $74k-105k yearly est. 37d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Virtual Cyber Security SDR, BDR, Contract to Hire

    Planet Green Search

    Information security analyst job in Houston, TX

    Virtual Cyber Security SDR, BDR, remote Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence. Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft. They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process. This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel. We Are Looking For: As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category! What You'll Do: Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing. Make daily outbound calls/emails to prospects who have demonstrated interest. Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel. Record all activities and properly manage lead stage/flow in our Salesforce CRM. Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs. Schedule product demos on AE's calendar. Discern buyer intent and partner with AEs to get the right customers onboarded. Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features. What You'll Need: Must have BDR/SDR experience in the SaaS or similar software space Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel. Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone. Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must. Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important. Must be a great listener with an ability to address objections graciously and frame the next steps clearly. Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel. Verifiable track record of success and goal attainment in a frontline sales-oriented role Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important. Track record of (over)achieving sales quotas. Must have a strong, self-motivated drive, passion, and desire to deliver results. Experience in a fast-growing startup environment is a big plus. What We Offer: Contract to Hire, Strong Salary plus comm after 90 days Full Benes PreIPO equity Be part of an exciting high-growth SaaS organization An impactful role with lots of growth potential A lot of freedom to apply your creative and strategic skills A work-hard, play-hard environment 100% virtual Virtual Cyber Security SDR, BDR, remote
    $75k-103k yearly est. 60d+ ago
  • Cyber Cloud Analyst

    Stratacuity

    Information security analyst job in Houston, TX

    Implement and maintain security controls for cloud environments (Azure, AWS, GCP). Monitor cloud workloads for vulnerabilities and compliance gaps. Support secure migration and integration of cloud services during business transitions. Support in the maintenance and implementation of enterprise-wide cybersecurity policies, standards, and procedures aligned with business objectives. Oversee security risk assessments, communicate and address mitigations while ensuring the organization's cybersecurity risk posture Ensure compliance with regulatory requirements and industry standards (SOC 2, ISO 27001, NIST, etc.) Collaborate with IT and business stakeholders to embed "security by design" principles. Be the primary liaison between incident response efforts and coordinate with IT teams during security events Understand how to manage security tools including firewalls, SIEM, endpoint protection, and access controls Assist with regular security audits, vulnerability assessments, and penetration testing Track and report security metrics and KPIs to leadership Support the third-party vendor security assessments process Partner with business units to integrate security best practices into daily operations Serve as the subject matter expert for security-related questions Design and implement security controls across multi-cloud environments (AWS, Azure, GCP) Conduct cloud security assessments and risk analyses for new cloud initiatives Establish and maintain cloud security baselines and configuration standards Design secure network segmentation strategies for business applications Understand and support the zero-trust network architecture principles Serve as primary security liaison for assigned business units Translate technical security requirements into business-friendly language Understand and drive security roadmaps aligned with business transformation goals Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or related field Relevant certifications (CISSP, CISM, CISA, or equivalent) 6+ years of experience in cybersecurity and risk management Strong understanding of security frameworks, threat landscapes, and business operations Ability to work independently and drive initiatives with minimal supervision Strong knowledge of cloud security frameworks (CIS, NIST, ISO 27001) and network security principles Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Location: Houston, TX, US Job Type: Date Posted: January 21, 2026 Similar Jobs * Cyber Network Analyst * Senior Cyber Security Analyst * Cyber Security Engineer * Sr. GCS Cloud Security Analyst * Cyber Security Principal
    $75k-103k yearly est. 9d ago
  • Cyber Security Analyst

    Zone It Solutions

    Information security analyst job in Houston, TX

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $75k-103k yearly est. Easy Apply 17d ago
  • Information Security Analyst

    Shell Federal Credit Union 4.0company rating

    Information security analyst job in Deer Park, TX

    Shift Hours: M-W & F 8:30 AM - 5:15 PM TH 8:30 AM - 5:45 PM and On-Call in Deer Park. The Information Security Analyst is responsible for working with and providing support to the ISM and IS&T Team in maintaining security best practices and regulatory requirements. Essential Job Duties and Responsibilities Consistently meet all Shell FCU Service Commitments; Shell FCU Employee Creed and Shell FCU Service Distinctions Accountable to maintain knowledge of and comply with all applicable rules and regulations required within the scope of duties, including, but not limited to, the Bank Secrecy Act Required to attend annual training sessions as instructed or scheduled. Perform job duties and responsibilities in compliance with Shell FCU policies, procedures, philosophy, and standards of performance. Assist security team in identifying current security and compliance requirements and recommend security solutions or actions. Assess network threats such as computer viruses and malware, perform vulnerability assessment in support of penetration analysis, operate host and network intrusion/prevention programs, administer access/ monitoring of critical systems, review critical system logs, identify, and document unique local threats/vulnerabilities and recommend remedial action. Work with ISM/Network Team security standards and practices to install, design, configure and maintain security applications that protect against malware, encrypt information, and ward off hackers and other bad actors. Maintain the security and health of the network from misuse through neglect, lack of training, or malevolence from internal and external sources. Monitor programs and processes that keep outsiders from gaining access to Shell FCU private networks and data. Prepare for and provide rapid response to security threats such as virus, worms, or other malicious attacks. Assist in the preservation, identification, extraction, and documentation of evidence stored in computers. Perform log reviews on a predefined basis, to detect anomalous activity. Perform network vulnerability scans and make recommendations based on findings. Conduct forensic analyses when necessary. Utilize cybersecurity tools to periodically test the corporate environment and verify end user best practices to maintain strong security practices. Work with IS&T staff to continually review and maintain security hardening standards within newly deployed systems, codes, updates, upgrades, or patches. Assist in patch management and firmware updates to maintain optimal levels of security. Support anomaly detection and trending tools to provide in-depth analysis of events detected by these applications. Included in this position will be the overall maintenance of the environments, configuration upgrades and tuning, incident response escalations, and 1st level NOC support for all alerts detected. Respond to network security incidents through remediation efforts including implementation of a secure infrastructure, the secure repair of technology components and assist in the development of incident response and recovery processes. Support IS&T staff on security-related projects including design, configuration, deployment and maintenance of policy enforcement tools, techniques, and reporting. Participate in business continuity / disaster recovery planning and Change Management / Change Configuration processes and reviews. Effectively communicate security information gathered from security tools, logs, evolving risks, and reported incidents by employees, to management or security teams. Perform additional duties, as assigned. Shell Federal Credit Union is an equal opportunity and an affirmative action employer and committed to providing equal opportunity for all employees and applicants for employment, without regard to race, religion, color, sex, sexual orientation, gender identity, national origin, age, citizenship status, marital status, protected veteran status, mental and/or physical disability, pregnancy, or any basis prohibited by State or Federal law. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Knowledge and Skills Experience: Three or more years' strong Windows and Windows Network administration, database systems and network connectivity skills. Three or more years' experience performing security related tasks for a medium to large enterprise. Education / Training: Two-year degree; Cybersecurity degree and/or equivalent related experience or certification. Two or more years' systems development, information security, PC support and network/systems administration experience. Current, Industry standard recognized certification in information security (ex: Security+, CEH certification) Good knowledge/experience working with following products a plus: Windows Server Technologies, Cisco Routers/Switches/Firewalls, Websense, Symantec Endpoint Protection, IDS/IPS, Cisco CSA, Windows Active Directory Infrastructure, Linux based systems, Kali Linux, Threat Hunting, Honeypots, Wireshark, NESSUS, Penetration Testing Tools, Dell KACE, working knowledge of Python. Job Requirements: Knowledge of credit union products and services Positive, welcoming, and helpful demeanor Must be able to communicate information technology and security procedures and requirements to users and key Management. Must possess functional knowledge regarding regulatory issues pertaining to security in a financial institution. Must have strong analytical and problem-solving skills with the ability to clearly present and communicate technical and management concepts. Advanced computer skills Must possess professional verbal communication skills. Position requires participation in on-call rotations as needed or assigned. Position will at times require participation in after-hours or weekend work. Must be prepared to participate in Disaster Recovery, Business Continuity, or Incident Response scenarios. Ability to multitask in a fast-paced environment. Ability to handle workloads during emergencies or stressful time sensitive situations. Ability to work in open-concept workspace/environment. Physical Demands: While performing the duties of this job, the employee is regularly required to bend and stand. May at times be able to lift, carry and/or move up to 15 pounds. Working Conditions Exposure to potential hazardous conditions-robbery. Employees are to receive detailed instructions and procedures to be followed to minimize risk. In accordance with the American with Disabilities Act, it is possible that requirements may be modified to reasonably accommodate disabled individuals. However, no accommodations will be made which may pose serious health or safety risks to the employee or others or which impose undue hardships on the organization. This is not a complete statement of all duties and responsibilities comprising this position. Job descriptions are not intended and do not create employment contracts. The organization maintains its status as an at-will employer. Employees can be terminated for any reason not prohibited by law. This organization uses E-Verify in its hiring practices to achieve a lawful workforce.
    $58k-87k yearly est. 19d ago
  • Technical Security Analyst

    NRG Energy, Inc. 4.9company rating

    Information security analyst job in Houston, TX

    As an NRG employee, we encourage you to take charge of your career and development journey. We invite you to explore exciting opportunities across our businesses. You'll find that our dynamic work environment provides variety and challenge. Your growth is key to our ongoing success-take the lead in shaping your career development, goals and future! Technical Security Analyst NRG is leading a customer-driven change in the U.S. energy industry by delivering cleaner and smarter energy choices, while building on the strength of the nation's largest and most diverse competitive power portfolio. A Fortune 500 company, we create value through reliable and efficient conventional generation while driving innovation in solar and renewable power, carbon capture technology and customer-centric energy solutions. Our retail electricity providers serve almost 3 million residential and commercial customers throughout the country. Overview: The Technical Security Analyst will be a contributor to the Enterprise Security function of a Fortune 500 company. This position, reporting to the Manager, Enterprise Security Programs, will coordinate with various stakeholders across the Company in order to support the delivery of technical security services. Additionally, this position will work closely with other members of the Enterprise Security team to assist the development of enterprise security solutions. Essential Duties/Responsibilities: * Collaborate with various locations in support of the development and execution strategy for site security plans. * Provide system support on electronic access control systems (ePACS) and video management. * Coordinate with Company locations and integrators for system conversions, new builds, or site upgrades regarding access control and video management. * Maintain relationships with national vendors and integrators * Provide system and integrated site support for the Genetec Platform in a Federated environment with the Enterprise Security Operations Center. * Maintain systems in accordance with IT best practices. * Coordinate and collaborate with various business units across the organization (HR, Legal, IT, Compliance, HSE, etc.) in order to support the delivery of risk based security solutions across the enterprise. Education/Experience: Associates's Degree in Business, Information Technology, Security Management, or Criminal Justice is preferred. Experience will be accepted in lieu of education. * 1 year of experience supporting centralized electronic access control systems. * Ability to work independently with minimal supervision * Genetec experience and certification is preferred. * Experience with Windows Servers and SQL database applications. * Familiarity with various access control and video management platforms (e.g. CCURE, ProWatch, Lynell, Tyco, exaq Vision). Additional Knowledge, Skills and Abilities: * The ability to build relationships across various levels of leadership throughout the organization. * Exceptional analytical skills. * Solid initiative and follow-through. * Growth mindset with a willingness to learn new skills. * Exceptional teamwork. * Excellent verbal and written communication skills. * Basic understanding of Network Protocols. Working Conditions: Work is normally in an office environment. However, work is often performed at various locations where NRG may be located or seek to develop locations, sometimes under stressful conditions and/or in unpleasant locations or environments with various risk, during all kinds of weather and frequently in addition to and after normal working hours at night, on weekends or holidays. Ability to travel extensively on short notice is required. Employee is required to respond by telephone or in person during on-duty and off-duty hours. NRG Energy is committed to a drug and alcohol-free workplace. To the extent permitted by law and any applicable collective bargaining agreement, employees are subject to periodic random drug testing, and post-accident and reasonable suspicion drug and alcohol testing. EOE AA M/F/Vet/Disability. Level, Title and/or Salary may be adjusted based on the applicant's experience or skills. Official description on file with Talent. Nearest Major Market: Houston
    $92k-118k yearly est. 1d ago
  • Senior Security Analyst

    Voltagrid, LLC

    Information security analyst job in Houston, TX

    Senior Security Analyst FLSA Class: EXEMPT Responsible to: Lead Security Architect The Senior Security Analyst plays a critical role in protecting our company's systems, data, and assets by monitoring threats, analyzing incidents, and implementing security measures. This individual will serve as a subject matter expert, providing technical guidance and helping drive improvements in our security posture. In addition, this role will support GRC efforts. What You'll Do: * Threat Monitoring & Incident Response * Monitor security alerts and events across various platforms including EDR, DLP, SIEM, and other tools. * Lead investigations of potential security incidents and coordinate response actions per the Security Incident Response Plan. * Perform root cause analysis and recommend remediation measures. * Vulnerability & Risk Management * Conduct vulnerability assessments, penetration testing support, and threat hunting leveraging tools and industry threat intelligence. * Partner with IT and Engineering teams to remediate findings and strengthen security controls. * Maintain an up-to-date understanding of emerging threats and attack vectors. * Security Operations * Monitor daily alert activities, escalate issues, and provide guidance to key stakeholders. * Tune detection rules, playbooks, and response workflows to improve efficiency. * Develop and maintain security documentation, including incident response playbooks and procedures. * Governance & Compliance Support * Assist with internal and external assessments and audits, evidence gathering, and regulatory requirements (e.g., SOC 2, ISO 27001, etc.) * Ensure security controls align with policies, standards, and best practices. * Collaboration & Leadership * Work cross-functionally with IT, Engineering, Legal, and Compliance teams. * Mentor and coach junior security staff. * Contribute to strategic security initiatives and roadmap planning. Other Requirements: * Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience). * 8+ years of experience in security analysis, SOC operations, or incident response. * Strong knowledge of security tools (SIEM, EDR, IDS/IPS, DLP, etc.) * Experience with vulnerability management and risk assessment. * Familiarity with cloud security (AWS, Azure, or GCP). * Excellent problem-solving, analytical, and communication skills. Nice to have: * Professional certifications such as CISSP, CISM, GIAC, CEH, or Security+. * Hands-on scripting or automation skills (Python, PowerShell, etc.). * Experience with GRC tools and compliance frameworks. * Background in mentoring or leading junior analysts. VoltaGrid is an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, creed, color, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information, arrest record, or any other characteristic protected by applicable federal, state or local laws. Our management team is dedicated to this policy with respect to recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, and general treatment during employment. #LI-LM1 #LI-onsite
    $90k-121k yearly est. 29d ago
  • Senior Security Analyst

    Tectammina

    Information security analyst job in Houston, TX

    6+ years of experience in multiple industry risk, control and governance disciplines (e.g. Audit, Business Continuity Planning, and Regulatory Compliance). In-depth understanding of information technology and business continuity principles and best practices across the industry as well as project management principles. Broad knowledge of information and technology risk management policies, methods, standards, tools, and processes (e.g. ISO, COSO, COBIT) as well as knowledge of compliance, legal, internal / external audit & regulatory requirements. Significant expertise in the collaboration, facilitation and coordination of the mitigation of risks. Adept at navigating governance structures. Ability to manage and analyze data. Experience raising awareness of information and technology risk throughout an organization. Understanding of metrics development and reporting. Strong problem solving and program execution skills. Ability to prioritize and drive difficult decisions among business partners. Ability to solve or to collaborate in solving very complex risk issues that span legal, compliance and regulatory obligations across various lines of business and shared service areas of the company. Ability to prioritize and drive difficult decisions among business partners Strong client relationship management experience and influencing skills. Strong interpersonal and oral/written communication skills, able to build relationships with people at all levels. Experience developing and delivering presentations to all levels of management. Strong ability to develop, lead and manage a professional staff. Qualifications PLEASE NOTE: While technical experience is a plus, this is not a technical information security position. It is best filled by someone with information security management or information technology audit experience. This is a leadership position requiring strong communication and analytical skills. Additional Information Job Status: Contract Eligibility: H1B/EAD Green Card/ Green Card/ US Citizens Share the Profiles to ********************* Contact: ************ Keep the subject line with Job Title and Location
    $90k-121k yearly est. Easy Apply 1d ago
  • Senior Analyst, Information Security

    Nrf 4.0company rating

    Information security analyst job in Houston, TX

    We are a global law firm with a powerful strategic focus and real momentum. Our industry-focused strategy is seeing us take on pioneering work in places that others have yet to reach. Our shared values define our culture and our workplace. You will find us to be unusually collegial, team-oriented, and ready to innovate. We work seamlessly across practices, offices and around the world. This elimination of boundaries has allowed us to evolve into a law firm that works as hard for its culture as it does for its clients. The Senior Information Security Analyst is one of several such Analyst roles in the firm. Each Analyst is responsible for assisting with the day to day operation of CISO office tasks. Analysts are also encouraged to participate in proactively identifying sources of vulnerability and threat. The role will be part of a worldwide team that is empowered to operate the activities within their assigned function. Daily activities will focus heavily on request, event and incident management and direction will be provided by the Information Security Manager. Norton Rose Fulbright is committed to the professional development of its staff. There will be significant development opportunities for the Senior Information Security Analyst role, both through on-the-job learning and targeted training. The CISO team also embrace a mentoring and meritocratic approach. The success of this role is dependent upon building a lasting alignment between information security provisions and business requirements. In particular, the role must consider: The special requirements of the Firm with regard to client confidentiality, as well as regulatory requirements such as data protection. Achieving a balance between protecting the firm and ensuring that users can work effectively; being pragmatic but cognizant of risk. Key Objectives: Ensure that the Firm has the requisite capability to investigate, prevent and remediate against security breaches, viruses and deviations from security procedures. Act as a technical expert in the security field with a solid understanding of Norton Rose Fulbright's Information Security infrastructure and act as its champion in relation to Information Security. Assist with Information Security monitoring and act as a technical point of escalation for any alerted issues. Manage the global Information Security incident / request queue. Assist with a program of educational, procedural and technical improvements aligned with the Information Security Management System. Assist with the management of technical controls defined within the Information Security Management System. Responsibilities include, but are not limited to: Act as a champion for Information Security best practice and policies. Act as an intermediate escalation point and technical mentor for other members of the analyst team. Operate and manage security incidents and requests to SLA guidelines. Review, action, and escalate, any unusual event behavior identified. Assist with development and maintenance of the Firm-wide security infrastructure configuration, policies and procedures, identifying improvements to procedures, and reporting on incidents. Actively promote security governance in support of the Information Security policies, to ensure appropriate measures are taken to secure the Firm's confidentiality and integrity. Encourage cooperative working with all business functions to achieve shared goals, ensuring skills transfer and technical security awareness within the teams. This includes writing process documents and conducting training. Work cooperatively with project teams to ensure that new project and changes adhere to Information Security policies and governance standards. Identify threats and vulnerabilities. Keep a technical industry awareness of security risks and exposures and proactively promote effective counter-measures. Configure appropriate security parameters in monitoring systems and act as a technical point of escalation for any alerted issues. Perform document reviews and privileged account reviews. Experience / Skills: Technical bachelor's degree or equivalent IT / Information Security experience (required). At least 5 years' experience working within Information Security infrastructure or vocation to move from another technical discipline. Proven ability to adapt quickly to emerging threats or new information, shifting focus as needed. Demonstrated expertise in Microsoft 365 Defender and Azure Sentinel for detecting, investigating, and responding to suspicious behaviors and anomalous activities. Familiarity with endpoint security solutions and security infrastructure, including EDR, vulnerability management tools, DLP solutions, and removable media encryption. Working knowledge of cloud based web and email filtering solutions such as , Zscaler, Mimecast, Proofpoint, or Cisco. Experience with securing cloud environments (AWS, Azure, GCP), including configuration management, identity and access controls, monitoring, and incident response. Familiarity with cloud security tools (e.g., Microsoft Defender for Cloud, AWS Security Hub), and cloud compliance frameworks (e.g., CIS, CSA CCM) is highly desirable. Experience with security automation and orchestration, including the use of scripting languages (such as PowerShell or Python) and SOAR platforms to streamline incident response, automate repetitive tasks, and enhance overall security operations. Strong knowledge of security technologies (e.g., firewalls, IDS/IPS, EDR, SIEM). Security-related certification e.g. CompTIA Security+, GSEC, CISSP, CISA, CCSP (preferred). Good understanding of security frameworks such as ISO 27001, NIST, Mitre (preferred). Experience of introducing Information Security improvement through effective deployment of technology and / or processes to move to a proactive footing in security management or demonstrating similar in current technical discipline. Ability to triage and remediate phishing and impersonation attacks in a timely and efficient manner as the risk dictates. Experience working with a service management tool. Familiarity with legal tech platforms (e.g., iManage, Relativity, NetDocuments) is a plus. Personal Attributes: Keen sense of responsibility, ability to set a professional example and desire to adhere to defined security practices. Strong technical security understanding. Self-motivated and able to work calmly and methodically under pressure. Excellent interpersonal skills, exceptional levels of personal integrity and the ability to communicate clearly at all levels through reports, presentations and forming effective matrixed relationships. Skilled in applying an agile approach to task management, ensuring responsiveness to dynamic risk landscapes. Cooperative, service-orientated, individual and established team worker, comfortable working in a geographically dispersed team. Good judgement when it comes to confidentiality and sensitivity of information of which they may become aware through the course of their duties. Adaptable and keen to learn new skills. The Team: The scope of the Information Security function includes all strategic security planning and control oversight to ensure effective risk mitigation takes place within the firm. The Information Security team operates a number of security solutions directly, such as anti-malware solutions, Internet security proxy servers, and the vulnerability scanning platform, and rely on other departments (IT service delivery, HR, Facilities) to operate all other security controls. The Information Security team is responsible for ensuring the overall effectiveness of the control framework and managing security incidents. The team work with unified principles and processes around the world while maintaining regional stakeholder relationships. They adhere to the international standard ISO 27001, and report to the Firm's CISO. Norton Rose Fulbright US LLP is committed to providing employees with a comprehensive and competitive benefits package that supports you, your health, and your family. Benefit packages include access to three medical plans, dental, vision, life, and disability insurance. Employees can also access pre-tax benefits such as health savings and flexible spending accounts. Norton Rose Fulbright helps provide financial security by allowing employees to participate in a 401(k) savings plan and profit-sharing plans if eligible. Full- time employees are eligible to access fertility benefits designed to support fertility and family-forming journeys. In addition to the Firm's health and welfare benefits above, we offer a competitive paid time off plan, which provides a minimum of 20 days off based on your role and tenure with the firm. The firm offers a generous paid parental leave benefit allowing parents to take a minimum of 14 weeks of paid leave to bond with your newborn, or adopted child(ren). Employees are also entitled to 11 Firm holidays. Norton Rose Fulbright US LLP is an Equal Opportunity Employer and complies with all applicable federal laws and their implementing regulations that require the collection and recording of certain data and information. The information we receive will not be used to make any decision regarding employment and will be kept separate from your application. Similarly, self-identification information is kept confidential and used only in accordance with applicable federal laws and regulations. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Norton Rose Fulbright is committed to providing reasonable accommodation as an Equal Opportunity Employer to applicants with disabilities. If you require assistance or accommodation to complete your application, please contact *****************************. Please provide your contact information and a description of your accessibility issue. We will make a determination on your request for reasonable accommodation on a case-by-case basis. E-Verify is a registered trademark of the U.S. Department of Homeland Security. This business uses E-Verify in its hiring practices to achieve a lawful workforce. Equal Employment Opportunity
    $88k-115k yearly est. Auto-Apply 15d ago
  • Cyber Security Specialist

    Empyrean 3.7company rating

    Information security analyst job in Houston, TX

    The Cyber Security Specialist will serve as a technical authority within Empyrean's Information Security organization. This role is responsible for implementing, maintaining, and enhancing Empyrean's cybersecurity posture across infrastructure, applications, and cloud environments. This position requires deep technical expertise in threat detection, incident response, vulnerability management, and cloud security. The Cyber Security Specialist will work cross-functionally with IT, Engineering, and Compliance to safeguard Empyrean's systems and data, ensuring alignment with regulatory and client requirements. The Cyber Security Specialist acts as a trusted advisor and escalation point for complex security issues, contributing to the design of security architectures and the development of security standards that scale with Empyrean's growth. ESSENTIAL DUTIES AND RESPONSIBILITIES Lead advanced threat detection, vulnerability assessment, and incident response activities to protect Empyrean's systems, networks, and applications. Administer and optimize security tools such as SIEM, SentinelOne, NetSkope, Entra, EDR, IDS/IPS, firewalls, KnowBe4, Proofpoint, DLP tools, vulnerability scanners, and other security tools to ensure consistent and proactive monitoring. Conduct in-depth analysis of security events and alerts, identifying root causes and coordinating remediation with technical teams. Collaborate with infrastructure and application owners to embed secure-by-design principles into system architecture and broader control environment. Drive initiatives related to cloud security governance, ensuring proper configuration and monitoring of AWS environments. Develop and maintain security baselines, hardening standards, and operational procedures to ensure compliance with frameworks such as NIST CSF, SOC 2, ISO 27001, and HIPAA. Support the design and execution of penetration tests, exercises, and risk assessments. Serve as a key resource for Empyrean's incident response and disaster recovery programs, including forensic investigation and post-incident review. Provide technical guidance to team members within the Security Operations function. Partner with Compliance and IT leadership to ensure audit readiness and continuous improvement of Empyrean's control environment. Evaluate and implement emerging security technologies that enhance protection, detection, and response capabilities. Work with other members oof the team to determine suitable controls for exceptions and other initiatives that support business operations. Prepare and deliver reports to leadership highlighting Empyrean's security posture, metrics, and improvement initiatives. NON-ESSENTIAL DUTIES AND RESPONSIBILITIES Assist in developing and delivering employee cybersecurity awareness and training programs. Participate in internal and external audits and client security assessments as needed. Contribute to enterprise risk assessments and cross-departmental process improvement initiatives. Represent Information Security in cross-functional meetings and projects to ensure alignment between business objectives and security strategy. REQUIRED SKILLS AND ABILITIES Advanced understanding of cybersecurity principles, technologies, and threat landscapes. Expertise in network, endpoint, and cloud security technologies, including SIEM, IDS/IPS, EDR, firewalls, etc. Hands-on experience with vulnerability management, penetration testing, and forensic analysis tools. Knowledge of secure system design, architecture review, and cloud configuration best practices. Familiarity with frameworks and standards such as NIST CSF, ISO 27001, and SOC 2. Ability to interpret and apply compliance and regulatory requirements (e.g., HIPAA, SOC, ISO). Strong analytical and problem-solving skills with the ability to prioritize and manage multiple tasks effectively. Excellent communication and collaboration skills across technical and business teams. Proven ability to operate with discretion, sound judgment, and high attention to detail. Demonstrated initiative and ownership in developing and executing security improvements. KNOWLEDGE, EXPERIENCE, AND/OR EDUCATION REQUIREMENTS Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent work experience). 3-5+ years of progressively responsible experience in cybersecurity, information security engineering, or security operations roles. Background in incident response, vulnerability management, and security engineering. Experience with AWS and/or other cloud security tools and configurations. Familiarity with IAM systems (Okta, AD, AWS IAM), SIEM platforms (e.g., Splunk, Sentinel), and endpoint protection tools. Preferred certifications a plus: CISSP, CISM, CEH, or equivalent advanced cybersecurity certification(s). Familiarity with scripting or automation for security operations (Python, PowerShell, etc.) is a plus. OTHER REQUIREMENTS Ability to work on-site or in a hybrid capacity, as required by the role. Availability for after-hours support as needed for critical access or incident-related issues. Must be authorized to work in the United States without sponsorship. Disclaimer: This job description is not intended to be an exhaustive list of all duties, responsibilities, or qualifications associated with the job. Management reserves the right to modify or reassign job duties as business needs evolve. #LI-RZ1 #LI-Remote
    $77k-101k yearly est. 60d+ ago
  • Security Analyst

    Insight Global

    Information security analyst job in The Woodlands, TX

    The Security Tech Analyst leads security technology projects that protect the client's personnel and physical assets. This role manages end‑to‑end security installations, coordinates with vendors and internal partners, and ensures all systems are properly scoped, deployed, and maintained. The ideal candidate brings strong technical skills, project management experience, and hands‑on expertise with video surveillance and access control systems. Key Responsibilities - Manage all security installation projects for the client. - Develop scopes of work and installation plans for new security equipment. - Identify, source, and order appropriate security technology. - Track and report project progress, timelines, and deliverables. - Coordinate with security vendors to drive project execution. - Partner with internal teams to identify and address equipment gaps. - Conduct site visits to oversee field installations. - Provide technical training to Security staff. - Program and maintain video surveillance and access control software. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements 10+ years in security management Experience monitory video management and using video management software Experience working with access control systems - genetic and panel Project Management or Security Administrative experience
    $66k-94k yearly est. 2d ago
  • Information Security Manager I

    Lexitas 4.0company rating

    Information security analyst job in Houston, TX

    Information Security Manager I LOCATION: This is a full-time, on-site position based at our Houston office located at 13101 Northwest Freeway. PAY RANGE: $90,000-$150,000/yr Join a High-Growth Legal Services Leader ABOUT THE ROLE: Reporting directly to the VP of Information Security, this position will play a key role in building, maintaining, and continuously improving a comprehensive security program for Lexitas. The Information Security Manager will provide both technical expertise and leadership-overseeing policies, managing tools and processes, and guiding onshore and offshore teams to ensure security, privacy, and compliance. You'll also collaborate closely with third-party providers and internal stakeholders to monitor, investigate, and mitigate risks while aligning cybersecurity strategy with business objectives. Lexitas is a rapidly growing national provider of legal and corporate support services, including court reporting, medical record retrieval, process service, and legal talent. Built on a foundation of trust, professionalism, and innovation, Lexitas delivers customized solutions with unmatched personal service to clients across the U.S. and internationally. KEY RESPONSIBILITIES: Lead the design, implementation, and evaluation of security, privacy, risk, and compliance systems and processes. Monitor networks, tools, and provider services for security or compliance issues. Investigate and document security incidents, assessing impacts and supporting incident response. Conduct and facilitate security tests, audits, and risk assessments; track mitigation activities. Develop best practices for IT security and compliance while staying current on industry standards and emerging threats. Manage third-party providers and direct offshore teams in support of security initiatives. Provide regular reports and metrics on security performance and risk posture to senior leadership. Ensure compliance with laws, regulations, and frameworks (NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.). Support Security Operations Center functions, vulnerability management, and penetration testing. Contribute to business continuity and disaster recovery strategies. WHAT YOU'LL BRING: Strong leadership and people-management skills, with experience guiding onshore and offshore teams. Expertise in network and application vulnerability management, penetration testing, firewalls, SIEM, IDPS, antivirus, and patch management. Critical problem-solving ability with a proactive approach to identifying and mitigating risks. Excellent communication skills with the ability to explain technical concepts to both technical and non-technical audiences. Experience collaborating with third-party vendors and providers. Familiarity with ITIL, incident/change management, and security baseline auditing preferred. Commitment to Lexitas' SPIRIT values: Service, Positivity, Integrity, Respect, Innovation, and Teamwork. QUALIFICATIONS: Bachelor's degree in Computer Science or related field strongly preferred. IAT Level-2 technical certification required (e.g., CompTIA Security+, CISSP, CISM, CISA, CIPM). 6+ years of experience as an Information Security Analyst or SOC role. 3+ years managing Information Security, Privacy, Risk, and/or Compliance programs. 3+ years managing personnel in security-related roles. Demonstrated experience responding to, managing, and resolving security incidents. Strong knowledge of LAN/WAN networking, IP addressing, routing, and Windows/Linux/Unix systems. Experience with SIEM systems a plus. SUPERVISORY RESPONSIBILITIES: This is a supervisory role. LANGUAGE SKILLS Ability to effectively present information and respond to questions from internal and external customers whose first language is English. CERTIFICATES, LICENSES, REGISTRATIONS None PHYSICAL DEMANDS Climbing, balancing, stooping, kneeling, crouching, crawling, reaching, standing, walking, pushing, pulling, lifting, grasping, feeling, talking, hearing, seeing, and repetitive motions. Exerting up to 50 pounds of force occasionally, and/or up to 20 pounds of force frequently, and/or up to 10 pounds of force constantly to move objects. While performing the duties of this job, the employee is regularly required to stand; walk; use hands to finger, handle or feel objects, type and use mouse; reach with hands and arms; and talk and/or hear. The employee is required to sit for extended periods of time. WORK ENVIRONMENT The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions. While performing the duties of this job, the employee regularly works in an office environment in a clerical environment. This role routinely uses standard office equipment such as computers, phones, photocopiers and filing cabinets. TRAVEL REQUIREMENTS This position may require periodic travel. OTHER DUTIES Please note this is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to the job at any time with or without notice. AAP/EEO STATEMENT Lexitas prohibits discrimination based on race, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender identity, sexual orientation or any other legally protected status. EOE Employer/Vet/Disabled. If you require reasonable accommodation in the application process, please contact Human Resources at *********************** for assistance. All other applications must be submitted online.
    $90k-150k yearly 12d ago
  • Information Security Analyst

    Conga 4.6company rating

    Information security analyst job in Houston, TX

    A career that's the whole package! At Conga, we've built a community where our colleagues can thrive. Here you'll find opportunities to innovate and support growth through individual and team development, all within an environment where every voice is heard. Conga accelerates the customer's journey to becoming a more connected and intelligent business. The Conga Advantage Platform is recognized worldwide for enhancing this journey, bringing together Configure, Price, Quote, Contract Lifecycle Management, and Document Automation capabilities on a single open platform. It integrates seamlessly with any ERP, CRM, and Cloud. Powered by a unified data model and purpose-built AI, Conga helps companies achieve a unique advantage-one built on seamless connection, actionable intelligence, and scalable growth. Our approach is grounded in the Conga Way, a framework that reflects our values and drives everything from hiring to decision-making, as well as key programs including recognition. Created with direct input from our colleagues, the Conga Way forms the foundation of our vibrant culture. Job Title: Information Security Analyst Location: Boston or Houston area Hybrid: minimum 2 days per week in the office Reports To: Director, Compliance and Information Security A quick snapshot….. Conga is seeking an Information Security Analyst to help shape and maintain a robust information security program. In this role, you'll work closely with stakeholders across the company to identify and remediate security issues, promote awareness, and ensure compliance with legal, regulatory, and customer requirements. You'll be part of the Security & Compliance Team, but also operate independently, managing alerts, vulnerabilities, incident response, and risk assessments. Your day-to-day will involve hands-on security operations, cross-functional collaboration, and continuous improvement of security practices. Why it's a big deal….. This role is critical to protecting Conga's information assets and maintaining trust with customers and partners. By proactively managing threats, vulnerabilities, and compliance, you'll help safeguard the company's reputation and ensure business continuity. Your work directly supports Conga's strategic goals by enabling secure innovation, enhancing customer confidence, and fostering a culture of security awareness across the organization. Required experience. Bachelor's Degree in Computer Science, Cybersecurity, Engineering, or other relevant subject areas OR equivalent experience. 3-4 years of experience in information security, preferably with a focus on IT and product security. Foundational knowledge of cloud security principles (AWS, Azure, GCP), DevSecOps practices, and secure software development lifecycle (SDLC). Hands-on experience with application security and vulnerability management practices. Foundational knowledge of at least one or more security/compliance frameworks such as ISO 27001, ISO 27701, SOC, PCI, HIPAA, etc. Understanding of privacy frameworks such as GDPR, CCPA, CPRA, etc. Strong communication and interpersonal skills. You're not just comfortable engaging in collaborative discussions, but initiating them, too, communicating clearly and concisely while leveraging strong listening skills to gather accurate information and resolve issues efficiently. Cross-Functional Collaboration. You know how to build strong relationships across Cloud Ops, Engineering and IT teams. teams. You communicate priorities and goals clearly, helping both technical and non-technical stakeholders stay aligned and moving in the same direction. Detail oriented. Consistently ensures accuracy in security assessments, documentation, and incident response processes, minimizing risk and maintaining high standards of compliance. Self‑starter. You take a proactive approach, independently identifying and addressing work‑related tasks to ensure continuous progress and timely delivery. Here's what will give you an edge…… SaaS industry experience CISSP or other security certifications #LI-AM1 In the spirit of the Conga Way, we strive to design easy-to-understand compensation programs that are fair and free from any type of discrimination. In keeping with this approach, we are committed to delivering competitive compensation and benefits packages to our colleagues worldwide and communicating transparently about the structure of our compensation programs. Listed below is the U.S. base salary range for this full-time position. Within the range, individual pay is determined by job-related skills, experience, and relevant education, or training. In addition to base salary, Conganeers receive a variable incentive pay component, perks such as flexible work options, and a full range of benefits including medical and dental insurance. The posted salary ranges are for the expectations outlined in the . We are often open to a wide variety of profiles and sometimes have flexibility within our organizational structure to adjust the role responsibilities up or down should we select a candidate that is less or more experienced than the posted job requirements. In these occasional cases, we will communicate the revised salary range to the candidate during the selection process. U.S base salary range:$107,000-$125,000 USD Did we pique your interest? If this sounds like the kind of job you would love in the kind of environment where you would thrive, please click apply. We'd love to hear from you! Preferred Resume Format We accept resumes in any format, we suggest using PDF or plain text. These formats help ensure that your resume's formatting remains intact, making it easier for our recruiters to review your application promptly. Don't meet every requirement for the role? Studies have shown that women and members of ethnic minorities are less likely to apply to jobs unless they meet every single qualification. At Conga we are dedicated to building a diverse, inclusive, and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You just might be the right candidate for this or other roles. Additional Information Conga is proud to be an Equal Opportunity Employer and provides equal employment opportunities to all employees and applicants regardless of race, color, religion, gender, gender identity, age, national origin, disability, parental or pregnancy status, marriage and civil partnership, sexual orientation, veteran status, or any other characteristic protected by law. We understand interviewing can be stressful for those with disabilities. If reasonable accommodation is needed to allow you to show us your best self, please let your recruiter know as soon as possible. All your information will be kept confidential according to EEO guidelines. Conga is not open to third party solicitation or resumes for our posted FTE positions. Resumes received from third party agencies that are unsolicited will be considered complimentary. Conga's Applicant Privacy Statement The information you provide during the application process will be used in accordance with Conga's Applicant Privacy Statement (*********************************************** By submitting your application, you acknowledge and agree to the terms outlined in this privacy statement.
    $107k-125k yearly Auto-Apply 7d ago
  • Director of Information Security

    Rxvantage

    Information security analyst job in Houston, TX

    We're seeking an experienced Director of Information Security to join our dynamic team and help drive our growth. In this role, your job will be to coordinate people and processes to instill a “security first” mindset for information management, systems development, acceptable use of these systems, staff awareness, and oversight of our vendors and partners. This security professional will lead the management of risk and compliance of intellectual property, including day-to-day network and cyber tool monitoring, oversight, and ongoing security testing. The individual performing this role will enforce policies and procedures that ensure compliance with state, federal, and industry standards and requirements, ensuring our customers' and company's data are protected. As the Director of Information Security, you will implement a security-readiness plan and provide guidance on how to quickly and effectively respond to any and all security incidents. In addition, this role will be instrumental in implementing controls and monitoring capabilities that provide visibility into the organization's security posture. At RxVantage we transform how medical practices engage with life sciences resources and expertise to improve patient care. Our platform intelligently connects healthcare providers with the precise life sciences experts that they need, when they need them. As a result, medical practices stay on the cutting edge of patient care without disrupting workflows. Trusted by more than tens of thousands of healthcare practitioners and all major life sciences companies, RxVantage has powered millions of educational exchanges between healthcare teams and life sciences companies. What you'll be doing: Creating and implementing a security roadmap based on current and ongoing assessments Ensuring policies are developed and maintained from both a business & technical perspective for the application, data, and security needs of the organization Working with Legal to ensure agreements are congruent with policies Overseeing the GRC (Governance Risk and Compliance) process Ensuring compliance with industry laws and regulations for data security and privacy to include CCPR, 21 CFR Part 11, SOC2, NIST SP800-53 Monitoring the Identity and Access Management Framework Benefits: Competitive Salary 100% Company-Paid Premiums for Employee's Medical Health (HDHP 4500), Vision, and Dental Plans + $4,400 company sponsored contribution into an HSA Short-term and Long-term Disability Life Insurance 401k Matching Work from Anywhere within the US Flexible PTO 100% Paid Parental Leave Post-Parental Leave Program - $5k stipend to assist with expenses, 4 week 100% paid “Ease-Back” return to work transition period Charitable donation matching Location: Our “Work from Anywhere” philosophy is aimed at making sure that we recruit a diverse range of thought leadership to ensure that our technology is better able to serve local health care providers. Our goal is to hire the country's top talent and allow them to create an environment within the U.S. where they can do their best work. About Our Organization: At RxVantage, we're a small company with a big mission: to connect healthcare providers with the right life science experts and resources they need, exactly when they need them, to improve patient care. We've built a software platform that's changing the way providers learn about the latest medical advancements and technologies. Every year, our platform powers over 1 million educational exchanges between medical practices and life science companies, making it easier for them to stay informed and provide better care. We have a proven product, a strong mission, and a passionate team. Now, we're looking for talented people to help us grow even more. If you're driven, eager to make an impact, and ready to be part of something meaningful, we want to hear from you! --- RxVantage is an equal opportunity employer and dedicated to ensuring that we represent the local communities where our health and wellbeing providers serve as pillars of support to our family, friends, and neighbors. Our representation within these communities allows us to embody a diverse set of backgrounds, experiences, abilities and perspectives; and provide an inclusive environment for our team to feel empowered to be their authentic selves, without fear of harassment or discrimination.
    $101k-152k yearly est. Auto-Apply 20d ago
  • Security / Soc Analyst III

    Wavestrong

    Information security analyst job in Houston, TX

    Exciting Security / Soc Analyst III, 6 months contract opportunity in Houston, TX. Requirements 5 plus years experience in the security domain, Incident Response, threat monitoring, and handling incidents (incident triage and response) Determine detection requirements for data sources being on-boarded to the SIEM, and assessing the value of in place SIEM detection cases, in order to determine gaps and overlap in the overall detection scheme. Perform security monitoring and incident response of cyber security events for proper determination of being considered a cybersecurity event. Triage offenses for false positives Hands-on experience defining detection or protection schemes based on industry standards and frameworks. SIEM, Endpoint Detection and Response, Firewall/IPS/IDS, Proxy, Data Loss Prevention, Authentication Experience leveraging data from security technologies and referential data sources to define security detection requirements, including detections which correlate data across multiple data sources. Ability to interpret code in the support of detection case development.
    $66k-94k yearly est. Auto-Apply 43d ago
  • Security Analyst

    Indigo Beam

    Information security analyst job in Houston, TX

    Experienced Technologists. Common Sense Approach. Indigo Beam was born of Bluware, Inc. Based in the heart of the Energy Corridor in Houston, TX, since 1986, we have experience solving the business problems of some of the most dynamic and demanding industries with a common sense approach and disciplined focus in using technology intelligently. Our consultants bring to bear a wealth of experience and deep expertise in the Power and Utilities, Oil and Gas, Public Sector and Healthcare industries. Our extensive reference list demonstrates our commitment to our many satisfied clients with whom we have built long-term relationships. Software Innovation to Solve Business Problems We partner with our clients to create innovative mobile, Geographic Information System (GIS) and Web applications they need for the long haul. The results are strategic, technology-driven solutions that are intuitive, scalable, and sustainable. Our custom applications are intentionally designed to work in complete harmony with third-party Enterprise Resource Planning (ERP), content management, and database solutions within client organizations. Job Description SUMMARY The Security Analyst detects, manages and reduces the impact of cybersecurity threats to the organization. They are responsible for proactively managing the security of the network and identifying weaknesses of company infrastructure (software, hardware and networks). ESSENTIAL/ NON-ESSENTIAL JOB FUNCTIONS Investigate security alerts / notifications from SPLUNK Work with the process automation team on cybersecurity initiatives Perform risk assessments and maintain the risk register Utilize Mimecast and ForcePoint for web and email monitoring Review IT small project charters for security risks Assist in the completion of vendor SSAE16's Work with the infrastructure team on mitigating penetration testing findings Plan, implement and upgrade security technical measures and controls Establish plans and protocols to protect data and information systems against unauthorized access, modification and/or destruction Perform vulnerability testing and security assessments Conduct internal security audits / compliance testing Recommend and install appropriate technical tools and countermeasures Define, implement and maintain corporate security policies Provide input into security awareness communications Utilize in-house tools to manage DLP EDUCATION AND EXPERIENCE REQUIREMENTS Required Education and Experience: Bachelor's degree in Computer Science or the equivalent (e.g. Math, Electrical Engineering, Cyber Security, etc.) 5+ years of experience IDS/IPS, penetration and vulnerability testing TCP/IP, computer networking, routing and switching Windows, UNIX and Linux operating systems Network protocols and packet analysis tools Preferred Education and Experience: Degree preferred Data Loss Prevention (DLP) tools, anti-virus / anti-malware tools Firewall and intrusion detection/prevention protocols C, C++, C#, Java or PHP programming languages Security Information and Event Management (SIEM) CERTIFICATIONS CISSP, CCE, CEH, GCFE, GCFA, GCIH, GCIA, CCFE, CPT, CREA, CompTIA A+ would be desirable certifications though other comparable certifications and experience would be considered SUPERVISORY RESPONSIBILITIES Supervises others: No BUDGETARY RESPONSIBILITIES No, but all team members provide input into the annual planning process and tool evaluation/selections TRAVEL REQUIREMENTS No COMPETENCIES · Self-starter who is able to work independently while supporting the needs of the team · Excellent oral and written communication skills · Strong decision making skills · Comfortable interacting with all levels of management Additional Information All your information will be kept confidential according to EEO guidelines.
    $66k-94k yearly est. 60d+ ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Information security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 1d ago
  • Securities Sales Analyst - Commodities

    W.F. Young 3.5company rating

    Information security analyst job in Houston, TX

    About this role: Wells Fargo is seeking a Securities Sales Analyst to join our Commodities Sales team. Learn more about our career areas and lines of business at wellsfargojobs.com. In this role, you will: Gain an understanding of commodity traded products that manage price risk and monetize commodity assets Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals Generate daily market and pricing data and analytics to the client base Execute derivative trades with Wells Fargo customers and book them in the deal capture system Execute physical commodity financing structures and book them in the deal capture system Develop pitch materials, deal documents and internal/external marketing material Provide daily front office support functions, including, but not limited to exposure calculations, order blotter monitoring, trade processing and responding to daily and varied customer service requests Provide analytical support for senior marketers, traders and clients Handle a wide variety of issuers, types, volume and complexity of transactions with accuracy and a sense of urgency Understand derivatives pricing, risk management techniques and challenges for both producers and consumers in the energy, metals, and agricultural sectors Provide client coverage support when senior marketers are traveling Required Qualifications: 6+ months of Securities Sales experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Degree from a Four-Year Accredited College or University Excellent verbal, written, and interpersonal communication skills Knowledge of commodity products, industries and/or applications Strong analytical and quantitative skills with high attention to detail and accuracy Ability to thrive in a fast-paced and team-oriented environment Ability to interact with all levels of an organization Desire and ability to build strong relationships with internal and external partners Basic knowledge or experience in Oil & Gas, Energy, Agricultural or Metals industry Job Expectations: Up to 10% travel Location: Houston, TX Posting End Date: 1 Feb 2026 *Job posting may come down early due to volume of applicants. We Value Equal Opportunity Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements. Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process. Applicants with Disabilities To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo. Drug and Alcohol Policy Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more. Wells Fargo Recruitment and Hiring Requirements: a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
    $67k-89k yearly est. Auto-Apply 5d ago
  • Business Information Security Officer

    Sanlam Ltd. 4.0company rating

    Information security analyst job in Bellville, TX

    Who are we? Sanlam Group Technology is responsible for the provision of a digitally enabled technology service as a group COE, drive business and transformation and provide group-wide digital and data architecture. We operate the various technology platforms and shared services, ensure Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology across Sanlam. What will you do? The Business Information Security Officer (BISO) is responsible for identifying and assessing the InformationSecurity requirements of the business. The BISO in conjunction with the Business CIO, is responsible for theestablishment and maintenance of an Information Security Management System (ISMS) and ensure that theappropriate Information Security controls are implemented, maintained and aligned with the GroupGovernance requirements (i.e. Policies, Standards, Procedures and Guidelines and Cyber ResilienceFramework). The BISO is responsible for Security Awareness, Information Risk Management and translatingrisks and the effect thereof to Lines of Business to ensure informed risk assessment. Other responsibilitiesinclude: Participation in Group Information Security bodies and initiatives, logical access management,incident response, vulnerability management, IT audit coordination, ensuring new systems adhere to securitypolicy and Providing management assurance regarding the Cyber and Information Security posture of the Business. What will make you successful in this role? Establish and manage a Business Information Security Programme, effective participation in GroupInformation Security Programme (GISP) initiatives, Information Security Incident response and Cyber CrisisManagement, Information Security Governance and assurance, Application (including cloud) and Infrastructure Security, and Cybersecurity Education, Training and Awareness. The BISO will implement processes and controls as agreed with the CISO and the Business CIO. The BISOwill be responsible for quality and cost effectiveness of delivery of information security services in the BU andwill report on these metrics to the GISP. Outputs * Regular feedback to Business Manco on Group-wide information security issues. * The BISO must have an action plan to implement these initiatives in the Business . * The BISO will report to the GISP Manager on new initiatives, plans and progress which will be discussed at the Cyber Steering Committee. * Review and improve existing IT and Information Risk assessment, reporting and management practices. * Up to date and complete Business IT and Information Security Risk register. * Documented Security risk management action plan. This must include relative priorities of agreed actions; Ownership of the actions; Agree timelines. Priorities will be aligned to Business and GIS Ppriorities. * Up to date and complete Business Cloud register (if these services are used in the Business). * Review and respond to Policies, Standards, Procedures and Guidelines and Risk Acceptance requests within the agreed time. * Document processes and artefacts that prove that the relevant Governance and Assurance processes were implemented as designed. * Clear and timely communication to management and users regarding planned group awareness campaigns. * Risk assessment that identifies a requirement for additional awareness or targeted education, training and awareness interventions. * Maintenance of Business/ Cluster and alignment with the Group annual security education, training and awareness plan. * Documented Logical Access review schedule for Line of Business Applications, review results, facilitate resolution, progress report on resolution of issues that were identified during the reviews. * Review and respond to audit findings related to application logical access and other Business specific Information Security findings. Ensure that the ratings are accurate. * Provide management comment to the audit observations/ findings, that is specific as far as actions anddue dates are concerned. * Track and follow up on audit finding commitments. * Report all cyber security incidents, or information security incidents (including privacy related incidents) where the compromise was through technology to the SGT CSIRT. * Be contactable or provide alternative contact details for Cybersecurity incidents that are identified by the SGT CSIRT. * Ensure appropriate actions are taken when policy breaches are identified in the Business. * Assist by facilitating engagement and communication with key stakeholders in the Cluster during amajor incident. * Provide context on system and process criticality. * Produce Quarterly Group ISO Forum and GISP reports. * Provide input into requirements documents - ensure security roles; auditing; data protection (in transit and rest); monitoring etc. are defined in line with approved. Information Security policies and standards. * Ensure that Security 'gates' are a formal part of the SDLC/ Agile/ relevant solution development methodology. * Interventions and role-players must be clearly specified. * Active participation in Sanlam sanctioned industry bodies (e.g. ISF Live, ISACA). * Timeous escalation of new, high or escalating risks. * Engage with application owners and Group Cyber Security Centre Operations Team to ensure that system vulnerabilities are addressed that were identified during Penetration tests, Red Team exercises or Vulnerability scans. Ensure that the Business CIO's are aware of risk and actions required. * Facilitate workshops and risk documentation during Control Self Assessments, or Crown Jewel Risk Assessment processes. Qualifications * Grade 12 * Bachelor's degree in Information Technology, Commerce, Science, or Social Science (preferable). * In force Information Security Certifications such as CISM, CISSP, CCSP, CISA, ISO 27000 Lead Implementer/ Auditor. Experience and Knowledge * Experience in policy writing and reviews. * Experience in agile/ relevant solution development methodologies. * Familiarity with security practices and standards in development like the security development life cycle (e.g. OWASP). * Understanding of the technical and application environment of the Cluster/ Business. * Experience in analysis and control design, strong written and verbal communication skills. * Knowledge of ISO27k, Cobit, ITIL, CIS and ISF best practices. * Knowledge of Information Risk Methodologies (ideally ISF IRAM2), threat modelling and Operational Risk management methodologies. * Knowledge of the key business processes, key stakeholders and have their contact details readily available. * Understanding of the risk management and governance structures within the Cluster. Knowledge and Skills Infiltration testing (hacking) Risk management Project Management Tools Reporting and Administration Research and trend analysis on IT security leading practice Personal Attributes Tech savvy - Contributing through others Manages complexity - Contributing through others Optimises work processes - Contributing through others Communicates effectively - Contributing through others Build a successful career with us We're all about building strong, lasting relationships with our employees. We know that you have hopes for your future - your career, your personal development and of achieving great things. We pride ourselves in helping our employees to realise their worth. Through its five business clusters - Sanlam Fintech, Sanlam Life and Savings, Sanlam Investment Group, Sanlam Allianz, Santam, as well as MiWay and the Group Office - the group provides many opportunities for growth and development. Core Competencies Cultivates innovation - Contributing through others Customer focus - Contributing through others Drives results - Contributing through others Collaborates - Contributing through others Being resilient - Contributing through others Turnaround time The shortlisting process will only start once the application due date has been reached. The time taken to complete this process will depend on how far you progress and the availability of managers. Our commitment to transformation The Sanlam Group is committed to achieving transformation and embraces diversity. This commitment is what drives us to achieve a diverse, inclusive and equitable workplace as we believe that these are key components to ensuring a thriving and sustainable business in South Africa. The Group's Employment Equity plan and targets will be considered as part of the selection process.
    $103k-153k yearly est. 3d ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Information security analyst job in Spring, TX

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in The Woodlands, TX?

The average information security analyst in The Woodlands, TX earns between $63,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in The Woodlands, TX

$89,000

What are the biggest employers of Information Security Analysts in The Woodlands, TX?

The biggest employers of Information Security Analysts in The Woodlands, TX are:
  1. Woodforest Financial Group Inc
Job type you want
Full Time
Part Time
Internship
Temporary